Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : ILKOM Jurnal Ilmiah

PEMERINGKATAN RISIKO KEAMANAN SISTEM JARINGAN KOMPUTER POLITEKNIK KOTA MALANG MENGGUNAKAN CVSS DAN FMEA Retna Mulya, Betta Wahyu; Tarigan, Avinanta
ILKOM Jurnal Ilmiah Vol 10, No 2 (2018)
Publisher : Program Studi Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (652.184 KB)

Abstract

The vulnerability of a computer network system is a weakness, lack or hole in the system, which can be exploited by attackers to carry out an attack that may endanger the confidentiality, integrity or availability of a system. The filling process requires a security vulnerability analysis according to the severity to determine the priority scales of handling. The analysis used in determining priority scales of handling is the combination of CVSS and FMEA-based analysis method. The analysis result from both methods shows that the numbers of risk priority and vulnerability become a benchmark in risk prioritizing and mitigation the risk to Politeknik Kota Malang party, with the priority order: ‘Singa’, ‘Sierra’, ‘Dino’, and ‘Leopard’. The priority scales show that the vulnerability levels, that must be handled, have number range between 40% up to 60%. The combination of CVSS and FMEA methods can determine the handling level based on the potential impacts caused by the vulnerability in computer network system of Politeknik Kota Malang.
PEMERINGKATAN RISIKO KEAMANAN SISTEM JARINGAN KOMPUTER POLITEKNIK KOTA MALANG MENGGUNAKAN CVSS DAN FMEA Betta Wahyu Retna Mulya; Avinanta Tarigan
ILKOM Jurnal Ilmiah Vol 10, No 2 (2018)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v10i2.311.190-200

Abstract

The vulnerability of a computer network system is a weakness, lack or hole in the system, which can be exploited by attackers to carry out an attack that may endanger the confidentiality, integrity or availability of a system. The filling process requires a security vulnerability analysis according to the severity to determine the priority scales of handling. The analysis used in determining priority scales of handling is the combination of CVSS and FMEA-based analysis method. The analysis result from both methods shows that the numbers of risk priority and vulnerability become a benchmark in risk prioritizing and mitigation the risk to Politeknik Kota Malang party, with the priority order: ‘Singa’, ‘Sierra’, ‘Dino’, and ‘Leopard’. The priority scales show that the vulnerability levels, that must be handled, have number range between 40% up to 60%. The combination of CVSS and FMEA methods can determine the handling level based on the potential impacts caused by the vulnerability in computer network system of Politeknik Kota Malang.