2022
DOI: 10.35814/asiimetrik.v4i1.3127
|View full text |Cite
|
Sign up to set email alerts
|

Analisa Serangan Vulnerabilities Terhadap Server Selama Periode WFH di Masa Pandemi Covid-19 sebagai Prosedur Mitigasi

Abstract: Since the COVID-19 Pandemic occurred, companies engaged in the retail sector have experienced a decline in the impact of government regulations such as PSBB (Large-Scale Social Restrictions) so that all activities were carried out from home or Work from Home (WFH). to assist companies or agencies with various types of information systems in carrying out their business activities and operations This server is one of the most important in the retail company. The opening of several accesses from the public networ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
2
0
1
Order By: Relevance
“…Vulnerability is a security gap in the system that makes the system vulnerable to attack [14]. Some terms related to computer system security are threats, assets, mitigation, security gaps, mitigation, and risk.…”
Section: Look For Vulnerabilities or Weaknesses (Vulnerability Scanning)mentioning
confidence: 99%
See 1 more Smart Citation
“…Vulnerability is a security gap in the system that makes the system vulnerable to attack [14]. Some terms related to computer system security are threats, assets, mitigation, security gaps, mitigation, and risk.…”
Section: Look For Vulnerabilities or Weaknesses (Vulnerability Scanning)mentioning
confidence: 99%
“…Government websites should have a good level of security compared to other websites.2. Look for vulnerabilities or weaknesses (Vulnerability Scanning)Vulnerability is a security gap in the system that makes the system vulnerable to attack[14]. Some terms related to computer system security are threats, assets, mitigation, security gaps, mitigation, and risk.…”
mentioning
confidence: 99%
“…Untuk mendeteksi adanya kerentanan dan melakukan penanganan terhadap kerentanan yang sudah teridentifikasi dapat dilakukan menggunakan Vulnerability scanner [1]. Vulnerability adalah suatu kelemahan yang menjadi ancaman nilai integrity, confidentiality, dan availability dari suatu asset [2]. Dalam cyber crime terdapat metode yang digunakan dalam melakukan serangan dengan menggunakan teknologi komputer dan internet.…”
Section: Pendahuluanunclassified
“…Sebagai Prosedur Mitigasi" [11]yang menyebutkan bahwa pendeteksian kelemahan pada server dengan menggunakan acunetix dapat memberikan informasi secara lengkap.…”
unclassified