Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM)

  • Muh. Ahsan Universitas Mercu Buana
  • Dwi Anindyani Rochmah Universitas Mercu Buana

Abstract

A computer network is a network telecommunication that connects one or more computers to exchange data and information with each other. Such huge benefit will certainly be reduced by the presence of interference that arises in the network, when the network only involves local devices or in other words, is not connected to the internet network then interference may be less calculated. However, when the local network is connected to the internet network, a security system will be something that must be considered. Every system and network will undoubtedly have vulnerabilities and can cause damage to the system and even data to cause losses. Tracing activities and identifying system vulnerabilities are effective ways to minimize the risk of continuous vulnerability, therefore this study aims to conduct network analysis to determine vulnerabilities system by applying the open vulnerability assessment system method using Greenbone Vulnerability Management (GVM) as a platform of network scanning and vulnerability management system. The results are achieved by doing the vulnerability analysis to evaluate the results of vulnerability findings and then categorized according to the level of risk, namely high, medium and low. Conducting a vulnerability assessment will improve information security and avoid bad risks that can cause losses. The results achieved doing the vulnerability assessment activity are to provide an evaluation of the risk of vulnerability found and the impact that can be generated and as a preventive measure to increase security system awareness.

Published
2022-11-29
How to Cite
Ahsan, M., & Rochmah, D. (2022). Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM). INTECH (Informatika Dan Teknologi), 3(2), 75-81. https://doi.org/10.54895/intech.v3i2.1509