ANALISIS KEAMANAN WEBSITE SIAKAD UPN “VETERAN” JAKARTA MENGGUNAKAN METODE VULNERABILITY ASSESSMENT BERDASARKAN OWASP TOP TEN

Alia Reviana Samosir, . (2025) ANALISIS KEAMANAN WEBSITE SIAKAD UPN “VETERAN” JAKARTA MENGGUNAKAN METODE VULNERABILITY ASSESSMENT BERDASARKAN OWASP TOP TEN. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (264kB)
[img] Text
AWAL.pdf

Download (1MB)
[img] Text
BAB 1.pdf
Restricted to Repository UPNVJ Only

Download (314kB)
[img] Text
BAB 2.pdf
Restricted to Repository UPNVJ Only

Download (575kB)
[img] Text
BAB 3.pdf
Restricted to Repository UPNVJ Only

Download (421kB)
[img] Text
BAB 4.pdf
Restricted to Repository UPNVJ Only

Download (1MB)
[img] Text
BAB 5.pdf

Download (307kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (287kB)
[img] Text
RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (132kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (3MB)
[img] Text
HASIL PLAGIARISME.pdf
Restricted to Repository staff only

Download (15MB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (164kB)

Abstract

The digital transformation within higher education institutions presents new challenges in information security. The Academic Information System (SIAKAD) website of UPN “Veteran” Jakarta, as a central hub for sensitive academic data, is a potential target for cyberattacks. This study aims to analyze the security of the SIAKAD website using the vulnerability assessment method based on the OWASP Top Ten 2021 framework. The assessment was conducted using OWASP ZAP and six additional tools, namely Nmap, Elastic Stack, Git Secrets, Gitleaks, OWASP Dependency-Check, and OWASP Threat Dragon. The findings revealed vulnerabilities in the categories of Broken Access Control, Injection, Security Misconfiguration, Identification and Authentication Failures, Server-Side Request Forgery (SSRF), Cryptographic Failures, Software and Data Integrity Failures, and the use of vulnerable and outdated components. Certain vulnerabilities could not be fully analyzed due to limitations in access to system logs and architecture documentation. This research recommends the integration of security testing into the SDLC and the availability of comprehensive system documentation to support effective threat modeling.

Item Type: Thesis (Skripsi)
Additional Information: No. Panggil: 2110314056 Pembimbing: Fajar Rahayu Penguji 1: Muhamad Alif Razi Penguji 2: Achmad Zuchriadi P.
Uncontrolled Keywords: siakad, owasp top ten, vulnerability assessment, information security, website
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Fakultas Teknik > Program Studi Teknik Elektro (S1)
Depositing User: ALIA REVIANA SAMOSIR
Date Deposited: 07 Aug 2025 02:34
Last Modified: 07 Aug 2025 02:34
URI: http://repository.upnvj.ac.id/id/eprint/38297

Actions (login required)

View Item View Item