The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
BibTex Citation Data :
@article{JOIV190, author = {Deni Satria and Alde Alanda and Aldo Erianda and Deddy Prayama}, title = {Network Security Assessment Using Internal Network Penetration Testing Methodology}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {2}, number = {4-2}, year = {2018}, keywords = {Penetration testing; network security; vulnerability;network}, abstract = {The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.}, issn = {2549-9904}, pages = {360--365}, doi = {10.30630/joiv.2.4-2.190}, url = {http://joiv.org/index.php/joiv/article/view/190} }
Refworks Citation Data :
@article{{JOIV}{190}, author = {Satria, D., Alanda, A., Erianda, A., Prayama, D.}, title = {Network Security Assessment Using Internal Network Penetration Testing Methodology}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {2}, number = {4-2}, year = {2018}, doi = {10.30630/joiv.2.4-2.190}, url = {} }Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610 (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id
View JOIV Stats
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.