Network Security Assessment Using Internal Network Penetration Testing Methodology

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing...

Full description

Bibliographic Details
Main Authors: Deni Satria, Alde Alanda, Aldo Erianda, Deddy Prayama
Format: Article
Language:English
Published: Politeknik Negeri Padang 2018-10-01
Series:JOIV: International Journal on Informatics Visualization
Subjects:
Online Access:http://joiv.org/index.php/joiv/article/view/190
_version_ 1818505711173238784
author Deni Satria
Alde Alanda
Aldo Erianda
Deddy Prayama
author_facet Deni Satria
Alde Alanda
Aldo Erianda
Deddy Prayama
author_sort Deni Satria
collection DOAJ
description The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.
first_indexed 2024-12-10T21:54:40Z
format Article
id doaj.art-555f2abd7d8f40aab97d988e664cfaa1
institution Directory Open Access Journal
issn 2549-9610
2549-9904
language English
last_indexed 2024-12-10T21:54:40Z
publishDate 2018-10-01
publisher Politeknik Negeri Padang
record_format Article
series JOIV: International Journal on Informatics Visualization
spelling doaj.art-555f2abd7d8f40aab97d988e664cfaa12022-12-22T01:32:05ZengPoliteknik Negeri PadangJOIV: International Journal on Informatics Visualization2549-96102549-99042018-10-0124-236036510.30630/joiv.2.4-2.190127Network Security Assessment Using Internal Network Penetration Testing MethodologyDeni Satria0Alde Alanda1Aldo Erianda2Deddy Prayama3Politeknik Negeri Padang, IndonesiaPoliteknik Negeri Padang, IndonesiaPoliteknik Negeri Padang, IndonesiaPoliteknik Negeri Padang, IndonesiaThe development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.http://joiv.org/index.php/joiv/article/view/190penetration testingnetwork securityvulnerabilitynetwork
spellingShingle Deni Satria
Alde Alanda
Aldo Erianda
Deddy Prayama
Network Security Assessment Using Internal Network Penetration Testing Methodology
JOIV: International Journal on Informatics Visualization
penetration testing
network security
vulnerability
network
title Network Security Assessment Using Internal Network Penetration Testing Methodology
title_full Network Security Assessment Using Internal Network Penetration Testing Methodology
title_fullStr Network Security Assessment Using Internal Network Penetration Testing Methodology
title_full_unstemmed Network Security Assessment Using Internal Network Penetration Testing Methodology
title_short Network Security Assessment Using Internal Network Penetration Testing Methodology
title_sort network security assessment using internal network penetration testing methodology
topic penetration testing
network security
vulnerability
network
url http://joiv.org/index.php/joiv/article/view/190
work_keys_str_mv AT denisatria networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology
AT aldealanda networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology
AT aldoerianda networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology
AT deddyprayama networksecurityassessmentusinginternalnetworkpenetrationtestingmethodology