PENGUJIAN CELAH KEAMANAN UNTUK MENGETAHUI KERENTANAN KEAMANAN JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) PADA PT. QWE

Rulli Azani Akbar, . (2022) PENGUJIAN CELAH KEAMANAN UNTUK MENGETAHUI KERENTANAN KEAMANAN JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) PADA PT. QWE. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (36kB)
[img] Text
AWAL.pdf

Download (414kB)
[img] Text
BAB I.pdf

Download (131kB)
[img] Text
BAB II.pdf
Restricted to Repository UPNVJ Only

Download (175kB)
[img] Text
BAB III.pdf
Restricted to Repository UPNVJ Only

Download (132kB)
[img] Text
BAB IV.pdf
Restricted to Repository UPNVJ Only

Download (1MB)
[img] Text
BAB V.pdf

Download (51kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (57kB)
[img] Text
RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (128kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (1MB)
[img] Text
HASIL PLAGIARISME.pdf
Restricted to Repository staff only

Download (23kB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (727kB)
[img] Text
BAB III.pdf

Download (132kB)

Abstract

Wireless network security is necessary for the protection and prevention of criminal acts of information theft. This aspect is often ignored by every agency because it assumes that a wireless network is always considered safe because every agency will feel safe if the problem does not interfere with work activities by installing an antivirus or firewall. There are still many institutions that underestimate this. Thus, it is necessary to carry out penetration testing to find out vulnerabilities in wireless networks with the method used by PTES (Penetration Testing Execution Standard) to be used as a standard in analyzing wireless network security systems in finding security holes in an agency in this case, namely the wireless local area network (Wireless Local Area Network). WLAN) at PT. Sehat Tentrem where in this study found vulnerabilities in the form of bypassing, arp spoofing, certificate can not be trusted, and sniffing activities that can be carried out on wireless networks to be exploited.

Item Type: Thesis (Skripsi)
Additional Information: [No.Panggil: 1810511122] [Pembimbing 1: Jayanta] [Pembimbing 2: Henki Bayu Seta] [Penguji 1: Bayu Hananto] [Penguji 2: I Wayan Widi P]
Uncontrolled Keywords: wireless network security, vulnerabilities, penetration testing, penetration testing execution standards, sniffing, arp spoofing.
Subjects: T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Fakultas Ilmu Komputer > Program Studi Informatika (S1)
Depositing User: Rulli Azani Akbar
Date Deposited: 16 Aug 2022 02:34
Last Modified: 16 Aug 2022 02:34
URI: http://repository.upnvj.ac.id/id/eprint/19768

Actions (login required)

View Item View Item