Abstract

With rapid advances in Information Technology (IT), the need for an IT-based learning framework and mechanism has become an unavoidable necessity. This requires solid security in a system, using the Penetration Testing Execution and Standard (PTES) method. This research method is quantitative and descriptive, used to illuminate website security and provide input for improvement. The research involved Tenable Nessus Professional tools that emit vulnerabilities, such as Browseable Web Directory and Potentially Clickjacking Web. The PTES stages covered include Planning, Data Collection, Scanning, Access Rights, Security, and Web Application Firewall (WAF) configuration. The hope is that this method will provide an in-depth understanding of potential threats and vulnerabilities in government information systems, as well as present solutions. The research results are expected to provide education and insight into website security. This allows related parties to take preventive and corrective steps, improve security, and protect the integrity and confidentiality of data entities. As a result, information systems are expected to be more secure and resistant to potential cyber threats.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.