ANALISIS KEAMANAN JARINGAN WIFI DAN CCTV MENGGUNAKAN ZENMAP SEBAGAI NETWORK VULNERABILITY SCANNER
DOI:
https://doi.org/10.31539/dr1nrv25Abstract
Penelitian ini membahas analisis keamanan jaringan WiFi dan sistem CCTV berbasis IP dengan memanfaatkan Zenmap sebagai antarmuka grafis dari Nmap. Latar belakang penelitian berangkat dari meningkatnya penggunaan perangkat Internet of Things (IoT) yang sering kali memiliki konfigurasi keamanan lemah, seperti penggunaan kata sandi bawaan, enkripsi rendah, serta firmware yang tidak diperbarui. Melalui metode vulnerability assessment, penelitian ini melakukan pemindaian jaringan untuk mengidentifikasi host aktif, port terbuka, layanan yang berjalan, serta potensi kerentanan pada perangkat WiFi dan CCTV di Studio Pemrograman S-Code Salatiga. Hasil pemindaian menunjukkan adanya port berisiko yang terbuka serta layanan yang rentan terhadap eksploitasi. Analisis dilakukan secara deskriptif- kualitatif dengan menilai tingkat risiko dan memberikan rekomendasi mitigasi, seperti pembaruan firmware, penggantian kredensial default, penerapan WPA3, serta segmentasi jaringan. Penelitian ini diharapkan dapat menjadi acuan praktis bagi administrator jaringan maupun organisasi lain dalam meningkatkan keamanan infrastruktur berbasis IoT.
Kata Kunci: Keamanan Jaringan, WiFi, CCTV/IP Camera, Zenmap / Nmap, Vulnerability Assessment
References
Abdallah, A. E., Hamdan, M., Gismalla, M. S. M., Ibrahim, A. O., Aljurayban, N. S., Nagmeldin, W., & Khairi, M. H. H. (2023). Detection of management-frames-based denial-of-service attack in wireless LAN network using artificial neural network. Sensors, 23(5), 2663. https://doi.org/10.3390/s23052663
Bellamkonda, S. (2022). Ethical hacking in network security: Assessing vulnerabilities to improve defenses. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(5). https://doi.org/10.15680/ijmrset.2022.0505001
Datta, A., Imran, A. T. M. A., & Biswas, C. (2023). Network automation: Enhancing operational efficiency across the network environment. ICRRD Quality Index Research Journal, 4(1). https://doi.org/10.53272/icrrd.v4i1.1
Farraj, A., & Hammad, E. (2024). A physical-layer security cooperative framework for mitigating interference and eavesdropping attacks in Internet of Things environments. Sensors, 24(16), 5171. https://doi.org/10.3390/s24165171
Hamada, R., & Kuzminykh, I. (2023). Exploitation techniques of IoST vulnerabilities in air-gapped networks and security measures: A systematic review. Signals, 4(4), 687–707. https://doi.org/10.3390/signals4040038
Heverin, T., Deitz, E., Cohen, E., & Wilkes, J. (2023). Development and analysis of a reconnaissance-technique knowledge graph. In Proceedings of the International Conference on Cyber Warfare and Security (Vol. 18, No. 1, pp. 128–136). https://doi.org/10.34190/iccws.18.1.1041
Muharrom, M., & Saktiansyah, A. (2023). Analysis of vulnerability assessment technique implementation on network using OpenVAS. International Journal of Engineering and Computer Science Applications, 2(2), 51–58. https://doi.org/10.30812/ijecsa.v2i2.3297
Olaniyi, O. O., Okunleye, O. J., Olabanji, S. O., Asonze, C. U., & Ajayi, S. A. (2023). IoT security in the era of ubiquitous computing: A multidisciplinary approach to addressing vulnerabilities and promoting resilience. Asian Journal of Research in Computer Science, 16(4), 354–371. https://doi.org/10.9734/ajrcos/2023/v16i4397
Pidlisnyi, Y. (2025). Audit of IoT networks: Assessing vulnerabilities and protecting against cyber attacks. Technical Sciences and Technologies, 1(39), 170–183. https://doi.org/10.25140/2411-5363-2025-1(39)-170-183
Priambodo, D. F., Rifansyah, A. D., & Hasbi, M. (2023). Penetration testing web XYZ berdasarkan OWASP risk rating. Teknika, 12(1), 33–46. https://doi.org/10.34148/teknika.v12i1.571
Ryan, M., & Rozier, K. Y. (2024). A survey and analysis of recent IoT device vulnerabilities (Preprint). https://doi.org/10.21203/rs.3.rs-3982790/v1
Satria, W. (2024). Analysis of performance and security in modern computer networks. Dharmawangsa: International Journal of the Social Sciences, Education and Humanities, 5(2), 113–120. https://doi.org/10.46576/ijsseh.v5i2.4683
Sonavane, V., Aaglave, R., Birajdar, A., Bedre, R., & Pardeshi, V. (2025). Detection of criminal activities and anomalies through CCTVs. International Research Journal on Advanced Engineering Hub, 3(5), 2353–2359. https://doi.org/10.47392/irjaeh.2025.0348
Zhao, Z., Srinivasa, S., & Vasilomanolakis, E. (2023). SweetCam: An IP camera honeypot. In Proceedings of the 5th Workshop on CPS & IoT Security and Privacy (pp. 75–81). https://doi.org/10.1145/3605758.3623495
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Helena Dorthea Fiay, Magdalena A. Ineke Pakereng M

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

