Logo

Vulnerability Research and Mapping of Campus Network

Andjarwirawan, Justinus and Noertjahyana, Agustinus and Angi, Devi C. (2016) Vulnerability Research and Mapping of Campus Network. International Journal of Signal Processing Systems, 4 (3). pp. 204-208. ISSN 2315-4535

[img] PDF
Download (653Kb)

    Abstract

    Vulnerability of computer systems in campus- wide network has been an issue for years, since networks were open to allow anonymous access. It will take many studies of computer security to protect. A vulnerability research and mapping of a network is a step to address the issue, as well as minimizing security breach in the future. Evaluation of a network security can be done by many tools available and also guidelines based on CEH (Certified Ethical Hacker) module and Acunetix for web specific security. These test tools were deployed several times on every target, scanning open ports and sending test scripts to find vulnerabilities. With CEH and Acunetix guidelines, the evaluation shows many common security weaknesses such as Cross-Site Scripting, SQL injection and DDoS vulnerabilities and therefor this evaluation leads to security recommendations based on the weaknesses and security holes found.

    Item Type: Article
    Uncontrolled Keywords: vulnerability, penetration testing, vulnerability scanning, certified ethical hacker, acunetix
    Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
    Divisions: Faculty of Industrial Technology > Informatics Engineering Department
    Depositing User: Admin
    Date Deposited: 23 Sep 2015 16:35
    Last Modified: 17 Jul 2019 11:23
    URI: http://repository.petra.ac.id/id/eprint/17152

    Actions (login required)

    View Item