Susanto, Chayadi Oktomy Noto
Universitas Muhammadiyah Yogyakarta

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Emerging Information Science and Technology

Security Assessment Using Nessus Tool to Determine Security Gaps on the Repository Web Application in Educational Institutions Chayadi Oktomy Noto Susanto; Kauka Noor Fathur Rizko; Dwijoko Purbohadi
Emerging Information Science and Technology Vol 1, No 2: May 2020
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (424.757 KB) | DOI: 10.18196/eist.128

Abstract

This research aims to determine security holes and risks that may arise in the educational institution’s repository web application. The repository web application contains research data, journals, articles, and papers from lecturers and students at the institution. This web application does not yet have documentation about security holes and risks in it. It causes a sense of concern on the part of educational institutions. Therefore, it is necessary to have a security assessment to conduct a risk-oriented assessment that might occur if an attack is attempted. The Vulnerability Assessment and Penetration Testing (VAPT) method was utilized to conduct a security assessment and test educational institutions’ repository web application. Several vulnerabilities found with the Nessus tool could still be exploited and resulted in findings in legal access rights when the researchers performed a test simulation on the repository web application. This research was used as a report to the educational institution, particularly as a material for the evaluation process to increase its web application security. This research was carried out within the educational institution environment. Hence, it did not fully describe the possibility of actual attacks originating from outside the educational institution environment.
Measurement of AI3, AI4, and DS4 IT Process Maturity Using the Cobit 4.1 Framework at KOMINFO Bantul Goldi Mahardika Muhammad; Chayadi Oktomy Noto Susanto; Aprilia Kurnianti
Emerging Information Science and Technology Vol 1, No 2: May 2020
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.956 KB) | DOI: 10.18196/eist.129

Abstract

This research discusses the condition of information technology at KOMINFO (DISKOMINFO) Bantul governance. This study aims to discover where has KOMINFO applied information technology governance properly. This research focuses only on IT processes. Only the AI3 IT process discussed how to generate and maintain the IT infrastructure. AI4 IT process discussed how to enable and use the IT infrastructure, and the last is the DS4 IT process that discussed how to ensure sustainable services. A questionnaire, an interview with employees of KOMINFO Bantul, and documentation were utilized to collect data. Data processing results were used to determine the maturity level of information technology governance at KOMINFO Bantul. After knowing the maturity level of the IT processes, then it was analyzed to measure the alignment between the TKTI current condition with the TKTI condition equipped with the COBIT framework.