Penggunaan Nessus dalam Mengidentifikasi Kerentanan Keamanan pada Perangkat Komputer
DOI:
https://doi.org/10.47233/jsit.v4i2.1840Keywords:
Vulnerability, Nessus, Vulnerability AssessmentAbstract
Information system security is one of the many things that must be considered in information technology management. Computer devices that have security vulnerabilities can provide loopholes that can be used by irresponsible parties to hack and carry out other illegal activities on vulnerable computers. Nessus is a security tool that can be used to identify vulnerabilities on computer devices. This testing aims to test the ability of Nessus as a tool used to identify vulnerabilities on computer devices. The research method used is Vulnerability Assessment. The collected data includes the types of identified vulnerabilities, the severity level of the vulnerabilities, and an explanation of the successfully identified vulnerabilities. The research results show that Nessus effectively identifies various types of security vulnerabilities on computer devices, including vulnerabilities in operating systems, applications, and configurations. Nessus can also assist in the mitigation process by providing recommendations for improvements that can be made. This research concludes that the use of Nessus can improve the security of computer devices.
Downloads
References
H. W. S. Manik, H. Utama, M. D. Irawan, dan S. H. Hafizd, “Implementasi Keamanan di Cloud Storage Menggunakan Algoritma Key Public Berdasarkan Block Cipher,” Jurnal Sains dan Teknologi (JSIT), vol. 3, no. 1, hlm. 115–119, Jan 2023, doi: 10.47233/jsit.v3i1.500.
M. Y. Febriansyah, M. A. Firdaus, H. Salsabila, D. W. Sya’bani, and N. F. Rahman, “Analisis Keamanan Sistem Komputer Pada Organisasi Arsitektur Komputer,” *Kohesi: Jurnal Multidisiplin Saintek*, vol. 3, no. 9, pp. 1–14, 2024.
G. Surya Mahendra, “Keamanan Komputer.” [Daring]. Tersedia pada: https://www.researchgate.net/publication/370559343
J. A. Ginting dan I. G. G. Ngurah Suryantara, “PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ,” Infotech: Journal of Technology Information, vol. 7, no. 1, hlm. 41–46, Jun 2021, doi: 10.37365/jti.v7i1.105.
R. Manaek, Richardus Eko Indrajit, dan Erick Dazki, “Arsitektur Perusahaan Untuk Infrastuktur Telekomunikasi Di Daerah Pedalaman Indonesia,” SATIN - Sains dan Teknologi Informasi, vol. 9, no. 2, hlm. 01–11, Des 2023, doi: 10.33372/stn.v9i2.1000.
D. Surono Wibowo, T. Abidin, J. Teknik Informatika, P. Harapan Bersama, dan J. Mataram No, “Pengumpulan Informasi pada Situs Web Dengan Menyusun Kerangka Kerja Keamanan Siber NIST,” vol. 9, no. 1, 2024.
C. Khounborine, “A Survey and Comparative Study on Vulnerability Scanning Tools.” [Daring]. Tersedia pada: https://scholarworks.uark.edu/csceuht/124
M. Hasibuan dan A. M. Elhanafi, “Penetration Testing Sistem Jaringan Komputer Menggunakan Kali Linux untuk Mengetahui Kerentanan Keamanan Server dengan Metode Black Box,” sudo Jurnal Teknik Informatika, vol. 1, no. 4, hlm. 171–177, Des 2022, doi: 10.56211/sudo.v1i4.160.
H. Jurnal, R. Farismana, dan D. Pramadhana, “VULNERABILITY ASSESSMENT UNTUK ANALISIS TINGKAT KEAMANAN PADA SISTEM INFORMASI REPOSITORI KARYA ILMIAH POLITEKNIK XYZ,” Online, 2023.
A. Budiman, S. Ahdan, dan M. Aziz, “ANALISIS CELAH KEAMANAN APLIKASI WEB E-LEARNING UNIVERSITAS ABC DENGAN VULNERABILITY ASSESMENT,” 2021.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) that allows others to share — copy and redistribute the material in any medium or format and adapt — remix, transform, and build upon the material for any purpose, even commercially with an acknowledgment of the work's authorship and initial publication in this journal.