Analisis Pengujian Keamanan Firewall Pada Sistem X dan Y Di Universitas Z

Lesmana, Benedictus Rafael (2024) Analisis Pengujian Keamanan Firewall Pada Sistem X dan Y Di Universitas Z. Undergraduate thesis, Universitas Pembangunan Nasional "Veteran" Jawa Timur.

[img] Text (Cover)
20081010091_Cover.pdf

Download (1MB)
[img] Text (BAB I)
2008101001_Bab I.pdf

Download (419kB)
[img] Text (BAB II)
20081010091_Bab II.pdf
Restricted to Repository staff only until 27 July 2027.

Download (534kB)
[img] Text (BAB III)
20081010091_Bab III.pdf
Restricted to Repository staff only until 27 July 2027.

Download (2MB)
[img] Text (BAB IV)
20081010091_Bab IV.pdf
Restricted to Repository staff only until 27 July 2027.

Download (1MB)
[img] Text (BAB V)
20081010091_Bab V.pdf

Download (401kB)
[img] Text (Daftar Pustaka)
20081010091_Daftar Pustaka.pdf

Download (371kB)
[img] Text (Lampiran)
20081010091_Lampiran.pdf
Restricted to Repository staff only until 27 July 2027.

Download (139kB)

Abstract

The use of X and Y systems on campus is increasingly being used by both students and educators around campus. With the connection of the system to computer networks and the internet, the opportunity to change or damage data will be wide open, because users of the X and Y systems who are potentially malicious (malicious users) will easily enter the system via computer networks / internet. A firewall is a network security tool that monitors traffic entering and leaving the network and determines whether data packets are acceptable or blocked using special rules. Firewall security testing needs to be done to see how vulnerable the firewalls owned by systems X and Y are. By using Kali Linux to perform penetration testing and nessus as a tool to scan for vulnerabilities, the penetration testing process of a firewall is obtained as well as detailed vulnerability results from the nessus scan. The results obtained after scanning for vulnerabilities are that several vulnerabilities are obtained from both systems X and Y and some information that needs to be considered to maintain security. System X has one high-level vulnerability, five medium-level vulnerabilities, one low-level vulnerability and thirty-five security information. While Y has three medium-level vulnerabilities, one low-level vulnerability and thirty-five security information that needs attention. From the tests conducted, it can be concluded that system Y has better security than system X.

Item Type: Thesis (Undergraduate)
Contributors:
ContributionContributorsNIDN/NIDKEmail
Thesis advisorJunaidi, AchmadNIDN0710117803achmadjunaidi.if@upnjatim.ac.id
Thesis advisorSihanano, Andreas NugrohoNIDN0012049005andreas.nugroho.jarkom@upnjatim.ac.id
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Computer Science > Departemen of Informatics
Depositing User: Benedictus Rafael Lesmana
Date Deposited: 30 Jul 2024 06:37
Last Modified: 30 Jul 2024 06:38
URI: https://repository.upnjatim.ac.id/id/eprint/27329

Actions (login required)

View Item View Item