Rulli Azani Akbar, . (2022) PENGUJIAN CELAH KEAMANAN UNTUK MENGETAHUI KERENTANAN KEAMANAN JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) PADA PT. QWE. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
Text
ABSTRAK.pdf Download (36kB) |
|
Text
AWAL.pdf Download (414kB) |
|
Text
BAB I.pdf Download (131kB) |
|
Text
BAB II.pdf Restricted to Repository UPNVJ Only Download (175kB) |
|
Text
BAB III.pdf Restricted to Repository UPNVJ Only Download (132kB) |
|
Text
BAB IV.pdf Restricted to Repository UPNVJ Only Download (1MB) |
|
Text
BAB V.pdf Download (51kB) |
|
Text
DAFTAR PUSTAKA.pdf Download (57kB) |
|
Text
RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (128kB) |
|
Text
LAMPIRAN.pdf Restricted to Repository UPNVJ Only Download (1MB) |
|
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (23kB) |
|
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (727kB) |
|
Text
BAB III.pdf Download (132kB) |
Abstract
Wireless network security is necessary for the protection and prevention of criminal acts of information theft. This aspect is often ignored by every agency because it assumes that a wireless network is always considered safe because every agency will feel safe if the problem does not interfere with work activities by installing an antivirus or firewall. There are still many institutions that underestimate this. Thus, it is necessary to carry out penetration testing to find out vulnerabilities in wireless networks with the method used by PTES (Penetration Testing Execution Standard) to be used as a standard in analyzing wireless network security systems in finding security holes in an agency in this case, namely the wireless local area network (Wireless Local Area Network). WLAN) at PT. Sehat Tentrem where in this study found vulnerabilities in the form of bypassing, arp spoofing, certificate can not be trusted, and sniffing activities that can be carried out on wireless networks to be exploited.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | [No.Panggil: 1810511122] [Pembimbing 1: Jayanta] [Pembimbing 2: Henki Bayu Seta] [Penguji 1: Bayu Hananto] [Penguji 2: I Wayan Widi P] |
Uncontrolled Keywords: | wireless network security, vulnerabilities, penetration testing, penetration testing execution standards, sniffing, arp spoofing. |
Subjects: | T Technology > TA Engineering (General). Civil engineering (General) |
Divisions: | Fakultas Ilmu Komputer > Program Studi Informatika (S1) |
Depositing User: | Rulli Azani Akbar |
Date Deposited: | 16 Aug 2022 02:34 |
Last Modified: | 16 Aug 2022 02:34 |
URI: | http://repository.upnvj.ac.id/id/eprint/19768 |
Actions (login required)
View Item |