Audit Configuration and Vulnerability Router on Diskominfos of Bali Province

  • gede ardi herdiana Universitas Udayana

Abstract

Abstract-Network security system on a computer that connected to the internet must be well planned and understood in order to effectively protect the resource in the network. how to find out the vulnerability of a network, so that by knowing the weaknesses in the network, then steps to overcome this drawback can be done. One of the forms taken includes conducting periodic analysis, both logical and physical. so that later it is expected that the analysis will produce an audit report containing the detection of various existing vulnerabilities, then take appropriate protective steps, which needed as a guarantee of security for the sustainability of the system. Nipper works by benchmarking the configuration of a router. After completing the inspection, you can see the configuration information as well as the security level of the router. Nessus works by scanning predetermined targets, such as a set of hosts or a separate host. Once the scan activity is complete, you can see the result information in either a graph or a line


 



Downloads

Download data is not yet available.

References

b. a. nugroho, "Analisis Keamanan Jaringan Pada Fasilitas Internet (WIFI) Terhadap Serangan packet Sniffing," 2012.
J. Hall, "Information Technology Auditing and Assurance" Third Edition, South-Western: Cengage Learning, 2011.
H. A. Khaddash, R. A. Nawas, A. Ramadan, "Factors Affecting the quality of Auditing: The Case of Jordanian Comercial Banks," International Journal of Business and Social Science, vol. 4 no 11, pp. 206-222, 2013.
E. Maria, E. Haryani, "Audit Model Development of Academic Information System : Case Study on Academic Information System of Satya Wacana," International Refereed Research Journal , vol. II, no. 2, pp. 12-24, 2011.
Komang Budiarta, Adi Panca Saputra Iskandar, Made Sudarma, "Audit Information System Development using COBIT 5 Framework," International Journal of Engineering and Emerging Technology , vol. 1 No 1, 2016.
Made Sudarma, Dandy Pratama Hostiadi, "The Establishment of Decision Tree Model in Network Traffic Incident Using C4.5 Method," International Journal of Informatics and Communication Technology (IJ-ICT), vol. 3, pp. 23-29, 2014.
D. Juardi, "Kajian Vulberability Keamanan Jaringan Internet Menggunakan Nessus," pp. 11-19, 2017.
T. A. S., Jaringan Komputer, Edisi Bahasa Indonesia, Edisi III, Jakarta: Prenhallindo, 1996.
I. Riadi, "Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik," JUSI, vol. 1 No 1, 2001.
R. Arief, Student Guides Series Pengenalan Jaringan Komputer, Jakarta: PT Elex Media Komputindo, 2006.
R. Rahmat, Panduan Membangun Jaringan Komputer untuk Pemula, jakarta: PT Elex Media Komputindo, 2003.
Z. Amin, "Analisis Vulnerabilitas Host pada Keamanan Jaringan Komputer di PT Sumeks Tivi Palembang (PALTV) Menggunakan Router Berbasis Unix," Jurnal Teknologi dan Informatika (TEKNOMATIKA), vol. 2, pp. 189-199, 2012.
Gangemi, Lehtinen, Russell, Computer Security Basics, United Stated of America: O'Reilly Media, 2009.
T. Ltd, "Linkedin," Computer Software, [Online]. Available: https://www.linkedin.com/company/titania-ltd. [Accessed 20 12 2020].
T. Nipper, "Linkedin," Computer & Network Security, [Online]. Available: https://www.linkedin.com/showcase/nipper-studio?trk=affiliated-pages_result-card_full-click. [Accessed 20 12 2020].
Published
2021-06-18
How to Cite
HERDIANA, gede ardi. Audit Configuration and Vulnerability Router on Diskominfos of Bali Province. International Journal of Engineering and Emerging Technology, [S.l.], v. 6, n. 1, p. 100-104, june 2021. ISSN 2579-5988. Available at: <https://ojs.unud.ac.id/index.php/ijeet/article/view/IJEET.2021.v06.i01.p17>. Date accessed: 27 oct. 2021. doi: https://doi.org/10.24843/IJEET.2021.v06.i01.p17.