Lesmana, Benedictus Rafael (2024) Analisis Pengujian Keamanan Firewall Pada Sistem X dan Y Di Universitas Z. Undergraduate thesis, Universitas Pembangunan Nasional "Veteran" Jawa Timur.
Text (Cover)
20081010091_Cover.pdf Download (1MB) |
|
Text (BAB I)
2008101001_Bab I.pdf Download (419kB) |
|
Text (BAB II)
20081010091_Bab II.pdf Restricted to Repository staff only until 27 July 2027. Download (534kB) |
|
Text (BAB III)
20081010091_Bab III.pdf Restricted to Repository staff only until 27 July 2027. Download (2MB) |
|
Text (BAB IV)
20081010091_Bab IV.pdf Restricted to Repository staff only until 27 July 2027. Download (1MB) |
|
Text (BAB V)
20081010091_Bab V.pdf Download (401kB) |
|
Text (Daftar Pustaka)
20081010091_Daftar Pustaka.pdf Download (371kB) |
|
Text (Lampiran)
20081010091_Lampiran.pdf Restricted to Repository staff only until 27 July 2027. Download (139kB) |
Abstract
The use of X and Y systems on campus is increasingly being used by both students and educators around campus. With the connection of the system to computer networks and the internet, the opportunity to change or damage data will be wide open, because users of the X and Y systems who are potentially malicious (malicious users) will easily enter the system via computer networks / internet. A firewall is a network security tool that monitors traffic entering and leaving the network and determines whether data packets are acceptable or blocked using special rules. Firewall security testing needs to be done to see how vulnerable the firewalls owned by systems X and Y are. By using Kali Linux to perform penetration testing and nessus as a tool to scan for vulnerabilities, the penetration testing process of a firewall is obtained as well as detailed vulnerability results from the nessus scan. The results obtained after scanning for vulnerabilities are that several vulnerabilities are obtained from both systems X and Y and some information that needs to be considered to maintain security. System X has one high-level vulnerability, five medium-level vulnerabilities, one low-level vulnerability and thirty-five security information. While Y has three medium-level vulnerabilities, one low-level vulnerability and thirty-five security information that needs attention. From the tests conducted, it can be concluded that system Y has better security than system X.
Item Type: | Thesis (Undergraduate) | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Contributors: |
|
||||||||||||
Subjects: | T Technology > T Technology (General) | ||||||||||||
Divisions: | Faculty of Computer Science > Departemen of Informatics | ||||||||||||
Depositing User: | Benedictus Rafael Lesmana | ||||||||||||
Date Deposited: | 30 Jul 2024 06:37 | ||||||||||||
Last Modified: | 30 Jul 2024 06:38 | ||||||||||||
URI: | https://repository.upnjatim.ac.id/id/eprint/27329 |
Actions (login required)
View Item |