In general, system security has become a crucial element in the digital aspect. Technically, evaluating the system there are aspects, one of which is by conducting a security assessment. Specifically, each system that will be evaluated is the essence of vulnerability search. The information security assessment is a form of awareness regarding cyberattacks that always increases from year to year. The assessment process can be carried out by an internal team and/or external auditor. The stages of evaluation by internal teams are certainly different from those of external parties. External auditors in conducting assessments need to learn or get as much information as possible related to the target, which in this case is in the form of a subdomain. Therefore, we need applications that support effective and efficient Information Gathering to assist in analysis and reporting. There are still many Information Gathering applications that do not include reporting and data validation systems. In this study, it is proposed to develop applications to support the Information Gathering stage which makes it easier for Cyber Security researchers/analysts.
In the 21st century, technology is increasing rapidly, the increase in technology is the potential for cyber attacks on today's technological infrastructure. Malware that is designed to damage computer systems without the owner's knowledge at a considerable cost becomes a cyber crime. This macro malware analysis is to study the code and behavior of malware when run on an operating system. To analyze this malware, this study uses a static analysis method by analyzing malware without running the program.
Kemajuan teknologi membuat berbagai layanan komunikasi tumbuh dengan pesat. Dengan ini memungkinkan ribuan orang melakukan komunikasi melalui jaringan komputer secara global. Di sisi lain terdapat ancaman dalam keamanan data dan informasi. Sistem keamanan data diperlukan untuk melindungi data dan informasi melalui jaringan komunikasi. Untuk menjamin keamanan pesan, data dan infotmasi dalam pertukaran data adalah kriptografi. Kriptografi menggunakan algoritma pengkodean yang mendukung kebutuhan keamanan informasi, yaitu kerahasiaan dan keaslian. Dalam aplikasi kriptografi ini menggunakan metode ROT13, yang merupakan algoritma kritografi klasik yang sudah terpecahkan. Maka dari itu dengan aplikasi kroptografi dengan metode baru, yaitu multi enkripsi ROT13. Multi enkripsi pada ROT13 adalah penggabungan teknik ROT13 dengan kode ASCII yang akan merubah sebuah pesan menjadi symbol. Ini merupakan algoritma kriptografi klasik baru sehingga akan sulit dipecahkan karena menggunakan metode multi enkripsi.Keywords—component, formatting, style, styling, insert.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.