ATCS System Security Audit Using Nessus

Sri Ariyani, Arta Wijaya


Threats to a web abstraction is likely to occur and it is difficult to say that the web will be safe and free of threats or attacks from the attacker. a web which is connected to the computer network will be accessible to all parties so that there is always a lurking threat. To minimize the threat of a web in advance in the evaluation before it is published to a web server. How the analysis of the web that is by looking for weaknesses that could be the entrance to an attacker control of the web. The term is often used in analyzing the weaknesses that the analysis of vulnerability scan web application using Nessus. On the client side is Nessus will be installed and running to find out the weaknesses that exist. From the research that has been done that the web is analyzed contained one drawback with the category of medium and info. Within these categories can be known weaknesses and solutions to address in detail so that weaknesses can be minimized before the web uploaded on the web server.

Keywords: Nessus, Vulnerability, Network Security, Audit Report, Penetration Test

Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email:
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright ©