Network Security Assessment Using Internal Network Penetration Testing Methodology
The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2018-10-01
|
Series: | JOIV: International Journal on Informatics Visualization |
Subjects: | |
Online Access: | http://joiv.org/index.php/joiv/article/view/190 |
_version_ | 1818505711173238784 |
---|---|
author | Deni Satria Alde Alanda Aldo Erianda Deddy Prayama |
author_facet | Deni Satria Alde Alanda Aldo Erianda Deddy Prayama |
author_sort | Deni Satria |
collection | DOAJ |
description | The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked. |
first_indexed | 2024-12-10T21:54:40Z |
format | Article |
id | doaj.art-555f2abd7d8f40aab97d988e664cfaa1 |
institution | Directory Open Access Journal |
issn | 2549-9610 2549-9904 |
language | English |
last_indexed | 2024-12-10T21:54:40Z |
publishDate | 2018-10-01 |
publisher | Politeknik Negeri Padang |
record_format | Article |
series | JOIV: International Journal on Informatics Visualization |
spelling | doaj.art-555f2abd7d8f40aab97d988e664cfaa12022-12-22T01:32:05ZengPoliteknik Negeri PadangJOIV: International Journal on Informatics Visualization2549-96102549-99042018-10-0124-236036510.30630/joiv.2.4-2.190127Network Security Assessment Using Internal Network Penetration Testing MethodologyDeni Satria0Alde Alanda1Aldo Erianda2Deddy Prayama3Politeknik Negeri Padang, IndonesiaPoliteknik Negeri Padang, IndonesiaPoliteknik Negeri Padang, IndonesiaPoliteknik Negeri Padang, IndonesiaThe development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.http://joiv.org/index.php/joiv/article/view/190penetration testingnetwork securityvulnerabilitynetwork |
spellingShingle | Deni Satria Alde Alanda Aldo Erianda Deddy Prayama Network Security Assessment Using Internal Network Penetration Testing Methodology JOIV: International Journal on Informatics Visualization penetration testing network security vulnerability network |
title | Network Security Assessment Using Internal Network Penetration Testing Methodology |
title_full | Network Security Assessment Using Internal Network Penetration Testing Methodology |
title_fullStr | Network Security Assessment Using Internal Network Penetration Testing Methodology |
title_full_unstemmed | Network Security Assessment Using Internal Network Penetration Testing Methodology |
title_short | Network Security Assessment Using Internal Network Penetration Testing Methodology |
title_sort | network security assessment using internal network penetration testing methodology |
topic | penetration testing network security vulnerability network |
url | http://joiv.org/index.php/joiv/article/view/190 |
work_keys_str_mv | AT denisatria networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology AT aldealanda networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology AT aldoerianda networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology AT deddyprayama networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology |