Sofia Naning Hertina
Telecommunication Engineering Study Program Telkom University Bandung, Indonesia

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Security Information and Event Management (SIEM) to identify cyberattacks on OWASP standard web Tia Rahmawati*; Nyoman Bogi Aditya Karna; Sofia Naning Hertina
Riwayat: Educational Journal of History and Humanities Vol 6, No 3 (2023): Social, Political, and Economic History
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24815/jr.v6i3.33653

Abstract

Cybercriminals usually attack an information security system that contains important and confidential data. Usually frequent attacks are carried out against web applications. Many web application developers  do not pay attention to the security side  of web applications  so that many are exploited by hackers. Security Information and Event Management (SIEM) used will monitor and collect all log reports. SIEM will process the logs to analyze security. All data obtained has been presented in visual form such as graphs. Then the data will be sent to the plugin so that users can more easily access the log report.
Security Information and Event Management (SIEM) to identify cyberattacks on OWASP standard web Tia Rahmawati*; Nyoman Bogi Aditya Karna; Sofia Naning Hertina
Riwayat: Educational Journal of History and Humanities Vol 6, No 3 (2023): Social, Political, and Economic History
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24815/jr.v6i3.33653

Abstract

Cybercriminals usually attack an information security system that contains important and confidential data. Usually frequent attacks are carried out against web applications. Many web application developers  do not pay attention to the security side  of web applications  so that many are exploited by hackers. Security Information and Event Management (SIEM) used will monitor and collect all log reports. SIEM will process the logs to analyze security. All data obtained has been presented in visual form such as graphs. Then the data will be sent to the plugin so that users can more easily access the log report.