Authors can submit their research articles to editor@ijsea.com  

Processing Charges

IJSEA is index with

 

 

 

 

 

 

 

IJSEA Archive (Volume 4, Issue 4)

International Journal of Science and Engineering Applications (IJSEA)  (Volume 4, Issue 4 July-August 2015)

Information Management System and Website Server Penetration Testing Case Study University

Agustinus Noertjahyana,Richard Pangalila,Justinus Andjarwirawan

10.7753/IJSEA0404.1003




 PDF 



Keywords: Safety, Data, Evaluation, Penetration Testing, Security

Abstract References BibText


        A developing organization need information technology in its operational activity. However what is often considered is how to ensure that data saved in server is safe from unauthorized parties. Therefore, this thesis reviews how a person who is appointed as a security analyst do penetration testing in a system with variety tools given and how the report can be understood from by people from managers to programmers. Besides giving the how-to knowledge, this thesis also reviews how secure is the organization under review in keeping their data safe from other parties who are not supposed to get access to important operational activity data.


[1] Hariwibowo, Dody. 2011. Keamanan Komputer | Pengantar Teknologi Informasi. 02 06. Accessed 10 21, 2014. http://dhoddycreater.wordpress.com/makalah-pti/keamanan-komputer.
[2] Barnatt, Christopher. 2012. ExplainingComputer.com: Computer Security. 09 13. Accessed 10 20, 2014. http://explainingcomputer.com/security.html.
[3] EC-Council. 2012. Certified Ethical Hacker v8 : Module 20 Penetration Testing. Amerika: EC-Council.
[4] EC-Council. 2012. Certified Ethical Hacker v8 : Module 12 Hacking Webservers. Amerika: EC-Council.
[5] Internet Corporation for Assigned Names and Numbers. n.d. WHOIS Primer | ICANN WHOIS. http://whois.icann.org/en/primer.
[6] Computer Hope. n.d. Linux and Unix nslookup command help and examples. http://www.computerhope.com/unix/unslooku.htm.
[7] Gibson, Steve. 2003. GRC | ID Serve - Internet Server Identification Utility. Oct 06. https://www.grc.com/id/idserve.htm.
[8] OpenVAS. 2015. OpenVAS - About OpenVAS Software. http://www.openvas.org/software.html.
[9] Acunetix. 2015. Web Application Security with Acunetix Web Vulnerability Scanner. https://www.acunetix.com/vulnerability-scanner/.


@article{Agustinus04041003,
title = "Information Management System and Website Server Penetration Testing Case Study University ",
journal = "International Journal of Science and Engineering Applications (IJSEA)",
volume = "4",
number = "4",
pages = "169 - 173",
year = "2015",
author = " Agustinus Noertjahyana,Richard Pangalila,Justinus Andjarwirawan ",
}