ANALISIS LAYANAN KEAMANAN SISTEM KARTU TRANSAKSI ELEKTRONIK MENGGUNAKAN METODE PENETRATION TESTING
Huzain Azis(1*); Farniawati Fattah(2);
(1) Universitas Muslim Indonesia
(2) Universitas Muslim Indonesia
(*) Corresponding Author
AbstractPayment transactions developed along with technological developments, now days technology supports digital payment, each type of digital transaction has its own security services, this study focus on the analysis of security services (confidentiality, integrity and availability) using the Penetration Testing method on magnetic stripe cards as a payment transaction playground facility, then comparing security services to the Radio Frequency Identification (RFID) electronic transaction tool. The results of this study are RFID electronic transaction cards that provide a more complete security service as an electronic payment transaction.
Keywordselectronic payment transaction; magnetic stripe; radio frequency identification (RFID); penetration testing; security services
|
Full Text:PDF |
Article MetricsAbstract view: 2262 timesPDF view: 1232 times |
Digital Object Identifierhttps://doi.org/10.33096/ilkom.v11i2.447.167-174 |
Cite |
References
H. Azis, “Penerapan Modifikasi Lack Steganography Dan Layanan Message Authentication Code Pada Komunikasi Multimedia,” 2013.
Y. Salim and H. Azis, “Metode Digital Watermark Pada File Penelitian Dosen,” Ilk. J. Ilm., vol. 9, no. 2, pp. 161–166, 2017.
F. Muharram, H. Azis, and A. R. Manga, “Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES),” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 3, no. 2, pp. 112–115, 2018.
W. C. Easttom, Computer Security Fundamentals, 3rd ed. United States of America: PEARSON, 2011.
C. Meijer and R. Verdult, “Ciphertext-only cryptanalysis on hardened Mifare classic cards,” Proc. ACM Conf. Comput. Commun. Secur., vol. 2015-Octob, pp. 18–30, 2015.
W. D. Wallis, Mathematics in the Real World. London: Birkhausher, 2013.
R. Verdult, “A Toolbox for RFID Protocol Analysis,” CCS’15, 2009.
I. B. Ryzhkov and O. N. Isaev, “Current Status and Trends in Cone Penetration Testing of Soil,” Springer Sci. Media New York, vol. 52, no. 3, pp. 31–32, 2015.
G. Weidmen, Penetration Testing - A hands-on introduction to Hacking.pdf. USA: No Starch Press, Inc., 2014.
S. P. Oriyano, CEHv9 Certified Ethical Hacker Version 9 Study Guide. 2016.
S. A. Rahalkar, Certified Ethical Hacker ( CEH ) Foundation Guide. 2016.
Silicon Labs, Magnetic Stripe Reader. 2008.
Magtek, “Dimensions - Financial Transaction Cards Magnetic Stripe Encoding - Financial Transaction Cards Card Data Format - Track 1 Card Data Format - Track 2 Card Data Format - Track 3 ( ISO 4909 ),” MagTek Inc. P/N 99800004 Rev. 1.03 11/0, no. Cvv, pp. 2–3, 2011.
R. Want, “An Introduction to RFID,” IEEE CS IEEE ComSoc, vol. 4, no. 8, pp. 25–33, 2016.
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Huzain Azis, Farniawati Fattah
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.