scholarly journals Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment

2021 ◽  
Vol 6 (3) ◽  
pp. 131
Author(s):  
Erick Irawadi Alwi ◽  
Lutfi Budi Ilmawan

The use of academic information systems (siakad) has become mandatory for universities in providing user convenience in online academic administrative activities. However, sometimes college siakad has security holes that irresponsible people can take advantage of by hacking. This study aims to identify security vulnerabilities at XYZ Siakad University. The method used in this study is a vulnerability assessment method. A university syakad will conduct an initial vulnerability assessment by doing footprinting to get information related to XYZ syakad after that a vulnerability scan is carried out using vulnerability assessment tools to identify vulnerabilities and the level of risk found. Based on the vulnerability of the XYZ university's vulnerabilities, it is quite good, with a high risk level of 1, a medium risk level of 6 and a low risk level of 14. Researchers provide recommendations for improvements related to the findings of security holes in XYZ university Siakad from XSS (Cross Site Scripting) attacks, Clickjacking, Brute Force, Cross-site Request Forgery (CSRF) and Sniffing.

Work ◽  
2021 ◽  
pp. 1-11
Author(s):  
Carlos Carvalhais ◽  
Micaela Querido ◽  
Cristiana C. Pereira ◽  
Joana Santos

BACKGROUND: The COVID-19 global pandemic brought several challenges to occupational safety and health practice. One of these is the need to (re)assess the occupational risks, particularly, biological risks. OBJECTIVE: The purpose of this work is to promote guidance to occupational safety and health practitioners when conducting a biological risk assessment in this context. METHODS: The main steps of the biological risk assessment are explained with some inputs regarding the novelty posed by SARS-CoV-2 and an example of a qualitative risk assessment method is presented. Also, its application to two different activities was exemplified. RESULTS: In both cases, the assessment considered that vulnerable workers were working from home or in medical leave. The results showed low or medium risk level for the assessed tasks. For medium risk level, additional controls are advised, such maintain social distancing, sanitize instruments/equipment before use, use proper and well-maintained PPE (when applicable), and promote awareness sessions to spread good practices at work. Employers must be aware of their obligations regarding biological risk assessment and OSH practitioners must be prepared to screen and link the abundance of scientific evidence generated following the outbreak, with the technical practice. CONCLUSIONS: This paper could be an important contribution to OSH practice since it highlights the need to (re)assess occupational risks, especially biological risk, to ensure a safe return to work, providing technical guidance.


2010 ◽  
Vol 108-111 ◽  
pp. 948-953 ◽  
Author(s):  
Hao Yuan

Based on the research of domestic and foreign vulnerability assessment systems, in this paper, we propose an improved network security assessment method based on Immunity algorithm. It integrates the advantages of both host based and network based scan system. Our goal is to explore the known security vulnerabilities, and to check hosts’ security effectively as well. It has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.


Author(s):  
Sahren Sahren ◽  
Ruri Ashari Dalimuthe ◽  
Muhammad Amin

Security is an effort that can be done to protect the information contained in it which refers to confidentiality. Information systems that are centrally prone to various types of attacks such as DoS, SQL Injections, Cross Site Scripting (XSS), Clickjacking, CSRF / Cross-site request forgery and so on. This will be a polemic for the information service owner and manager. The method to be carried out in this study is to do penetration testing to audit the security of the campus information system webserver. This activity aims to identify and exploit vulnerabilities in the web server. In this study, several tools will be used as a tool, including WHOIS, NMAP and Acunetix Web Vulnerability Scanner. Tests carried out are to look for vulnerabilities on the web server while the level of vulnerability that will be detected in this test sawill be inter alia higt risk, Medium risk and low risk. The aim is to find out the weaknesses in the web server so that in the future it can avoid DoS attacks, CSRF / Cross-site request forgery, Cross Site Scripting (XSS) and clickjacking. The results of this test are expected to be an input for the management of campus information systems for the future can be made improvements to existing weaknesses.


Author(s):  
Mohit Kumar ◽  
Abhishek Gupta ◽  
Azhar Shadab ◽  
Lokesh Kumar ◽  
Vikas Kumar Tiwari

Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-adays attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities have multiplied in recent years. Vulnerabilities like cross site scripting(XSS),sql injection and cross site request forgery(CSRF) has emerged as a major threat to web applications. So, in order to protect web applications from these modern threats, at first vulnerability assessment should be carried out from time to time and also some preventive techniques should be followed to prevent these threats. The motivation of this paper is to promote the use of automated tools for vulnerability assessment and to follow preventive techniques in order to make web applications secure.


2014 ◽  
Vol 3 (2) ◽  
pp. 13-21 ◽  
Author(s):  
Bharti Nagpal ◽  
Naresh Chauhan ◽  
Nanhay Singh

2021 ◽  
Vol 29 (Supplement_1) ◽  
pp. i31-i32
Author(s):  
D Semple ◽  
M M Howlett ◽  
J D Strawbridge ◽  
C V Breatnach ◽  
J C Hayden

Abstract Introduction Paediatric Delirium (PD) is a neuropsychiatric complication that occurs during the management of children in the critical care environment (Paediatric Intensive Care (PICU) and Neonatal Intensive Care (NICU). Delirium can be classified as hypoactive (decreased responsiveness and withdrawal), hyperactive (agitation and restlessness), and mixed (combined) (1). PD can be assessed using a number of assessment tools. PD has been historically underdiagnosed or misdiagnosed, having many overlapping symptoms with other syndrome such as pain and iatrogenic withdrawal syndrome (2). An appreciation of the extent of PD would help clinicians and policy makers drive interventions to improve recognition, prevention and management of PD in clinical practice. Aim To estimate the pooled prevalence of PD using validated assessment tools, and to identify risk factors including patient-related, critical-care related and pharmacological factors. Methods A systematic search of PubMed, EMBASE and CINAHL databases was undertaken. Eligible articles included observational studies or trials that estimated a prevalence of PD in a NICU/PICU population using a validated PD assessment tool. Validated tools are the paediatric Confusion Assessment Method-ICU (pCAM-ICU), the Cornell Assessment of Pediatric Delirium (CAPD), the PreSchool Confusion Assessment Method for the ICU (psCAM-ICU), pCAM-ICU severity scale (sspCAM-ICU), and the Sophia Observation Withdrawal Symptoms scale Paediatric Delirium scale (SOS-PD) (1). Only full text studies were included. No language restrictions were applied. Two reviewers independently screened records. Data was extracted using a pre-piloted form and independently verified by another reviewer. Quality was assessed using tools from the National Institutes of Health. A pooled prevalence was calculated from the studies that estimated PD prevalence using the most commonly applied tool, the CAPD (1). Results Data from 23 observational studies describing prevalence and risk factors for PD in critically ill children were included (Figure 1). Variability in study design and outcome reporting was found. Study quality was generally good. Using the validated tools prevalence ranged from 10–66% of patients. Hypoactive delirium was the most prevalent sub-class identified. Using the 13 studies that used the CAPD tool, a pooled prevalence of 35% (27%-43% 95%CI) was calculated. Younger ages, particularly less than two years old, sicker patients, particularly those undergoing mechanical and respiratory ventilatory support were more at risk for PD. Restraints, the number of sedative medications, including the cumulative use of benzodiazepines and opioids were identified as risk factors for the development of PD. PD was associated with longer durations of mechanical ventilation, longer stays and increased costs. Data on association with increased mortality risk is limited and conflicting. Conclusion PD affects one third of critical care admissions and is resource intense. Routine assessment in clinical practice may facilitate earlier detection and management strategies. Modifiable risk factors such as the class and number of sedative and analgesic medications used may contribute to the development of PD. Early mobility and lessening use of these medications present strategies to prevent PD occurrence. Longitudinal prospective multi-institutional studies to further investigate the presentations of the different delirium subtypes and modifiable risk factors that potentially contribute to the development of PD, are required. References 1. Semple D (2020) A systematic review and pooled prevalence of PD, including identification of the risk factors for the development of delirium in critically ill children. doi: 10.17605/OSF.IO/5KFZ8 2. Ista E, te Beest H, van Rosmalen J, de Hoog M, Tibboel D, van Beusekom B, et al. Sophia Observation withdrawal Symptoms-Paediatric Delirium scale: A tool for early screening of delirium in the PICU. Australian Critical Care. 2018;31(5):266–73


2021 ◽  
Vol 33 (1) ◽  
Author(s):  
Maha Hosam El-Din Ibrahim ◽  
Manal Elmasry ◽  
Fady Nagy ◽  
Ahmed Abdelghani

Abstract Background Delirium is a common geriatric problem associated with poor outcomes. Subsyndromal delirium (SSD) is characterized by the presence of certain symptoms of delirium yet, not satisfying the definition of full-blown delirium, defined by categorical elements, and is usually referred to as the presence of one or more symptoms in the confusion assessment method (CAM). This study aimed to investigate the prevalence and risk factors of delirium and SSD in older adults admitted to the hospital. Five hundred eighty-eight elderly (above 65 years) Egyptian patients were recruited from January 2019 to February 2020. After explaining the purpose of the study and assuring the confidentiality of all participants, an informed consent was obtained from the participant or a responsible care giver for those who were not able to give consent. All patients were subjected ‘on admission’ to thorough history taking, clinical examination, and comprehensive geriatric assessment including confusion assessment tools, mini-mental state examination, and functional assessment using Barthel index score. Results The current study showed that 19.6% of patients had delirium and 14.1% of patients had SSD with combined prevalence of 33.7%. Most common causes included metabolic, infection, organic brain syndrome, and dehydration. The current study reported significant proportionate relation between cognitive assessment and functional ability, so patients with a score of 23 MMSE had good functional ability, while cognitive assessment using mini-mental score shows inversed relation to delirium and SSD using CAM score. Conclusion Delirium is independently associated with adverse short-term and long-term outcomes, including an increase in mortality, length of hospital stay, discharge to an institution, and functional decline on discharge. Subsyndromal delirium (SSD) is characterized by the presence of certain symptoms of delirium, not yet satisfying the definition of full-blown delirium but it can identify patients with early cognitive and functional disabilities, and because of high prevalence of delirium and SSD. Efforts to prevent or early detection may identify patients who warrant clinical attention.


2019 ◽  
Vol 3 (1) ◽  
Author(s):  
Riana Septiani ◽  

Abstract In conducting activities, many found workers who did not use personal protective equipment, do not pay attention to safety in work and work done like without procedure. PT. Budi Dwiyasa Perkasais a plantation company palm oil. Based on accident data obtained work, there are 14 case of accident in April until June 2016 in PT. Budi Dwiyasa Perkasa. A major factor cause of the accident is unsafe actions and unsafe conditions. Hazard analysis needs to be done in order to prevent the accident of work. Hazard identification done with using the risk assessment method. This analysis of the technique used to determine the level of the risk of a job is a combination of between the possibility of the harms caused by the severity of the caused. The result of hazard identification with this method is used in a kind of work to have a high risk level and need to address special in order to prevent the accident. Keywords: safety, accident, risk, hazard identification,


Sign in / Sign up

Export Citation Format

Share Document