Web Server Security Analysis Using The OWASP Mantra Method Web Server Security Analysis Using The OWASP Mantra Method
Main Article Content
Abstract
Higher Education has been using web-based academic information system, for all academic administration process in this academic system such as study plan, academic transcipt, lecturers and Curriculum and student data. So that required maintenance in database and system management whith well-maintained and scheduled. It is necessary to apply the system to determine the level of vulnerability in order to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one of the methods for testing the web-based applications released by owasp.org. Using OWASP may indicate that authentication management, authorization and session management.The STMIK Jakarta website often has problems on the web and the loss of some important data that interferes with lectures. At the end of 2016, around September when preparing for the first semester of the Study Plan, the website experienced programmed data loss, consequently the academic system was disrupted. The STMIK Jakarta has used a web-based academic information system, for all academic administrative processes such as study plans, academic transcripts, lecturers, curriculum and student data.This system requires data base and system management. It is important to implement a security system to determine the level of vulnerability to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one method for testing web-based applications released by owasp.org. The results of the research have been carried out with the results reaching around 90% management authentication, authorization, and session management not being implemented properly.
Downloads
Article Details
[2] Allsopp, W. (2009). Unauthorised Access: Physical Penetration Testing for it Security Teams. Assosiasi Penyelenggara Jasa Internet Indoneisa. (2012). Retrieved May 17, 2014, from http://www.apjii.or.id/v2/read/page/hal aman-data/9/statistik.html
[3] Chow, E. (2011). Ethical Hacking & Penetration Testing. Friends, N. N. (2009). Penetration Testing A Roadmap to Network. J Thomson, F. (2013, Desember). Akamai.Retrieved Mei 19, 2014, from http://www.akamai.com/dl/akamai/ak a mai-soti- q413.pdf?WT.mc_id=soti_Q413
[4] Resti Journal (Systems Engineering and Information Technology) ( 2017 ) Security of Data Package Traffic on Ubuntu Using the Attack Centric Method. http://jurnal.iaii.or.id. ( 2017 )
[5] Jurnal Ilmiah Nero Volume 3 1 (2015)Penerapan Metode ISSAF dan OWASP versi 4 Untuk Uji Kerentanan Web Server
[6] Ritzkal, Manajemen Jaringan Untuk Pemula, Bogor:UIKA Press,2018.
[7] Ritzkal, Keamanan Jaringan Cyber, Bogor:UIKA PRESS,2019.
[8] Ritzkal R, Goeritno A, Hendrawan AHH. 2016. Implementasi ISO/IEC 27001:2013 Untuk Sistem Manajemen Keamanan Informasi (SMKI) Pada Fakultas Teknik Uika-Bogor. Seminar Nasional Sains dan Teknologi 2016.
[9] Intan Kamilah, Ritzkal R, Ade Hendri Hendrawan. 2019. A nalisis Keamanan Vulnerability p ada Server Absensi Kehadiran L aboratorium di Program Studi Teknik Informatika.