Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES)
DOI:
10.33395/sinkron.v7i1.11249Keywords:
Security, network, network security, Penetration Testing Execution Standard, PTESAbstract
The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe
Downloads
References
Adrian, A., & Setiyadi, A. (n.d.). ANALISIS KEAMANAN JARINGAN DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) DI DINAS KESEHATAN PROVINSI JAWA BARAT.
Aufan, O. :, & Rosadi, I. (n.d.). ANALISIS KEAMANAN SISTEM INFORMASI AKADEMIK DENGAN WEB PENETRAION TESTING.
Chandra, D. W. (2014). Program Studi Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Salatiga Oktober 2014 Program Studi Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Salatiga Oktober 2014.
Cunong, D. N., Saputra, M., & Puspitasari, W. (2020). ANALYSIS OF OROS MODELER DATA REPORTING PROCESS TO SAP HANA IN ACTIVITY BASED COSTING FOR INDONESIA TELECOMMUNICATION INDUSTRY. 7(1).
FAKHRI, A. (2020). Analisis Resiko Keamanan Terhadap Website Dinas Penanaman Modal Dan Pelayanan Terpadu Satu Pintu Pemerintahan Xyz Menggunakan Standar Penetration Testing Execution Standard (Ptes). Journal of Chemical Information and Modeling, 53(9), 1689–1699. https://repository.telkomuniversity.ac.id/home/catalog/id/156954/slug/analisis-resiko-keamanan-terhadap-website-dinas-penanaman-modal-dan-pelayanan-terpadu-satu-pintu-pemerintahan-xyz-menggunakan-standar-penetration-testing-execution-standard-ptes-.html
Ismail, R. W., & Pramudita, R. (2020). Metode Penetration Testing pada Keamanan Jaringan Wireless Wardriving PT. Puma Makmur Aneka Engineering Bekasi. 5(1), 53–62. https://nvd.nist.gov/vuln-metrics/cvss
Samsumar, L. D., Gunawan, K., Program, D., Manajemen, S., Program, D., & Komputerisasi, S. (2017). Analisis Dan Evaluasi Tingkat Keamanan Jaringan Komputer Nirkabel ( Wireless Lan ); Studi. Ilmiah Teknologi Informasi Terapan, IV(1), 73–82.
Sari, M. W., & Hardyanto, H. (2016). Implementasi Aplikasi Monitoring Pengendalian Pintu Gerbang Rumah Menggunakan App Inventor Berbasis Android. Eksis, 09(1), 20–28.
Susanto, M. I., Hasad, A., & Bakri, M. A. (2019). Sistem Proteksi Jaringan Wlan Terhadap Serangan Wireless Hacking. JREC (Journal of Electrical and Electronics), 7(1), 25–34. https://jurnal.unismabekasi.ac.id/index.php/jrec/article/download/1762/1489
Testing, P., Jaringan, S., Untuk, K., Keamanan, K., Dengan, S., Metode, M., Ilmiah, A., Informasi, F. T., &
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2022 Deuis Nur Astrida, Agung Restu Saputra, Akhmad Ikhza Assaufi

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.