Jusia Amanda Ginting(1*), I Gusti Gusti Ngurah Suryantara(2),

(1) Universitas Bunda Mulia
(2) Universitas Bunda Mulia
(*) Corresponding Author


Awareness of information security will be a priority in the event of data loss or damage. This certainly harms the performance of a company or organization due to unpreparedness to resolve or minimize risks that can occur. The impact that occurs on the security system used is that the system cannot provide a sense of security because the system used and has security holes that can be used to exploit systems and networks at XYZ University. This study aims to examine the internal and external security controls of the system by identifying threats that can pose serious problems to assets at XYZ University by using the penetration testing method, the results can be used as a benchmark in measuring the weaknesses of the network and system from external attacks. The goal is to implement preventive controls against risks that can occur to improve system security at XYZ University.


Vulnerability Testing, Penetration Testing, Preventive Control, Network Security

Full Text:



Beghdad, R. (2009). ritical study of neural networks in detecting intrusions. Computers & Security, 5, 168–175.

Enisa. (2017). Cyber Security Culture in Organisations. European Union Agency for Network and Information Security. Athens.

Fauzi, A., & Suartana, I. (2018). Monitoring Jaringan Wireless Terhadap Serangan Packet Sniffing Dengan Menggunakan Ids. Jurnal Manajemen Informatika, 8(2).

Ida Bagus Verry Hendrawan Manuaba, Risanuri Hidayat, S. S. K. (2012). Evaluasi Keamanan Akses Jaringan Komputer Nirkabel ( Kasus : Kantor Pusat Fakultas Teknik Universitas. Jnteti, 1(1), 5.

Juardi, D. (2017). Kajian Vulnerability Keamanan Jaringan Internet Menggunakan Nessus. Syntax Jurnal Informatika, 6(1), 11–19. Vulnerability Keamanan Jaringan Internet Menggunakan Ness

Jusia Amanda Ginting, I. G. N. S. (2021). Pengujian kerentanan sistem dengan menggunakan metode Penetration testing di universitas xyz.

Lammle, T. (2005). Cisco Certified Network Associate Study Guide. Elex Media Komputindo.

M.-y. Su, K.-c. Chang, and C. -y. L. (2009). Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. 301–306.

Nugroho, M. A. (2001). Studi Kasus Celah Keamanan Pada Jaringan Nirkabel Yang Menerapkan Wep (Wired Equivalent Privacy).

Ramadhani, Erika, A. A. (2010). Analisa Keamanan Jaringan Nirkabel di Universitas Gadjah Mada Dengan Menggunakan Metode Wardriving. Magister Teknologi Informasi Universitas Gadjah Mada.

Retna Mulya, B. W., & Tarigan, A. (2018). Pemeringkatan Risiko Keamanan Sistem Jaringan Komputer Politeknik Kota Malang Menggunakan Cvss Dan Fmea. ILKOM Jurnal Ilmiah, 10(2), 190–200.

Stiawan, D., Idris, M. Y., Abdullah, A. H., Aljaber, F., & Budiarto, R. (2017). Cyber-attack penetration test and vulnerability analysis. International Journal of Online Engineering, 13(1), 125–132.

Tejay, G. D. and G. (2009). Developing Insider Attack Detection Model : A Grounded Approach. 107–112.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.