Alia Reviana Samosir, . (2025) ANALISIS KEAMANAN WEBSITE SIAKAD UPN “VETERAN” JAKARTA MENGGUNAKAN METODE VULNERABILITY ASSESSMENT BERDASARKAN OWASP TOP TEN. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
![]() |
Text
ABSTRAK.pdf Download (264kB) |
![]() |
Text
AWAL.pdf Download (1MB) |
![]() |
Text
BAB 1.pdf Restricted to Repository UPNVJ Only Download (314kB) |
![]() |
Text
BAB 2.pdf Restricted to Repository UPNVJ Only Download (575kB) |
![]() |
Text
BAB 3.pdf Restricted to Repository UPNVJ Only Download (421kB) |
![]() |
Text
BAB 4.pdf Restricted to Repository UPNVJ Only Download (1MB) |
![]() |
Text
BAB 5.pdf Download (307kB) |
![]() |
Text
DAFTAR PUSTAKA.pdf Download (287kB) |
![]() |
Text
RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (132kB) |
![]() |
Text
LAMPIRAN.pdf Restricted to Repository UPNVJ Only Download (3MB) |
![]() |
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (15MB) |
![]() |
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (164kB) |
Abstract
The digital transformation within higher education institutions presents new challenges in information security. The Academic Information System (SIAKAD) website of UPN “Veteran” Jakarta, as a central hub for sensitive academic data, is a potential target for cyberattacks. This study aims to analyze the security of the SIAKAD website using the vulnerability assessment method based on the OWASP Top Ten 2021 framework. The assessment was conducted using OWASP ZAP and six additional tools, namely Nmap, Elastic Stack, Git Secrets, Gitleaks, OWASP Dependency-Check, and OWASP Threat Dragon. The findings revealed vulnerabilities in the categories of Broken Access Control, Injection, Security Misconfiguration, Identification and Authentication Failures, Server-Side Request Forgery (SSRF), Cryptographic Failures, Software and Data Integrity Failures, and the use of vulnerable and outdated components. Certain vulnerabilities could not be fully analyzed due to limitations in access to system logs and architecture documentation. This research recommends the integration of security testing into the SDLC and the availability of comprehensive system documentation to support effective threat modeling.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | No. Panggil: 2110314056 Pembimbing: Fajar Rahayu Penguji 1: Muhamad Alif Razi Penguji 2: Achmad Zuchriadi P. |
Uncontrolled Keywords: | siakad, owasp top ten, vulnerability assessment, information security, website |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Fakultas Teknik > Program Studi Teknik Elektro (S1) |
Depositing User: | ALIA REVIANA SAMOSIR |
Date Deposited: | 07 Aug 2025 02:34 |
Last Modified: | 07 Aug 2025 02:34 |
URI: | http://repository.upnvj.ac.id/id/eprint/38297 |
Actions (login required)
![]() |
View Item |