Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES)

Authors

  • Deuis Nur Astrida Universitas Amikom Purwokerto
  • Agung Restu Saputra Amikom Purwokerto University, Indonesia
  • Akhmad Ikhza Assaufi Amikom Purwokerto University, Indonesia

DOI:

10.33395/sinkron.v7i1.11249

Keywords:

Security, network, network security, Penetration Testing Execution Standard, PTES

Abstract

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe

GS Cited Analysis

Downloads

Download data is not yet available.

References

Adrian, A., & Setiyadi, A. (n.d.). ANALISIS KEAMANAN JARINGAN DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) DI DINAS KESEHATAN PROVINSI JAWA BARAT.

Aufan, O. :, & Rosadi, I. (n.d.). ANALISIS KEAMANAN SISTEM INFORMASI AKADEMIK DENGAN WEB PENETRAION TESTING.

Chandra, D. W. (2014). Program Studi Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Salatiga Oktober 2014 Program Studi Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Salatiga Oktober 2014.

Cunong, D. N., Saputra, M., & Puspitasari, W. (2020). ANALYSIS OF OROS MODELER DATA REPORTING PROCESS TO SAP HANA IN ACTIVITY BASED COSTING FOR INDONESIA TELECOMMUNICATION INDUSTRY. 7(1).

FAKHRI, A. (2020). Analisis Resiko Keamanan Terhadap Website Dinas Penanaman Modal Dan Pelayanan Terpadu Satu Pintu Pemerintahan Xyz Menggunakan Standar Penetration Testing Execution Standard (Ptes). Journal of Chemical Information and Modeling, 53(9), 1689–1699. https://repository.telkomuniversity.ac.id/home/catalog/id/156954/slug/analisis-resiko-keamanan-terhadap-website-dinas-penanaman-modal-dan-pelayanan-terpadu-satu-pintu-pemerintahan-xyz-menggunakan-standar-penetration-testing-execution-standard-ptes-.html

Ismail, R. W., & Pramudita, R. (2020). Metode Penetration Testing pada Keamanan Jaringan Wireless Wardriving PT. Puma Makmur Aneka Engineering Bekasi. 5(1), 53–62. https://nvd.nist.gov/vuln-metrics/cvss

Samsumar, L. D., Gunawan, K., Program, D., Manajemen, S., Program, D., & Komputerisasi, S. (2017). Analisis Dan Evaluasi Tingkat Keamanan Jaringan Komputer Nirkabel ( Wireless Lan ); Studi. Ilmiah Teknologi Informasi Terapan, IV(1), 73–82.

Sari, M. W., & Hardyanto, H. (2016). Implementasi Aplikasi Monitoring Pengendalian Pintu Gerbang Rumah Menggunakan App Inventor Berbasis Android. Eksis, 09(1), 20–28.

Susanto, M. I., Hasad, A., & Bakri, M. A. (2019). Sistem Proteksi Jaringan Wlan Terhadap Serangan Wireless Hacking. JREC (Journal of Electrical and Electronics), 7(1), 25–34. https://jurnal.unismabekasi.ac.id/index.php/jrec/article/download/1762/1489

Testing, P., Jaringan, S., Untuk, K., Keamanan, K., Dengan, S., Metode, M., Ilmiah, A., Informasi, F. T., &

Downloads


Crossmark Updates

How to Cite

Astrida, D. N. ., Saputra, A. R. ., & Assaufi, A. I. . (2022). Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES). Sinkron : Jurnal Dan Penelitian Teknik Informatika, 6(1), 147-154. https://doi.org/10.33395/sinkron.v7i1.11249