PENETRATION TESTING USING OWASP TOP 10 ON DOMAIN XYZ.AC.ID
Main Article Content
Abstract
With the increasing number of internet service users, more and more information can be obtained from the internet. Information itself is important in this digital era for organizations, businesses and individuals. More and more individuals provide information about them on the internet, making their privacy less and more recently, many individuals are starting to become aware of how the information they provide is used and more and more organizations are starting to pay attention to information security risks that can have a negative impact and material loss on the process. business, image of the organization, customer trust and affect relationships with customers or their business partners.
In an effort to maintain data and information security, there is a method called penetration testing. Penetration testing is a series of methods used to test the security of a system. The penetration testing process involves an analysis of a system to look for potential security vulnerabilities such as system configuration errors, defects in software and hardware development and weaknesses in the logic of a process.
In an effort to maintain data and information security, there is a method called penetration testing. Penetration testing is a series of methods used to test the security of a system. The penetration testing process involves an analysis of a system to look for potential security vulnerabilities such as system configuration errors, defects in software and hardware development and weaknesses in the logic of a process.
Downloads
Download data is not yet available.
Article Details
How to Cite
Dharmawan, A. (2022). PENETRATION TESTING USING OWASP TOP 10 ON DOMAIN XYZ.AC.ID. Electro Luceat, 8(1), 100-108. https://doi.org/10.32531/jelekn.v8i1.455
Section
Articles

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
[1] APJII, “Profil Internet Indonesia 2022,” 2022.
[2] A. Wibowo, Keamanan Sistem Jaringan Komputer. Semarang: Yayasan Prima Agus Teknik, 2021.
[3] A. G. Bacudio, “An Overview Of Penetration Testing,” Int. J. Netw. Secur. Its Appl., vol. 3, 2011.
[4] T. O. Foundation, OWASP Top 10 - 2017. .
[5] I. Syarifudin, “Pentesting Dan Analisis Keamanan Web PAUD DIKMAS,” no. Politeknik Negeri Jakarta, 2018.
[6] R. Pangalila, “Penetration Testing Server Sistem Informasi Manajemen dan Website Universits Kristen Petra,” INFRA, vol. 3, no. 2, 2015.
[7] A. Hasan, “Web Application Safety by Penetration Testing,” 2018.
[8] M. Meucci, Release Testing Guide OWASP.
[2] A. Wibowo, Keamanan Sistem Jaringan Komputer. Semarang: Yayasan Prima Agus Teknik, 2021.
[3] A. G. Bacudio, “An Overview Of Penetration Testing,” Int. J. Netw. Secur. Its Appl., vol. 3, 2011.
[4] T. O. Foundation, OWASP Top 10 - 2017. .
[5] I. Syarifudin, “Pentesting Dan Analisis Keamanan Web PAUD DIKMAS,” no. Politeknik Negeri Jakarta, 2018.
[6] R. Pangalila, “Penetration Testing Server Sistem Informasi Manajemen dan Website Universits Kristen Petra,” INFRA, vol. 3, no. 2, 2015.
[7] A. Hasan, “Web Application Safety by Penetration Testing,” 2018.
[8] M. Meucci, Release Testing Guide OWASP.