HAKIM, ARIF RAHMAN (2022) ANALISIS KERENTANAN PADA JARINGAN IoT MENGGUNAKAN RASPBERRY PI DAN OWASP (OPEN WEB APPLICATION SECURITY PROJECT). S2 thesis, Universitas Mercu Buana Jakarta-Menteng.
Text (COVER)
55420110007-Arif Rahman Hakim-01 Cover - Arif Hakim.pdf Download (507kB) |
|
Text (ABSTRAK)
55420110007-Arif Rahman Hakim-02 Abstrak - Arif Hakim.pdf Download (89kB) |
|
Text (BAB 1)
55420110007-Arif Rahman Hakim-03 Bab 1 - Arif Hakim.pdf Restricted to Registered users only Download (92kB) |
|
Text (BAB 2)
55420110007-Arif Rahman Hakim-04 Bab 2 - Arif Hakim.pdf Restricted to Registered users only Download (269kB) |
|
Text (BAB 3)
55420110007-Arif Rahman Hakim-05 Bab 3 - Arif Hakim.pdf Restricted to Registered users only Download (314kB) |
|
Text (BAB 4)
55420110007-Arif Rahman Hakim-06 Bab 4 - Arif Hakim.pdf Restricted to Registered users only Download (2MB) |
|
Text (BAB 5)
55420110007-Arif Rahman Hakim-07 Bab 5 - Arif Hakim.pdf Restricted to Registered users only Download (88kB) |
|
Text (DAFTAR PUSTAKA)
55420110007-Arif Rahman Hakim-09 Daftar Pustaka - Arif Hakim.pdf Restricted to Registered users only Download (153kB) |
|
Text (LAMPIRAN)
55420110007-Arif rahman Hakim-10 Lampiran - Arif Hakim.pdf Restricted to Registered users only Download (124kB) |
|
Text (PERNYATAAN KEABSAHAN DAN PUBLIKASI)
Arif Rahman Hakim20220806_15585430 - Arif Hakim.pdf Restricted to Repository staff only Download (169kB) |
Abstract
Arsitektur keamanan harus mendukung keadaan sistem yang terdiri dari komponen yang aman, komunikasi yang aman, dan kontrol akses aset yang aman ke setiap dan semua aset dalam ekosistem IoT (Internet of Things yang sedang dipertimbangkan. Keamanan ini terdiri dari beberapa aspek, yang terutama adalah keamanan data yang berada pada server. Beberapa penelitian sebelumnya yang dijadikan rujukan referensi utama membahas beberapa permasalahan terkait keamanan pada server IoT dan membahas keamanan pada web dengan beberapa tools yang berbeda. Berdasarkan rujukan tersebut, tercipta ide penelitian untuk melakukan Analisis Kerentanan Pada Jaringan IoT Menggunakan Raspberry Pi dan Owasp (Open Web Application Security Project). Penerapan skema pengamanan jaringan terhadap IoT menggunakan tools OWASP berhasil dilakukan dengan memasang tools OWASP pada perangkat Raspberry Pi yang memiliki keuntungan lebih fleksibel dalam penggunaan di banding komputer personal. Setelah dilakukan serangan pada server jaringan lokal didapatkan 7 jenis kerentanan dan solusi perbaikannya, kemudian dilakukan tahapan solusi dan didapatkan ) kerentanan pada server jaringan lokal. Didapatkan tingkat kerentanan dengan level tertinggi adalah medium dan level terendah Low. Dapat disimpulkan bahwa kerentanan paling tinggi didapatkan pada tipe jaringan cloud hosting, dikarenakan terkoneksi dengan internet. Berbeda dengan jaringan lokal yang hanya terkoneksi secara local area network. Kata Kunci : IoT, Owasp, Raspbery Pi The security architecture should support the state of the system consisting of secure components, secure communications, and secure asset access control to any and all assets in the IoT (Internet of Things) ecosystem under consideration. This security consists of several aspects, the main of which is the security of data residing on the server. Some of the previous researches that were used as the main reference discussed several security-related issues on IoT servers and discussed security on the web with several different tools. Based on these references, a research idea was created to conduct Vulnerability Analysis on IoT Networks Using Raspberry Pi and Owasp (Open Web Application Security Project). The implementation of the network security scheme for IoT using the OWASP tool was successfully carried out by installing OWASP tools on Raspberry pi devices which have the advantage of being more flexible in use than personal computers. After an attack on a local network server, 7 types of vulnerabilities and solutions for repairs were obtained, then the solution stage was carried out and vulnerabilities were obtained on the local network server. The highest level of vulnerability is medium, and the lowest level is low. It can be concluded that the highest vulnerability is obtained in the type of cloud hosting network, because it is connected to the internet. Unlike the local network which is only connected to the local area network.
Item Type: | Thesis (S2) |
---|---|
NIM/NIDN Creators: | 55420110007 |
Uncontrolled Keywords: | Keamanan Jaringan;IoT, Owasp, Raspbery Pi |
Subjects: | 600 Technology/Teknologi > 620 Engineering and Applied Operations/Ilmu Teknik dan operasi Terapan > 621 Applied Physics/Fisika terapan > 621.3 Electrical Engineering, Lighting, Superconductivity, Magnetic Engineering, Applied Optics, Paraphotic Technology, Electronics Communications Engineering, Computers/Teknik Elektro, Pencahayaan, Superkonduktivitas, Teknik Magnetik, Optik Terapan, Tekn |
Divisions: | Pascasarjana > Magister Teknik Elektro |
Depositing User: | Priyo Raharjo |
Date Deposited: | 19 Aug 2022 04:00 |
Last Modified: | 19 Aug 2022 04:00 |
URI: | http://repository.mercubuana.ac.id/id/eprint/68053 |
Actions (login required)
View Item |