ANALISIS LAYANAN KEAMANAN SISTEM KARTU TRANSAKSI ELEKTRONIK MENGGUNAKAN METODE PENETRATION TESTING

Huzain Azis, Farniawati Fattah

Abstract


Payment transactions developed along with technological developments, now days technology supports digital payment, each type of digital transaction has its own security services,  this study focus on the analysis of security services (confidentiality, integrity and availability) using the Penetration Testing method on magnetic stripe cards as a payment transaction playground facility, then comparing security services to the Radio Frequency Identification (RFID) electronic transaction tool. The results of this study are RFID electronic transaction cards that provide a more complete security service as an electronic payment transaction.

Keywords


electronic payment transaction; magnetic stripe; radio frequency identification (RFID); penetration testing; security services

Full Text:

PDF

References


H. Azis, “Penerapan Modifikasi Lack Steganography Dan Layanan Message Authentication Code Pada Komunikasi Multimedia,” 2013.

Y. Salim and H. Azis, “Metode Digital Watermark Pada File Penelitian Dosen,” Ilk. J. Ilm., vol. 9, no. 2, pp. 161–166, 2017.

F. Muharram, H. Azis, and A. R. Manga, “Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES),” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 3, no. 2, pp. 112–115, 2018.

W. C. Easttom, Computer Security Fundamentals, 3rd ed. United States of America: PEARSON, 2011.

C. Meijer and R. Verdult, “Ciphertext-only cryptanalysis on hardened Mifare classic cards,” Proc. ACM Conf. Comput. Commun. Secur., vol. 2015-Octob, pp. 18–30, 2015.

W. D. Wallis, Mathematics in the Real World. London: Birkhausher, 2013.

R. Verdult, “A Toolbox for RFID Protocol Analysis,” CCS’15, 2009.

I. B. Ryzhkov and O. N. Isaev, “Current Status and Trends in Cone Penetration Testing of Soil,” Springer Sci. Media New York, vol. 52, no. 3, pp. 31–32, 2015.

G. Weidmen, Penetration Testing - A hands-on introduction to Hacking.pdf. USA: No Starch Press, Inc., 2014.

S. P. Oriyano, CEHv9 Certified Ethical Hacker Version 9 Study Guide. 2016.

S. A. Rahalkar, Certified Ethical Hacker ( CEH ) Foundation Guide. 2016.

Silicon Labs, Magnetic Stripe Reader. 2008.

Magtek, “Dimensions - Financial Transaction Cards Magnetic Stripe Encoding - Financial Transaction Cards Card Data Format - Track 1 Card Data Format - Track 2 Card Data Format - Track 3 ( ISO 4909 ),” MagTek Inc. P/N 99800004 Rev. 1.03 11/0, no. Cvv, pp. 2–3, 2011.

R. Want, “An Introduction to RFID,” IEEE CS IEEE ComSoc, vol. 4, no. 8, pp. 25–33, 2016.




DOI: https://doi.org/10.33096/ilkom.v11i2.447.167-174

Refbacks

  • There are currently no refbacks.


Creative Commons License
ILKOM Jurnal Ilmiah work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.