Author:
Ramadhan Rizdqi Akbar,Aresta Redho Maland,Hariyadi Dedy
Abstract
Abstract
In general, system security has become a crucial element in the digital aspect. Technically, evaluating the system there are aspects, one of which is by conducting a security assessment. Specifically, each system that will be evaluated is the essence of vulnerability search. The information security assessment is a form of awareness regarding cyberattacks that always increases from year to year. The assessment process can be carried out by an internal team and/or external auditor. The stages of evaluation by internal teams are certainly different from those of external parties. External auditors in conducting assessments need to learn or get as much information as possible related to the target, which in this case is in the form of a subdomain. Therefore, we need applications that support effective and efficient Information Gathering to assist in analysis and reporting. There are still many Information Gathering applications that do not include reporting and data validation systems. In this study, it is proposed to develop applications to support the Information Gathering stage which makes it easier for Cyber Security researchers/analysts.
Reference12 articles.
1. SEMbySEM in Action: Domain Name Registry Service Through a Semantic Middleware;Sinaci;eChallenges, 2010,2010
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding Local Government Cybersecurity Policy: A Concept Map and Framework;Information;2024-06-10
2. Detecting Subdomain TakeOver Threats and Real-Time Alerting for Rapid Response;2023 26th International Conference on Computer and Information Technology (ICCIT);2023-12-13
3. Backslash map: An Automated Vulnerability Scanner;2023 Eleventh International Conference on Intelligent Computing and Information Systems (ICICIS);2023-11-21
4. Log4j Vulnerability;Lecture Notes in Networks and Systems;2023
5. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems;Lightweight Cryptographic Techniques and Cybersecurity Approaches;2022-10-05