Program Studi Sistem Komputer, Universitas Diponegoro, Indonesia
BibTex Citation Data :
@article{JTSISKOM12651, author = {Hilal Afrih Juhad and R. Rizal Isnanto and Eko Didik Widianto}, title = {Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {4}, number = {3}, year = {2016}, keywords = {security; web application; sql injection; xss; acunetix;}, abstract = {The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted channels lead to the exposure of sensitive data users. Objectives of this research is to perform an audit and analysis of the security aspects against the Her-registration Colege Students Online Application of Diponegoro University. Audit and security analysis is prevention step so that the vulnerabilities found not to be a entrances to the system hackers. The results of this research are a security audit report that contains the vulnerability Her-registration College Students Online Application of Diponegoro University. The audit report will be used as a reference for application developers Her-registration Colege Students Online Application of Diponegoro University to improve the system.}, issn = {2338-0403}, pages = {479--484} doi = {10.14710/jtsiskom.4.3.2016.479-484}, url = {https://jtsiskom.undip.ac.id/article/view/12651} }
Refworks Citation Data :
Note: This article has supplementary file(s).
Article Metrics:
Last update:
Evaluation and Recommendations for Improvements to the Security and Speed of the ITS RFID Gate System
Last update: 2024-11-05 04:24:26
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.