scholarly journals PETA: Methodology of Information Systems Security Penetration Testing

2016 ◽  
Vol 5 (2) ◽  
pp. 98-117 ◽  
Author(s):  
Tomáš Klíma
2020 ◽  
Vol 3 (1) ◽  
pp. 39-44
Author(s):  
Dedy Hariyadi ◽  
Fazlurrahman Fazlurrahman ◽  
Hendro Wijayanto

Keamanan merupakan hal penting dalam sistem maupun jaringan dalam melindungi data informasi. Tingginya tingkat laporang celah keamanan dari Edgescan menunjukkan masih minimnya pengembang sistem dan jaringan dalam hal menutamakan keamanan. Information System Security Assesment Framework (ISSAF) merupakan metodologi penetration testing yang dikembangkan oleh Open Information Systems Security Group. Dalam framework tersebut terdiri dari tiga fase, yaitu Planing and Preparation, Assessment dan Reporting, Clean-up and Destroy Astefacts. Dalam melakukan Vulnerabilities Identification diperlukan tools untuk mengetahui potensi celah keamanan dalam bentuk laporan. Ini sangat diperlukan untuk mempermudah analisis, penggunaan dan meminimalisir biaya pentesting. Selama ini tools pentesting kebanyakan masih menggunakan model Command Line Interface (CLI) sehingga sulit digunakan oleh orang awam. Sehingga diperlukan tools berbasis Graphic User Interface (GUI). Dengan pendekatan Hybrid Apps dapat dikembangkan aplikasi pentesting berbasis Graphic User Interface  yang memanfaatkan kelebihan teknologi native dan web. Bangkolo merupakan aplikasi untuk pentesting yang dikembangkan dari framework ISSAF dan pendekatan Hybrid Apps.


2020 ◽  
Vol 4 (3(12)) ◽  
pp. 1-15
Author(s):  
Samira Ilgarovna Proshkina ◽  

The work is devoted to an urgent problem — the study of the evolutionary dynamics of web advertising, its assessment and effectiveness, as well as the problem of legal support and security of information systems. The goal is a systematic analysis of web advertising in an unsafe information field, its relevance and criteria for assessing marketing efforts, minimizing risks, maximizing additional profits and image. Research hypothesis — the effectiveness of web advertising is determined by the form of advertising, place of display, location of the block, model of calculation of the advertising campaign. An approach based on the establishment of preferences, partnership between the state and business structures is emphasized. It takes into account the COVID-19 pandemic, a slowdown in the pace and features of the evolution of business companies in self-isolation. The subtasks of influence on the advertising efficiency of the site’s features and web advertising are highlighted. A comprehensive analysis of information and logical security and computational models of web advertising companies was also carried out.


2017 ◽  
pp. 137-139
Author(s):  
Gerald L. Kovacich ◽  
Edward P. Halibozek

2002 ◽  
Vol 6 (4) ◽  
pp. 205-219 ◽  
Author(s):  
Ambrosio Toval ◽  
Joaquín Nicolás ◽  
Begoña Moros ◽  
Fernando García

Sign in / Sign up

Export Citation Format

Share Document