Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi)

Analysis Vulnerability Website Baleomolcreative dengan Metode Penetration Testing Execution Standard & Vulnerability Assessment Pada Http Response Header Field Kurniawan, Henokh; Christianto, Erwien
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 8 No 3 (2024): JULY-SEPTEMBER 2024
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v8i3.2202

Abstract

This research will analyze web security and how to find out whether there is a vulnerability or what could be called a vulnerability to enter gaps in the Baleomolcreative web, making the web unsafe. In analyzing whether there are vulnerabilities, the Penetration Testing Execution Standard and Vulnerability Assessment methods are used to determine whether there are gaps or vulnerabilities in the Baleomolcreative website that can be exploited by external parties. This method uses tools such as Owasp ZAP, Nikto, and Nmap which can be used to perform vulnerability scanning on a website. In this research, we succeeded in identifying 3 levels of vulnerability on the Baleomolcreative website, namely medium, low, and informational, with a total of 18 alerts generated from notifications on Owasp Zap. The scanning process includes vulnerability testing such as Content Security Policy, Anti-clickjacking Header, Dangerous JS Functions, Permissions Policy, and others.
Pengaruh Ping of Death pada Perangkat dengan Sistem Keamanan Jaringan NIDS dan HIPS Indrayana, Faisal Hakim; Christianto, Erwien
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 9 No 1 (2025): JANUARI-MARET 2025
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v9i1.3183

Abstract

The security system on the network was created virtually via OpenvSwitch using the NIDS and HIDS methods designed using SNORT. The results of the Ping of Death attack cause the CPU performance to be very high, so that the computer works optimally due to the large number of packets going to the Server computer.