scholarly journals ANALISIS KERENTANAN KEAMANAN WEBSITE MENGGUNAKAN METODE OWASP (OPEN WEB APPLICATION SECURITY PROJECT) PADA DINAS TENAGA KERJA

2021 ◽  
Vol 1 (03) ◽  
pp. 15-25
Author(s):  
Dewi Aryanti ◽  
Nurholis ◽  
Joy Nashar Utamajaya

Dinas Tenaga Kerja dan Transmigrasi merupakan organisasi perangkat daerah yang memiliki websiste sebagai media yang menampilkan secara interaktif jurnal informasi dan pembangunan daerah, media interaksi antara masyarakat dengan pemerintah. Terjadinya transisi komunikasi secara tradisional ke dalam lingkup aplikasi berbasis website bisa saja dimanfaatkan oleh beberapa pelaku kejahatan dunia maya dengan tujuan mencuri informasi rahasia pengguna dengan tujuan tertentu, maka mendeteksi kerentanan keamanan website adalah hal yang sangat penting Untuk mengetahui tingkat risiko pada sistem informasi harga komoditas utama menggunakan metode Open Web Application Security Project (OWASP) Risk Rating untuk mendeteksi kerentanan keamanan pada aplikasi berbasis website. Penelitian ini menghasilkan 2 faktor untuk memperkirakan Likelihood dan Impact, dari masing-masing faktor terdapat 3 risiko yang ditemukan yaitu risk severity High, risk severity Medium dan risk severity Low. Hasil penilaian risiko ini dapat membantu para pengelola dan pengembang sistem untuk menyadari risiko yang mungkin terjadi sehingga dapat mengambil tindakan untuk mencegah dan mengatasi risiko tersebut.

2019 ◽  
Vol 4 (4) ◽  
pp. 264
Author(s):  
Bahrun Ghozali ◽  
Kusrini Kusrini ◽  
Sudarmawan Sudarmawan

Mendeteksi kerentanan keamanan aplikasi berbasis website adalah hal yang penting, dan dapat memperkirakan resiko yang ada terhadap keberlangsungan suatu bisnis.  Terjadinya transisi bisnis tradisional ke dalam lingkup aplikasi berbasis website dimanfaatkan oleh beberapa pelaku kejahatan dunia maya dengan tujuan mencuri informasi rahasia pengguna demi keuntungan pribadi. Walaupun para developer sudah mencari permasalahan keamanan dengan menggunakan code review atau uji penetrasi. Terkadang masalah tidak akan ditemukan hingga aplikasi sudah masuk tahap produksi bahkan hingga aplikasi sudah diretas. Penelitian ini akan menerapkan  mekanisme metode asesmen resiko pada sistem informasi harga komoditas utama yang dibangun oleh PT.Gitsolution. Dimana sistem tersebut merupakan informasi harga pokok untuk kehidupan sehari-hari yang dikelola oleh salah satu instansi pemerintah yang ada di Indonesia. Untuk mengetahui tingkat resiko pada sistem informasi harga komoditas utama menggunakan metode Open Web Application Security Project (OWASP) Risk Rating untuk mendeteksi kerentanan keamanan pada aplikasi berbasis website. Penelitian ini menghasilkan tingkat resiko pada aplikasi berbasis website.Kata kunci— Vulnerability – OWASP, Risk Rating, Security Assessment.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


2021 ◽  
Vol 1 ◽  
pp. 84-90
Author(s):  
Rustam Kh. Khamdamov ◽  
◽  
Komil F. Kerimov ◽  

Web applications are increasingly being used in activities such as reading news, paying bills, and shopping online. As these services grow, you can see an increase in the number and extent of attacks on them, such as: theft of personal information, bank data and other cases of cybercrime. All of the above is a consequence of the openness of information in the database. Web application security is highly dependent on database security. Client request data is usually retrieved by a set of requests that request the application user. If the data entered by the user is not scanned very carefully, you can collect a whole host of types of attacks that use web applications to create security threats to the database. Unfortunately, due to time constraints, web application programmers usually focus on the functionality of web applications, but only few worry about security. This article provides methods for detecting anomalies using a database firewall. The methods of penetration and types of hacks are investigated. A database firewall is proposed that can block known and unknown attacks on Web applications. This software can work in various ways depending on the configuration. There are almost no false positives, and the overhead of performance is relatively small. The developed database firewall is designed to protect against attacks on web application databases. It works as a proxy, which means that requests for SQL expressions received from the client will first be sent to the developed firewall, rather than to the database server itself. The firewall analyzes the request: requests that are considered strange are blocked by the firewall and an empty result is returned to the client.


Web Application Security is one of the most important non functional requirements whenever we build a web application. A chain is just as though it were effective as its weakest relation, as is the case with defence. We might be having very strong applications and might be having very strong infrastructure because one small flaw can break the security. In terms of image based security the image processing techniques are used. The image can be used for authentication of the system like in the present work the image is being used as “pattern image based authentication system”. In majority of the web systems the security can be comprised by visualizing the passwords on runtime or accessing the system by unwanted calls like phishing attacks. In the current work the image based pattern is being used which actually is dynamic in nature like changes after every attempt made by the user either successful or unsuccessful, the patterns are drawn on the basis of the passcode generated. The system works for the manual hacking of the user id and password and also hacking the data by visualization. The developed system is prone to many type of attacks like phishing attack where the attackers shares information over mail, message and other medium to get the secure information from the user. This technique is used to develop an effective web application, and the results show that our method provides a quick and secure image transmission process


Sign in / Sign up

Export Citation Format

Share Document