ANALISIS KEAMANAN JARINGAN WIFI DAN CCTV MENGGUNAKAN ZENMAP SEBAGAI NETWORK VULNERABILITY SCANNER

Authors

  • Helena Dorthea Fiay Universitas Kristen Satya Wacana
  • Magdalena A. Ineke Pakereng M Universitas Kristen Satya Wacana

DOI:

https://doi.org/10.31539/dr1nrv25

Abstract

 Penelitian ini membahas analisis keamanan jaringan WiFi dan sistem CCTV berbasis IP dengan memanfaatkan Zenmap sebagai antarmuka grafis dari Nmap. Latar belakang penelitian berangkat dari meningkatnya penggunaan perangkat Internet of Things (IoT) yang sering kali memiliki konfigurasi keamanan lemah, seperti penggunaan kata sandi bawaan, enkripsi rendah, serta firmware yang tidak diperbarui. Melalui metode vulnerability assessment, penelitian ini melakukan pemindaian jaringan untuk mengidentifikasi host aktif, port terbuka, layanan yang berjalan, serta potensi kerentanan pada perangkat WiFi dan CCTV di Studio Pemrograman S-Code Salatiga. Hasil pemindaian menunjukkan adanya port berisiko yang terbuka serta layanan yang rentan terhadap eksploitasi. Analisis dilakukan secara deskriptif- kualitatif dengan menilai tingkat risiko dan memberikan rekomendasi mitigasi, seperti pembaruan firmware, penggantian kredensial default, penerapan WPA3, serta segmentasi jaringan. Penelitian ini diharapkan dapat menjadi acuan praktis bagi administrator jaringan maupun organisasi lain dalam meningkatkan keamanan infrastruktur berbasis IoT.

Kata Kunci: Keamanan Jaringan, WiFi, CCTV/IP Camera, Zenmap / Nmap, Vulnerability Assessment

References

Abdallah, A. E., Hamdan, M., Gismalla, M. S. M., Ibrahim, A. O., Aljurayban, N. S., Nagmeldin, W., & Khairi, M. H. H. (2023). Detection of management-frames-based denial-of-service attack in wireless LAN network using artificial neural network. Sensors, 23(5), 2663. https://doi.org/10.3390/s23052663

Bellamkonda, S. (2022). Ethical hacking in network security: Assessing vulnerabilities to improve defenses. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(5). https://doi.org/10.15680/ijmrset.2022.0505001

Datta, A., Imran, A. T. M. A., & Biswas, C. (2023). Network automation: Enhancing operational efficiency across the network environment. ICRRD Quality Index Research Journal, 4(1). https://doi.org/10.53272/icrrd.v4i1.1

Farraj, A., & Hammad, E. (2024). A physical-layer security cooperative framework for mitigating interference and eavesdropping attacks in Internet of Things environments. Sensors, 24(16), 5171. https://doi.org/10.3390/s24165171

Hamada, R., & Kuzminykh, I. (2023). Exploitation techniques of IoST vulnerabilities in air-gapped networks and security measures: A systematic review. Signals, 4(4), 687–707. https://doi.org/10.3390/signals4040038

Heverin, T., Deitz, E., Cohen, E., & Wilkes, J. (2023). Development and analysis of a reconnaissance-technique knowledge graph. In Proceedings of the International Conference on Cyber Warfare and Security (Vol. 18, No. 1, pp. 128–136). https://doi.org/10.34190/iccws.18.1.1041

Muharrom, M., & Saktiansyah, A. (2023). Analysis of vulnerability assessment technique implementation on network using OpenVAS. International Journal of Engineering and Computer Science Applications, 2(2), 51–58. https://doi.org/10.30812/ijecsa.v2i2.3297

Olaniyi, O. O., Okunleye, O. J., Olabanji, S. O., Asonze, C. U., & Ajayi, S. A. (2023). IoT security in the era of ubiquitous computing: A multidisciplinary approach to addressing vulnerabilities and promoting resilience. Asian Journal of Research in Computer Science, 16(4), 354–371. https://doi.org/10.9734/ajrcos/2023/v16i4397

Pidlisnyi, Y. (2025). Audit of IoT networks: Assessing vulnerabilities and protecting against cyber attacks. Technical Sciences and Technologies, 1(39), 170–183. https://doi.org/10.25140/2411-5363-2025-1(39)-170-183

Priambodo, D. F., Rifansyah, A. D., & Hasbi, M. (2023). Penetration testing web XYZ berdasarkan OWASP risk rating. Teknika, 12(1), 33–46. https://doi.org/10.34148/teknika.v12i1.571

Ryan, M., & Rozier, K. Y. (2024). A survey and analysis of recent IoT device vulnerabilities (Preprint). https://doi.org/10.21203/rs.3.rs-3982790/v1

Satria, W. (2024). Analysis of performance and security in modern computer networks. Dharmawangsa: International Journal of the Social Sciences, Education and Humanities, 5(2), 113–120. https://doi.org/10.46576/ijsseh.v5i2.4683

Sonavane, V., Aaglave, R., Birajdar, A., Bedre, R., & Pardeshi, V. (2025). Detection of criminal activities and anomalies through CCTVs. International Research Journal on Advanced Engineering Hub, 3(5), 2353–2359. https://doi.org/10.47392/irjaeh.2025.0348

Zhao, Z., Srinivasa, S., & Vasilomanolakis, E. (2023). SweetCam: An IP camera honeypot. In Proceedings of the 5th Workshop on CPS & IoT Security and Privacy (pp. 75–81). https://doi.org/10.1145/3605758.3623495

Downloads

Published

2026-03-10