Security Analysis System E-learning at one of the University in Indonesia

  • Authors

    • Entik Insanudin
    • Bambang Pudjoatmodjo
    https://doi.org/10.14419/ijet.v8i1.9.26686
  • E-learning, System Scurity, Vulnerability, Sniffing.
  • E-learning is one of the services that were developed massively in education. Therefore the application of the system security is also very taken into account, this is done in order to user comfort e-learning system mainly reflects the e-learning system for on-line or better known by the term e-learning. In this research, the authors attempted to analyze the security system e-learning at one of the universities in Indonesia by using the tools sniffing cain and abel to detect the vulnerability when a user e-learning while doing logged if the username and password is visible and tools Acunetix Web vulnerability scanner to analyze more remote security loopholes contained in e-learning system at one of the universities in Indonesia, In additions Acunetix Web Vulnerability scanning tools can inform the whole of each vulnerability found on e-learning system at one of the universities in Indonesia located on level 3 High, this shows that e-learning on one of the university is very vulnerable to threats.

     

     

  • References

    1. [1] Anonymous. 2008. Accreditation Standards and Procedures Undergraduate Studies Program. Ministry of Education, National Accreditation Board for Higher Education, Jakarta.

      [2] Ramdhani, M. A, dan Wulan, E. R. (2012). The Analysis of Determinant Factors In Software Design For Computer Assisted Instruction. IJSTR, 1 (8), 69-73.

      [3] Indrajit, R. E., dan R. Djokopranoto. 2004. College of Modern Management. School of Information Management and Computer PERBANAS, Jakarta.

      [4] Pernul, G. (1997). Database Security and Internet Systems, Department of Information Systems University of Essen.

      [5] Raharjo, B. (2002). “Internet-Based Information System Securityâ€. PT Insan Indonesia – Bandung dan PT INDOCISC – Jakarta.

      [6] Sasongko, A. (2011). “Web Server Security Guideâ€. The Ministry of Communication and Information of the Republic of Indonesia, Information Security Directorate, The Directorate-General for Informatics Applications.

      [7] MSI Labs. A Real World Review,â€ACUNETIX WEB VULNERABILITI SCANNERâ€. http://www.acunetix.com.

      [8] Date, C.J. (2000). An Introduction To Database Systems, Seventh Edition, Addison-Wesley.

      [9] Slamet, C. (2012). The Implementation of Strategic Planning for Information System in Educational Foundation. International Journal of Basic and Applied Science, Vol. 01, No. 01, July 2012, 89-94.

      [10] Martin, J. (1975). Computer Data-Base Organization. Prentice Hall National Computer Security Center, A Guide To Understanding Discretionary Access Control in Trusted Systems, Version 1, National Computer Security Center, 30 September 1987.

      [11] Sutanta, E. (2008). “Security Analysis System Application (Application E-learning Case Studies in IST AKPRIND YOGYAKARTAâ€

      [12] Date, C.J. (2000). An Introduction To Database Systems, Seventh Edition, Addison-Wesley.

      [13] Akbar, M. dan Perdana, I. “Comparative Analysis Between Web Application Vulnerability Scanner Acunetix and Nikto.

      [14] Lukito, R. B. (2008), Analysis and Security Policy Studies, A Case Study System E-learning At University BCD.

      [15] Michael E. Whitman, Herbert J. Mattord. (2010). Management of Information Security 3rd Edition, Boston, USA.

      [16] Ellis, J. dan Speed, T. (2003). Internet Security : “A Jumpstart for Systems Administrators and IT Managersâ€

  • Downloads

  • How to Cite

    Insanudin, E., & Pudjoatmodjo, B. (2019). Security Analysis System E-learning at one of the University in Indonesia. International Journal of Engineering & Technology, 8(1.9), 359-363. https://doi.org/10.14419/ijet.v8i1.9.26686