Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM)

Intech Pub Date : 2022-11-29 DOI:10.54895/intech.v3i2.1509
MUH. Ahsan
{"title":"Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM)","authors":"MUH. Ahsan","doi":"10.54895/intech.v3i2.1509","DOIUrl":null,"url":null,"abstract":"A computer network is a network telecommunication that connects one or more computers to exchange data and information with each other. Such huge benefit will certainly be reduced by the presence of interference that arises in the network, when the network only involves local devices or in other words, is not connected to the internet network then interference may be less calculated. However, when the local network is connected to the internet network, a security system will be something that must be considered. Every system and network will undoubtedly have vulnerabilities and can cause damage to the system and even data to cause losses. Tracing activities and identifying system vulnerabilities are effective ways to minimize the risk of continuous vulnerability, therefore this study aims to conduct network analysis to determine vulnerabilities system by applying the open vulnerability assessment system method using Greenbone Vulnerability Management (GVM) as a platform of network scanning and vulnerability management system. The results are achieved by doing the vulnerability analysis to evaluate the results of vulnerability findings and then categorized according to the level of risk, namely high, medium and low. Conducting a vulnerability assessment will improve information security and avoid bad risks that can cause losses. The results achieved doing the vulnerability assessment activity are to provide an evaluation of the risk of vulnerability found and the impact that can be generated and as a preventive measure to increase security system awareness.","PeriodicalId":13714,"journal":{"name":"Intech","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intech","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54895/intech.v3i2.1509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A computer network is a network telecommunication that connects one or more computers to exchange data and information with each other. Such huge benefit will certainly be reduced by the presence of interference that arises in the network, when the network only involves local devices or in other words, is not connected to the internet network then interference may be less calculated. However, when the local network is connected to the internet network, a security system will be something that must be considered. Every system and network will undoubtedly have vulnerabilities and can cause damage to the system and even data to cause losses. Tracing activities and identifying system vulnerabilities are effective ways to minimize the risk of continuous vulnerability, therefore this study aims to conduct network analysis to determine vulnerabilities system by applying the open vulnerability assessment system method using Greenbone Vulnerability Management (GVM) as a platform of network scanning and vulnerability management system. The results are achieved by doing the vulnerability analysis to evaluate the results of vulnerability findings and then categorized according to the level of risk, namely high, medium and low. Conducting a vulnerability assessment will improve information security and avoid bad risks that can cause losses. The results achieved doing the vulnerability assessment activity are to provide an evaluation of the risk of vulnerability found and the impact that can be generated and as a preventive measure to increase security system awareness.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
计算机网络是连接一台或多台计算机以相互交换数据和信息的电信网络。这种巨大的好处肯定会因网络中出现的干扰而减少,当网络只涉及本地设备或换句话说,没有连接到互联网网络时,干扰可能会较少计算。然而,当本地网络连接到互联网网络时,安全系统将是必须考虑的事情。每一个系统和网络无疑都存在漏洞,可能会对系统甚至数据造成破坏,造成损失。跟踪活动和识别系统漏洞是降低持续漏洞风险的有效途径,因此本研究以绿骨漏洞管理(Greenbone vulnerability Management, GVM)作为网络扫描和漏洞管理系统平台,采用开放式漏洞评估系统方法,进行网络分析,确定漏洞系统。通过脆弱性分析,对脆弱性发现结果进行评价,然后根据风险等级进行高、中、低的分类,得出结果。进行漏洞评估可以提高信息安全性,避免可能造成损失的不良风险。脆弱性评估活动的结果是对发现的脆弱性风险和可能产生的影响进行评估,并作为提高安全系统意识的预防措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Sistem Aplikasi Layanan Panggilan Montir Berbasis Web untuk Memudahkan Pengendara Menemukan Montir Sistem Informasi Pengelolaan Sampah Rumah Tangga Berbasis Mobile Rancang Bangun Sistem Informasi Perpustakaan Berbasis Web Pada SMAN 10 OKU Aplikasi Edukasi Belajar ‘Joykidz’ Untuk Anak Usia 4 Hingga 6 Tahun Menggunakan MIT App Inventor Berbasis Android Perancangan Sistem Presensi Online Berbasis Granted Validitas Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1