Home  /  CYBERNETICS  /  Vol: 6 Núm: 01 Par: 0 (2022)  /  Article
ARTICLE
TITLE

Data Security Analysis with OWASP Framework on Website XYZ DOI : 10.29406/cbn.v6i01.3953

SUMMARY

The website is needed as source of information which presented in a modern way that can be widely distributed. XYZ website displays information related to profiles, information sanggar Tari in Yogyakarta. Data security needs are reviewed from the need for data protection, loss and damage. XYZ website security is not well considered, this triggers the need to know the various risks of attacks and data weaknesses on the website. Research methods using the Open Web Application Security Project (OWASP) by utilizing software tools called OWASP Zed Attack Proxy (ZAP) are used to test data and information security on a website. This application conducts penetration tests (pentest) to determine the gap in the risk of data vulnerabilities in a website. The pentest results from the XYZ website get 11 data security vulnerabilities. A risk rating is used to determine the vulnerability detection value on xyz website. The assessment results of 11 vulnerabilities get 9 security gaps with Medium level and 2 gaps with Low level. These results are used to take decisions and actions to prevent and address security risks. The Medium level vulnerability category obtained 7 strategies that can be used to improve website security.

KEYWORDS

 Articles related

Faten H.Mohammed Sediq Al-Kadei    

The interest in the digital videos confidentiality in the current electronic and interrelated world has increased. Thus, this paper aimed at making a video steganography scheme for an acceptable security with high speed of calculation by embedding data (... see more


Ishu Gupta,Niharika Singh,Ashutosh Kumar Singh    

The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to t... see more


Reza Septiawan, I Made Astawa, Arief Rufiyanto, Tahar Agastani    

Precision, Navigation, and Timing (PNT) system based on Global Navigation Satellite System (GNSS) becomes significant in the air traffic management, especially in the use of Automatic Dependent Surveillance Broadcast system (ADS-B) for air traffic monito... see more

Revista: ULTIMA Computing

Riszullah Ramadhan Putra    

AbstractInformation security is very important for companies and universities. Many negative impacts have been caused by universities if information security is not properly maintained. This study analyzes how university administrators can identify opera... see more


Hamisu Alhaji Ali    

In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry's most developing section. Now that the world economy was hit by recession, the victims of this tragedy ... see more