{"title":"利用OWASP扫描器进行Webserver Office信息文档管理的漏洞分析","authors":"Agung Wijayanto, Ema Utami, Agung Budi Prasetio","doi":"10.1109/ICORIS50180.2020.9320833","DOIUrl":null,"url":null,"abstract":"Cases of lost scripts/programs have occurred, but the server crashed due to electrical problems for problems related to attacks whose impact is felt, namely the type of defacing attack. However, his hopes of this research outside of the attack could secure it before another attack case. There are various kinds of attacks, for example, such as cross-site scripting (XSS) attacks. This case has not yet happened, and the web server admin hopes to secure it early, so there are no data/information loss cases. Data/information that is more important on this website than other data is data/information from the Information Management and Documentation Officer. Vulnerability is a loophole that people often use not for getting the data and information they need in any way. This research type of research uses action research methods, the nature of this research uses quasi-experimental research, and the approach conducted by researchers used a quantitative approach. The research was carried out using the OWASP scanner approach on the Diskominfo web server, with the hope of providing solutions or recommendations to the webserver admin in implementing web server security as needed.","PeriodicalId":280589,"journal":{"name":"2020 2nd International Conference on Cybernetics and Intelligent System (ICORIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis of Vulnerability Webserver Office Management of Information And Documentation Diskominfo using OWASP Scanner\",\"authors\":\"Agung Wijayanto, Ema Utami, Agung Budi Prasetio\",\"doi\":\"10.1109/ICORIS50180.2020.9320833\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cases of lost scripts/programs have occurred, but the server crashed due to electrical problems for problems related to attacks whose impact is felt, namely the type of defacing attack. However, his hopes of this research outside of the attack could secure it before another attack case. There are various kinds of attacks, for example, such as cross-site scripting (XSS) attacks. This case has not yet happened, and the web server admin hopes to secure it early, so there are no data/information loss cases. Data/information that is more important on this website than other data is data/information from the Information Management and Documentation Officer. Vulnerability is a loophole that people often use not for getting the data and information they need in any way. This research type of research uses action research methods, the nature of this research uses quasi-experimental research, and the approach conducted by researchers used a quantitative approach. The research was carried out using the OWASP scanner approach on the Diskominfo web server, with the hope of providing solutions or recommendations to the webserver admin in implementing web server security as needed.\",\"PeriodicalId\":280589,\"journal\":{\"name\":\"2020 2nd International Conference on Cybernetics and Intelligent System (ICORIS)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 2nd International Conference on Cybernetics and Intelligent System (ICORIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICORIS50180.2020.9320833\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Cybernetics and Intelligent System (ICORIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICORIS50180.2020.9320833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Vulnerability Webserver Office Management of Information And Documentation Diskominfo using OWASP Scanner
Cases of lost scripts/programs have occurred, but the server crashed due to electrical problems for problems related to attacks whose impact is felt, namely the type of defacing attack. However, his hopes of this research outside of the attack could secure it before another attack case. There are various kinds of attacks, for example, such as cross-site scripting (XSS) attacks. This case has not yet happened, and the web server admin hopes to secure it early, so there are no data/information loss cases. Data/information that is more important on this website than other data is data/information from the Information Management and Documentation Officer. Vulnerability is a loophole that people often use not for getting the data and information they need in any way. This research type of research uses action research methods, the nature of this research uses quasi-experimental research, and the approach conducted by researchers used a quantitative approach. The research was carried out using the OWASP scanner approach on the Diskominfo web server, with the hope of providing solutions or recommendations to the webserver admin in implementing web server security as needed.