Published: 2024-04-01
Analisis Keamanan Website SIASAT Menggunakan Teknik Footprinting dan Vulnerability Scanning
DOI: 10.35870/jtik.v8i2.1723
Alvin Kendek Allo, Indrastanti Ratna Widiasari
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Universitas Kristen Satya Wacana (UKSW) is one of the private universities in Indonesia that actively utilizes internet technology and its Website to support academic and non-academic activities. SIASAT (Satya Wacana Academic Information System) provides important information confidentially to the community or makes this information only accessible to users who have an account. Regarding security, SIASAT has experienced problems, and threats such as SQL Injection, brute force, and so on which still happen frequently. Problems related to the security and confidentiality of data in computer networks are Privacy (confidentiality) data must be kept away from unauthorized parties. Integrity (integrity) ensures that the information sent remains intact or without changes. Authenticity (authenticity) is a procedure for knowing that a user is truly authorized to access a system. Authenticity could be password, PIN, fingerprints, or other identification. Non-repudiation (irrefutable proof) is proof to ensure that the user has full access to the services used in a system. A system can be categorized as unsafe if the above issues cannot be met. Therefore, by using Footprinting and vulnerability scanning techniques, analysis can be carried out on the SIASAT Website to overcome this problem. This research was carried out using an approach of ethical Hacking, with an emphasis on level Footprinting and vulnerability scanning. The results of this research have found information related to the SIASAT Website and several vulnerability warnings after scanning with high to low-risk levels.
Keywords
Network Security ; Footprinting ; Vulnerability Scanning
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 8 No. 2 (2024)
-
Section: Computer & Communication Science
-
Published: %750 %e, %2024
-
License: CC BY 4.0
-
Copyright: © 2024 Authors
-
DOI: 10.35870/jtik.v8i2.1723
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
-
-
-
-
Cahyanto, I. (2023). Privacy Challenges in Using Wearable Technology in Education Literature Review. Formosa Journal of Applied Sciences, 2(6), 909-928. DOI: https://doi.org/10.55927/fjas.v2i6.4272.
-
-
-
Herdianti, H., & Umar, F. (2020). Analisis keamanan website menggunakan teknik footprinting dan vulnerability scanning. INFORMAL: Informatics Journal, 5(2), 43-48. DOI: https://doi.org/10.19184/isj.v5i2.18941.
-
Alwi, E. I., & Ilmawan, L. B. (2021). Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment. INFORMAL: Informatics Journal, 6(3), 131-135. DOI: https://doi.org/10.19184/isj.v6i3.27053.
-

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.