ANALISIS LAYANAN KEAMANAN SISTEM KARTU TRANSAKSI ELEKTRONIK MENGGUNAKAN METODE PENETRATION TESTING


Huzain Azis(1*); Farniawati Fattah(2);

(1) Universitas Muslim Indonesia
(2) Universitas Muslim Indonesia
(*) Corresponding Author

  

Abstract


Payment transactions developed along with technological developments, now days technology supports digital payment, each type of digital transaction has its own security services,  this study focus on the analysis of security services (confidentiality, integrity and availability) using the Penetration Testing method on magnetic stripe cards as a payment transaction playground facility, then comparing security services to the Radio Frequency Identification (RFID) electronic transaction tool. The results of this study are RFID electronic transaction cards that provide a more complete security service as an electronic payment transaction.

Keywords


electronic payment transaction; magnetic stripe; radio frequency identification (RFID); penetration testing; security services

  
  

Full Text:

PDF
  

Article Metrics

Abstract view: 2296 times
PDF view: 1245 times
     

Digital Object Identifier

doi  https://doi.org/10.33096/ilkom.v11i2.447.167-174
  

Cite

References


H. Azis, “Penerapan Modifikasi Lack Steganography Dan Layanan Message Authentication Code Pada Komunikasi Multimedia,” 2013.

Y. Salim and H. Azis, “Metode Digital Watermark Pada File Penelitian Dosen,” Ilk. J. Ilm., vol. 9, no. 2, pp. 161–166, 2017.

F. Muharram, H. Azis, and A. R. Manga, “Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES),” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 3, no. 2, pp. 112–115, 2018.

W. C. Easttom, Computer Security Fundamentals, 3rd ed. United States of America: PEARSON, 2011.

C. Meijer and R. Verdult, “Ciphertext-only cryptanalysis on hardened Mifare classic cards,” Proc. ACM Conf. Comput. Commun. Secur., vol. 2015-Octob, pp. 18–30, 2015.

W. D. Wallis, Mathematics in the Real World. London: Birkhausher, 2013.

R. Verdult, “A Toolbox for RFID Protocol Analysis,” CCS’15, 2009.

I. B. Ryzhkov and O. N. Isaev, “Current Status and Trends in Cone Penetration Testing of Soil,” Springer Sci. Media New York, vol. 52, no. 3, pp. 31–32, 2015.

G. Weidmen, Penetration Testing - A hands-on introduction to Hacking.pdf. USA: No Starch Press, Inc., 2014.

S. P. Oriyano, CEHv9 Certified Ethical Hacker Version 9 Study Guide. 2016.

S. A. Rahalkar, Certified Ethical Hacker ( CEH ) Foundation Guide. 2016.

Silicon Labs, Magnetic Stripe Reader. 2008.

Magtek, “Dimensions - Financial Transaction Cards Magnetic Stripe Encoding - Financial Transaction Cards Card Data Format - Track 1 Card Data Format - Track 2 Card Data Format - Track 3 ( ISO 4909 ),” MagTek Inc. P/N 99800004 Rev. 1.03 11/0, no. Cvv, pp. 2–3, 2011.

R. Want, “An Introduction to RFID,” IEEE CS IEEE ComSoc, vol. 4, no. 8, pp. 25–33, 2016.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Huzain Azis, Farniawati Fattah

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.