Rais, Sri Kusumo Fathoni (2026) Deteksi Ancaman Keamanan Siber melalui Monitoring Log, Malware Analysis, dan Web Penetration Testing. Project Report. [s.n.], [s.l.]. (Unpublished)
|
Text
5025221233-Report_Project.pdf - Accepted Version Restricted to Repository staff only Download (1MB) | Request a copy |
Abstract
Di era digital, perkembangan teknologi mendorong peningkatan signifikan penggunaan internet untuk berbagai keperluan. Pada Juli 2025, jumlah pengguna internet global mencapai 5,65 miliar, meningkat tajam dibandingkan 2,98 miliar pengguna sepuluh tahun sebelumnya. Peningkatan ini turut memperluas peluang terjadinya serangan siber. Berdasarkan laporan IMF (2024) frekuensi serangan siber pascapandemi COVID-19 hampir dua kali lipat dibandingkan periode sebelum pandemi, yang menunjukkan meningkatnya kerentanan sistem informasi global dan perlunya penguatan upaya keamanan siber serta analisis forensik digital. PT Dua Empat Tujuh merupakan perusahaan yang bergerak di bidang solusi teknologi informasi dan layanan digital, yang dalam operasionalnya mengelola berbagai sistem dan infrastruktur TI. Untuk menjaga kerahasiaan, integritas, dan ketersediaan data serta layanan yang dimiliki, perusahaan menerapkan berbagai mekanisme keamanan siber, termasuk pemantauan keamanan secara berkelanjutan, analisis insiden, serta pengujian keamanan sistem. Kegiatan magang ini dilaksanakan sebagai sarana untuk memperoleh pengalaman praktis dan pemahaman nyata mengenai penerapan keamanan siber di lingkungan industri. Selama pelaksanaan magang di PT Dua Empat Tujuh, saya terlibat dalam berbagai aktivitas utama di bidang keamanan siber, meliputi pemantauan dan analisis log keamanan menggunakan Wazuh untuk mengidentifikasi potensi ancaman melalui indikator kompromi (IoC), analisis statis dan dinamis terhadap sampel malware untuk memahami karakteristik serta perilaku berbahaya, serta pelaksanaan penetration testing pada website internal perusahaan untuk mengidentifikasi kerentanan keamanan dan memberikan rekomendasi perbaikan.
=================================================================================================================================
In the digital era, technological developments have driven a significant increase in the use of the internet for various purposes. In July 2025, the number of global internet users reached 5.65 billion, a sharp increase compared to 2.98 billion usersten years earlier. This increase has also expanded the opportunities for cyber attacks. According to an IMF report (2024), the frequency of cyber attacks after the COVID-19 pandemic has nearly doubled compared to the period before the pandemic, indicating an increase in the vulnerability of global information systems and the need to strengthen cybersecurity efforts and digital forensic analysis. PT Dua Empat Tujuh is a company engaged in information technology solutions and digital services, which manages various IT systems and infrastructure in its operations. To maintain the confidentiality, integrity, and availability of its data and services, the company implements various cybersecurity mechanisms, including continuous security monitoring, incident analysis, and system security testing. This internship was conducted as a means to gain practical experience and real-world understanding of cybersecurity implementation in an industrial environment. During the internship at PT Dua Empat Tujuh, I was involved in various key activities in the field of cybersecurity, including monitoring and analyzing security logs using Wazuh to identify potential threats through indicators of compromise (IoC), static and dynamic analysis of malware samples to understand characteristics and malicious behavior, as well as conducting penetration testing on the company's internal website to identify security vulnerabilities and provide recommendations for improvement.
| Item Type: | Monograph (Project Report) |
|---|---|
| Uncontrolled Keywords: | Keamanan Siber, Monitoring, Indikator Kompromi (IoC), Analisis Malware, Penetration Testing, Cybersecurity, Monitoring, Indicators of Compromise (IoC), Malware Analysis, Penetration Testing |
| Subjects: | Q Science > Q Science (General) > Q337.5 Pattern recognition systems T Technology > T Technology (General) > T57.5 Data Processing T Technology > T Technology (General) > T57.84 Heuristic algorithms. T Technology > TA Engineering (General). Civil engineering (General) > TA158.7 Computer network resources |
| Divisions: | Faculty of Information Technology > Informatics Engineering > 55201-(S1) Undergraduate Thesis |
| Depositing User: | Sri Kusumo Fathoni Rais |
| Date Deposited: | 20 Feb 2026 01:52 |
| Last Modified: | 20 Feb 2026 01:52 |
| URI: | http://repository.its.ac.id/id/eprint/129981 |
Actions (login required)
![]() |
View Item |
