Vulnerability Research and Mapping of Campus Network

Main Authors: Andjarwirawan, Justinus, Noertjahyana, Agustinus, Angi, Devi C.
Format: Article PeerReviewed application/pdf
Terbitan: , 2016
Subjects:
Online Access: https://repository.petra.ac.id/17152/1/Publikasi1_98031_2336.pdf
https://repository.petra.ac.id/17152/
Daftar Isi:
  • Vulnerability of computer systems in campus- wide network has been an issue for years, since networks were open to allow anonymous access. It will take many studies of computer security to protect. A vulnerability research and mapping of a network is a step to address the issue, as well as minimizing security breach in the future. Evaluation of a network security can be done by many tools available and also guidelines based on CEH (Certified Ethical Hacker) module and Acunetix for web specific security. These test tools were deployed several times on every target, scanning open ports and sending test scripts to find vulnerabilities. With CEH and Acunetix guidelines, the evaluation shows many common security weaknesses such as Cross-Site Scripting, SQL injection and DDoS vulnerabilities and therefor this evaluation leads to security recommendations based on the weaknesses and security holes found.