Penggunaan Nessus dalam Mengidentifikasi Kerentanan Keamanan pada Perangkat Komputer

Authors

  • Alif Rizky UNIVERSITAS MULIA
  • Yustian Servanda Universitas Mulia

DOI:

https://doi.org/10.47233/jsit.v4i2.1840

Keywords:

Vulnerability, Nessus, Vulnerability Assessment

Abstract

Information system security is one of the many things that must be considered in information technology management. Computer devices that have security vulnerabilities can provide loopholes that can be used by irresponsible parties to hack and carry out other illegal activities on vulnerable computers. Nessus is a security tool that can be used to identify vulnerabilities on computer devices. This testing aims to test the ability of Nessus as a tool used to identify vulnerabilities on computer devices. The research method used is Vulnerability Assessment. The collected data includes the types of identified vulnerabilities, the severity level of the vulnerabilities, and an explanation of the successfully identified vulnerabilities. The research results show that Nessus effectively identifies various types of security vulnerabilities on computer devices, including vulnerabilities in operating systems, applications, and configurations. Nessus can also assist in the mitigation process by providing recommendations for improvements that can be made. This research concludes that the use of Nessus can improve the security of computer devices.

Downloads

Download data is not yet available.

References

H. W. S. Manik, H. Utama, M. D. Irawan, dan S. H. Hafizd, “Implementasi Keamanan di Cloud Storage Menggunakan Algoritma Key Public Berdasarkan Block Cipher,” Jurnal Sains dan Teknologi (JSIT), vol. 3, no. 1, hlm. 115–119, Jan 2023, doi: 10.47233/jsit.v3i1.500.

M. Y. Febriansyah, M. A. Firdaus, H. Salsabila, D. W. Sya’bani, and N. F. Rahman, “Analisis Keamanan Sistem Komputer Pada Organisasi Arsitektur Komputer,” *Kohesi: Jurnal Multidisiplin Saintek*, vol. 3, no. 9, pp. 1–14, 2024.

G. Surya Mahendra, “Keamanan Komputer.” [Daring]. Tersedia pada: https://www.researchgate.net/publication/370559343

J. A. Ginting dan I. G. G. Ngurah Suryantara, “PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ,” Infotech: Journal of Technology Information, vol. 7, no. 1, hlm. 41–46, Jun 2021, doi: 10.37365/jti.v7i1.105.

R. Manaek, Richardus Eko Indrajit, dan Erick Dazki, “Arsitektur Perusahaan Untuk Infrastuktur Telekomunikasi Di Daerah Pedalaman Indonesia,” SATIN - Sains dan Teknologi Informasi, vol. 9, no. 2, hlm. 01–11, Des 2023, doi: 10.33372/stn.v9i2.1000.

D. Surono Wibowo, T. Abidin, J. Teknik Informatika, P. Harapan Bersama, dan J. Mataram No, “Pengumpulan Informasi pada Situs Web Dengan Menyusun Kerangka Kerja Keamanan Siber NIST,” vol. 9, no. 1, 2024.

C. Khounborine, “A Survey and Comparative Study on Vulnerability Scanning Tools.” [Daring]. Tersedia pada: https://scholarworks.uark.edu/csceuht/124

M. Hasibuan dan A. M. Elhanafi, “Penetration Testing Sistem Jaringan Komputer Menggunakan Kali Linux untuk Mengetahui Kerentanan Keamanan Server dengan Metode Black Box,” sudo Jurnal Teknik Informatika, vol. 1, no. 4, hlm. 171–177, Des 2022, doi: 10.56211/sudo.v1i4.160.

H. Jurnal, R. Farismana, dan D. Pramadhana, “VULNERABILITY ASSESSMENT UNTUK ANALISIS TINGKAT KEAMANAN PADA SISTEM INFORMASI REPOSITORI KARYA ILMIAH POLITEKNIK XYZ,” Online, 2023.

A. Budiman, S. Ahdan, dan M. Aziz, “ANALISIS CELAH KEAMANAN APLIKASI WEB E-LEARNING UNIVERSITAS ABC DENGAN VULNERABILITY ASSESMENT,” 2021.

Downloads

Published

2024-07-12

How to Cite

Rizky, A., & Servanda, Y. . (2024). Penggunaan Nessus dalam Mengidentifikasi Kerentanan Keamanan pada Perangkat Komputer. Jurnal Sains Dan Teknologi (JSIT), 4(2), 189–194. https://doi.org/10.47233/jsit.v4i2.1840