Claim Missing Document
Check
Articles

Found 22 Documents
Search

Identifikasi Kerentanan Website untuk Meningkatkan Keamanan Menggunakan Open Source Security Testing Methodology Manual Rusdan, Muchamad; Hendayun, Mokhamad
Journal of Practical Computer Science Vol. 4 No. 2 (2024): November 2024
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/jpcs.v4i2.5427

Abstract

This study aims to identify and analyze security vulnerabilities on the online learning website of Utama University using the Open Source Security Testing Methodology Manual (OSSTMM). This method offers a structured framework for security testing with a systematic and evidence-based approach. The research findings indicate several vulnerabilities in authentication mechanisms, input validation, SSL/TLS configuration, and API security. The identified vulnerabilities include weaknesses in authentication mechanisms against brute force attacks, input validation susceptible to injection attacks, SSL/TLS configuration not meeting security standards, and inadequate API security. The mitigation recommendations include implementing CAPTCHA, limiting login attempts, using prepared statements, enhancing SSL/TLS configuration, and implementing security headers such as X-Frame-Options, Content-Security-Policy, and X-Content-Type-Options. By applying these recommendations, the overall security level of the website is expected to improve, ensuring the confidentiality, integrity, and availability of user data, and increasing trust in the university's digital services.
Approach to Zero Trust Security Implementation to Enhance Internet of Things Infrastructure Security Rusdan, Muchamad; Ramlan, Isak
LogicLink Vol. 2 No. 2, December 2025
Publisher : Universitas Islam Negeri K.H. Abdurrahman Wahid Pekalongan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28918/logiclink.v2i2.12634

Abstract

The heterogeneity and resource constraints of Internet of Things (IoT) devices render traditional perimeter security inadequate. This study proposes a Zero Trust Security (ZTS) framework for IoT infrastructures that integrates a novel dynamic policy engine with continuous authentication and AI-assisted anomaly detection. The framework was evaluated in a simulated IoT environment using the TON_IoT dataset. Experimental results demonstrate that the proposed model achieved a 92.5% detection accuracy, reduced average response latency to 1.76 seconds, and decreased unauthorized access attempts by 87.1%. The key novelty lies in the architecture's context-aware feedback loop, where anomaly findings directly and adaptively inform access policies in real-time, a mechanism not extensively explored in prior ZTS models for IoT. These findings confirm that integrating ZTS with intelligent analytics significantly enhances IoT security resilience. This framework offers a practical blueprint for implementing robust, context-aware security in large-scale IoT applications, such as smart cities and industrial automation.