Nazruddin Safaat H
Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis Manajemen Risiko TI Menggunakan Framework COBIT 5 Domain APO12 dan EDM03 Al Fajri; Novriyanto; Nazruddin Safaat H; Muhammad Affandes
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 4 No. 3 (2023): Desember 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v4i3.1396

Abstract

PT Perkebunan Nusantara V Pekanbaru is a state-owned enterprise or BUMN, operating in the field of oil palm and rubber plantations located in the city of Pekanbaru, Riau Province, PTPN V has utilized information technology in running the organization and business processes therein, there are risks- risks that will disrupt the application of information technology and even be detrimental to the company, such as the risk of technical specification errors, the risk of errors in self-estimated price calculations (HPS), the risk of errors in the Work Plan and Requirements (RKS) documents and the risk of server failure or network failure. Risk management is an effort for PTPN V as the basis for infrastructure in good risk management governance, the research was carried out with the aim of being able to carry out information technology risk management analysis and provide recommendations to harmonize risk management in information technology processes, using the COBIT 5 framework and appropriate domains, namely the APO12 and EDM03 domains, The data needed in this research is in the form of secondary data and primary data, in the EDM03 domain it is known that the capability value is 4.56, which means the company has reached capability level 5 (optimizing process), in the APO12 domain it is known that the capability value is 4.43, which means The company has achieved capability level 4 (predictable process). Recommendations are given for processes in the APO12 domain as the domain used for risk management, while for the EDM03 domain process as the domain for risk optimization in the procurement and IT sections of PTPN V Pekanbaru
Penetration Testing Information System Security Assessment Framework (ISSAF) Zul Azis Khan; Nazruddin Safaat H; Muhammad Irsyad; Teddie Darmizal
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 4 No. 3 (2023): Desember 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v4i3.1507

Abstract

The development of information technology has had a positive impact on various fields, including the field of web technology. Information technology has now become a necessity in improving the performance of organizations and educational institutions in achieving goals. Websites are a tool for institutions to promote to the general public. The https://kekampus.umri.ac.id/ website is an information system owned by the Umri campus which is used for PKKMB and Umri Masters, as a website that functions in storing data, it is necessary to increase security to prevent hacker attacks, there are several methods used, one of which is The ISSAF framework is a penetration testing standard used to test the resilience of websites. The aim of this research is to determine the security gaps of the https://kekampus.umri.ac.id/ website by using the penetration testing method with the ISSAF Framework. The ISSAF framework includes nine test assessments which include Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Gaining Access and Privilege Escalation, Enumerating Further, Compromising Remote Users/Sites, Maintaining Access, and Covering Tracks. In this study, examiners only carried out four stages of the nine stages in the ISSAF framework. This research uses a black box strategy where testers are only given access to the target website domain. This research was conducted because of the problems that often occur in gacor slots in one of UMRI's information systems. The results of the analysis carried out found that there were several vulnerabilities that were lacking on the website, namely SQL injection attacks, cross JavaScript, cookie secure flags on the https://kekampus.umri.ac.id/ website. and provide suggestions or recommendations to improve security on the https://kekampus.umri.ac.id/ website.