Jurnal Informasi & Teknologi
Journal Content
Browse
  • By Issue
  • By Author
Information
  • For Readers
  • For Authors
  • For Librarians
Current Issue
Atom logo
RSS2 logo
RSS1 logo
  • Submission
  • Author Guidelines
  • Review Process
  • License
  • Publication Fee
  • Cover
  • Access Statement
  • Publication Ethics

Template word

Similarity Checker

Cover Page

Statistik

Statistics Visitors


Flag Counter

  • Home
  • Current
  • Archive
  • Editorial Team
  • Reviewer
  • Contact
  • Announcement
  • Search
Home > Articles

Enhancement Security of Integrated Health Center Information Systems with the Gray-Box Penetration Test Method Using Computer Assisted Audit Techniques

  • Nopan Pirsa
    Universitas Putra Indonesia YPTK Padang

  • Sumijan Sumijan
    Universitas Putra Indonesia YPTK Padang


DOI: https://doi.org/10.37034/jidt.v2i4.79
Keywords: Information System Security, Penetration Testing, Vulnerability Assessment, Computer Assisted Audit Techniques, OWASP ZAP

Abstract

Information system security is something the owner must pay attention to in order to avoid cyber crime. Information systems that have security vulnerabilities can threaten an organization's critical infrastructure. Security vulnerabilities are any kind of vulnerability that allows attackers to enter into the system illegally and perform unwanted acts. Penetration tests on information systems need to be carried out to ensure its security. This study aims to improve the security of the integrated health center information system in Payakumbuh City so that data and information is guaranteed its security. The method used is the gray box penetration test using computer assisted audit techniques. The results of this study found 97 high vulnerability categories, 1 medium vulnerability category and 26 low vulnerability categories. The Payakumbuh City Information and Communication Office can take advantage of the penetration test results as a reference to improve the security of the Payakumbuh integrated health center information system.

References

Nagendran, K., Adithyan, A., Chethana, R., Camillus, P., & Bala, S. V. K. B. (2019). Web Application Penetration Testing. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 1029-1035. DOI: https://dx.doi.org/10.35940/ijitee.J9173.0881019 .

Nur, R. M., Na'am, J., Nurcahyo, G. W., & Arlis, S. (2019). Peningkatan Keamanan Website Menggunakan Metode XML dengan Framework Codeigniter. Indonesian Journal of Computer Science, 8(2), 156-163. DOI: https://dx.doi.org/10.33022/ijcs.v8i2.188 .

Votipka, D., Stevens, R., Redmiles, E., Hu, J., & Mazurek, M. (2018). Hackers Vs. Testers: A Comparison of Software Vulnerability Discovery Processes. IEEE Symposium on Security and Privacy (SP), 374-391. DOI: https://dx.doi.org/10.1109/SP.2018.00003 .

Shebli, H. M. Z. A., & Beheshti, B. D. (2018). A Study on Penetration Testing Process And Tools. IEEE Long Island Systems, Applications and Technology Conference (LISAT). DOI: https://dx.doi.org/10.1109/lisat.2018.8378035 .

Setiawan, E. B., & Setiyadi, A. (2018). Web Vulnerability Analysis and Implementation. In IOP Conference Series: Materials Science and Engineering, 407(1). DOI: https://dx.doi.org/10.1088/1757-899X/407/1/012081 .

Simran, T. G., & Sasikala, D. (2019). Vulnerability Assessment of Web Applications using Penetration Testing. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 1552-1556. DOI: https://dx.doi.org/10.35940/ijrte.B2133.118419

Yunus, M. (2019). Analisis Kerentanan Aplikasi Berbasis Web Menggunakan Kombinasi Security Tools Project Berdasarkan Framework OWASP Versi 4. Jurnal Ilmiah Informatika Komputer, 24(1), 37-48. DOI: https://dx.doi.org/10.35760/ik.2019.v24i1.1988 .

Jaber, R. J., & Wadi, R. M. A. (2018). Auditors’ Usage of Computer-Assisted Audit Techniques (CAATs): Challenges and Opportunities. In Conference on e-Business, e-Services and e-Society, 365-375. DOI: https://dx.doi.org/10.1007/978-3-030-02131-3_33 .

Asniarti, A., & Muda, I. (2019). The Effect of Computer Assisted Audit Tools on Operational Review of Information Technology Audits. In 1st International Conference on Social Sciences and Interdisciplinary Studies. DOI: https://dx.doi.org/10.2991/icssis-18.2019.5 .

Wicaksono, A., Laurens, S., & Novianti, E. (2018). Impact Analysis of Computer Assisted Audit Techniques Utilization on Internal Auditor Performance. In 2018 International Conference on Information Management and Technology (ICIMTech), 267-271. DOI: https://dx.doi.org/10.1109/ICIMTech.2018.8528198 .

Ula, M. (2019). Evaluasi Kinerja Software Web Penetration Testing. TECHSI-Jurnal Teknik Informatika, 11(3), 336-352. DOI: https://dx.doi.org/10.29103/techsi.v11i3.1996 .

Clincy, V., & Shahriar, H. (2018). Web Application Firewall: Network Security Models and Configuration. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 1, 835-836. DOI: https://dx.doi.org/10.1109/COMPSAC.2018.00144 .

Download
Published
2020-12-31
Issue
2020, Vol. 2, No. 4
Section
Articles
How to Cite
Pirsa, N., & Sumijan, S. (2020). Enhancement Security of Integrated Health Center Information Systems with the Gray-Box Penetration Test Method Using Computer Assisted Audit Techniques. Jurnal Informasi Dan Teknologi, 2(4), 133-138. https://doi.org/10.37034/jidt.v2i4.79
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
  • Endnote/Zotero/Mendeley (RIS)
  • BibTeX

Copyright (c) 2020 Jurnal Informasi dan Teknologi

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.



Indexed:

Index Copernicus International (ICI) Google Scholar 

Registered:


Power by:
            

ISSN: 2714-9730 (electronic)
DOI: 10.37034/jidt
Publisher: Rektorat Universitas Putra Indonesia YPTK Padang

Kampus Universitas Putra Indonesia YPTK Padang
Jl. Raya Lubuk Begalung Padang, Sumatera Barat - 25221
Website : http://www.jidt.org | Email : jidt@upiyptk.ac.id