skip to main content

Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro

Program Studi Sistem Komputer, Universitas Diponegoro, Indonesia

Received: 22 Jul 2016; Published: 21 Aug 2016.
Open Access Copyright (c) 2016 Jurnal Teknologi dan Sistem Komputer under http://creativecommons.org/licenses/by-sa/4.0.

Citation Format:
Abstract
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted channels lead to the exposure of sensitive data users. Objectives of this research is to perform an audit and analysis of the security aspects against the Her-registration Colege Students Online Application of Diponegoro University. Audit and security analysis is prevention step so that the vulnerabilities found not to be a entrances to the system hackers. The results of this research are a security audit report that contains the vulnerability Her-registration College Students Online Application of Diponegoro University. The audit report will be used as a reference for application developers Her-registration Colege Students Online Application of Diponegoro University to improve the system.

Note: This article has supplementary file(s).

Fulltext View|Download |  Research Results
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
Subject security; web application; sql injection; xss; acunetix;
Type Research Results
  Download (110KB)    Indexing metadata
Email colleagues
Keywords: security; web application; sql injection; xss; acunetix;

Article Metrics:

  1. Acunetix, "Acunetix Web Vulnerability Scanner," 2005
  2. M. Syafrizal, "ISO 17799: Standar Sistem Manajemen Keamanan Informasi"
  3. FIRST, Common Vulnerability Scoring System v3.0: User Guide, 2014
  4. A. Singh, Metasploit Penetration Testing Cookbook, Birmingham: Packt Publishinf, 2012
  5. B. Rahardjo, “Keamanan Sistem Informasi Berbasis Internet,” PT Insan Komunikasi Indonesia, Bandung, 2002
  6. ISO, "Information technology -- Security techniques -- Information security management systems -- Requirements," ISO Organization, 2005
  7. ---, Registrasi Online Mahasiswa, http://reg- online.undip.ac.id/index.php, 19 Oktober 2015
  8. ---, Penetration Testing Overview, http://www.coresecurity.com/penetration-testing- overview, 28 Oktober 2015
  9. ---, Mitre. About CWE, http://cwe.mitre.org/about/index.html, 2 Februari 2016
  10. ---, Mitre. Common Vulnerability and Exposures, https://cve.mitre.org/about/index.html, 8 Februari 2016

Last update:

  1. Evaluation and Recommendations for Improvements to the Security and Speed of the ITS RFID Gate System

    Hatma Suryotrisongko, Ridho Rahman Hariadi, Muh Reza Aisyi, Khakim Ghozali, Rizka Wakhidatus Sholikah. 2023 International Seminar on Intelligent Technology and Its Applications (ISITIA), 2023. doi: 10.1109/ISITIA59021.2023.10220973

Last update: 2024-11-05 04:24:26

No citation recorded.