Logo

Vulnerability Research and Mapping of Campus Network

Andjarwirawan, Justinus and Noertjahyana, Agustinus and Angi, Devi C. (2016) Vulnerability Research and Mapping of Campus Network. International Journal of Signal Processing Systems, 4 (3). pp. 204-208. ISSN 2315-4535

[img] PDF
Download (653Kb)
    [img]
    Preview
    PDF (Paper - Agustinus)
    Download (1036Kb) | Preview
      [img]
      Preview
      PDF (cek plagiasi - Agustinus)
      Download (701Kb) | Preview

        Abstract

        Vulnerability of computer systems in campus- wide network has been an issue for years, since networks were open to allow anonymous access. It will take many studies of computer security to protect. A vulnerability research and mapping of a network is a step to address the issue, as well as minimizing security breach in the future. Evaluation of a network security can be done by many tools available and also guidelines based on CEH (Certified Ethical Hacker) module and Acunetix for web specific security. These test tools were deployed several times on every target, scanning open ports and sending test scripts to find vulnerabilities. With CEH and Acunetix guidelines, the evaluation shows many common security weaknesses such as Cross-Site Scripting, SQL injection and DDoS vulnerabilities and therefor this evaluation leads to security recommendations based on the weaknesses and security holes found.

        Item Type: Article
        Uncontrolled Keywords: vulnerability, penetration testing, vulnerability scanning, certified ethical hacker, acunetix
        Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
        Divisions: Faculty of Industrial Technology > Informatics Engineering Department
        Depositing User: Admin
        Date Deposited: 23 Sep 2015 16:35
        Last Modified: 20 Jun 2023 16:24
        URI: https://repository.petra.ac.id/id/eprint/17152

        Actions (login required)

        View Item