{"id":2683,"date":"2019-01-27T00:17:07","date_gmt":"2019-01-26T17:17:07","guid":{"rendered":"https:\/\/lasbontech.co.id\/lasbon\/?page_id=2683"},"modified":"2019-01-28T11:36:55","modified_gmt":"2019-01-28T04:36:55","slug":"vapt","status":"publish","type":"page","link":"https:\/\/lasbontech.co.id\/en\/vapt\/","title":{"rendered":"VAPT"},"content":{"rendered":"<section class=\"kc-elm kc-css-532595 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-630341 kc_col-sm-8 kc_column col-md-8 col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-886128 kc_text_block\"><\/p>\n<p><strong>I. Pengertian VAPT<\/strong><\/p>\n<p><strong>Vulnerability Assessment<\/strong> adalah suatu langkah untuk mendeteksi, mengidentifikasi dan mempelajari kelemahan yang dimiliki dari suatu sistem atau infrastruktur yang berbasis teknologi informasi.<\/p>\n<p><strong>Security Penetration Testing<\/strong> adalah pengujian keamanan suatu sistem informasi untuk mengetahui kelemahan sistem, dengan melakukan serangan ke sistem dengan memanfaatkan vulnerability (hacking), tanpa melakukan tindakan yang menyebabkan kerusakan sistem.<\/p>\n<p><strong>II. Tujuan VAPT<\/strong><\/p>\n<ul>\n<li>Mencari kelemahan atau kerentanan sebuah sistem<\/li>\n<li>Mengetahui apa yang perlu diperbaiki dari sistemnya agar sistemnya cukup tangguh dari potensi kegagalan ataupun potensi dibobol hacker\/cracker<\/li>\n<li>Mendapatkan daftar kelemahan yang dimiliki oleh sistem kita dan penyebabnya serta rekomendasi untuk memperbaiki kelemahan ataupun menutup lubang keamanan yang masih ada.<\/li>\n<li>Mencari kelemahan sistem dan setelah ditemukan kemudian kelemahan sistem tersebut dicoba untuk dieksploitasi untuk mengetahui kemungkinan-kemungkinan dampak yang terjadi.<\/li>\n<li>Sebuah &nbsp;tindakan &nbsp;preventif &nbsp;oleh &nbsp;sebuah &nbsp;organisasi &nbsp;untuk &nbsp;mencegah &nbsp;sistemnya &nbsp;dibobol &nbsp;oleh blackhat hacker (cracker).<\/li>\n<li>Melindungi aset perusahaan<\/li>\n<\/ul>\n<p><strong>III. Jasa VAPT Kami<\/strong><\/p>\n<ul>\n<li>Network Infrastructure Vulnerability Assessment dan Penetration Testing<\/li>\n<li>Web Application Vulnerability Assessment dan Penetration Testing<\/li>\n<li>Mobile Apps Penetration Testing<\/li>\n<li>Software Penetration Testing and Reverse Engineering<\/li>\n<li>Firewall Penetration Testing<\/li>\n<li>Server dan Infrastructure Vulnerability Assessment dan Penetration Testing<\/li>\n<li>Server dan Infrastructure Benchmark Test<\/li>\n<li>Cryptography Security Testing<\/li>\n<li>Source Code Analyze<\/li>\n<\/ul>\n<p>\n<\/div>\n<div class=\"kc-elm kc-css-570976 crumina-module crum-button align-center\">\n\t\t\t<a class=\"btn btn-medium  btn--primary\" href=\"https:\/\/lasbontech.co.id\/lasbon\/contact\/\" target=\"_self\">\n\t\t\t<span class=\"text\">Hubungi Kami untuk Info Lebih Lanjut<\/span>\t\t<\/a>\n\t<\/div><\/div><\/div><div class=\"kc-elm kc-css-23709 kc_col-sm-4 kc_column col-md-4 col-sm-12\"><div class=\"kc-col-container\"><header class=\"kc-elm kc-css-407234 crumina-module crumina-heading align-center \">\n\t\n\t\t<h5 class=\" heading-title\" >VAPT Video<\/h5>\n\n<\/header>\n<div class=\"kc-elm kc-css-708854 crumina-module crumina-our-video\">\n\t<div class=\"video-thumb with-border-r\">\n\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/uploads\/2019\/01\/computer-vulnerability-670x335.jpg\" alt=\"video\">\n\t\t<a href=\"https:\/\/www.youtube.com\/watch?v=CSVYNlFkHFc\" class=\"video-control js-popup-iframe\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/themes\/utouch\/img\/play.png\" alt=\"play\">\n\t\t<\/a>\n\t<\/div>\n<\/div><div class=\"kc-elm kc-css-388067 crumina-module crumina-module-slider pagination-bottom\">\n\n\t<div class=\"swiper-container slider-tripple-right-image\"\n\t\t data-show-items=\"1\"\n\t\t data-effect=\"coverflow\"\n\t\t data-speed=\"338\"\n\t\t data-autoplay=\"1000\"\n\t\t data-centered-slider=\"false\"\n\t\t data-stretch=\"170\" data-depth=\"195\">\n\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/uploads\/2019\/01\/1-LQe3se5v_7CuJ8gEtYNT-w.jpeg\"\n                         alt=\"\"\n                         title=\"1 LQe3se5v_7CuJ8gEtYNT-w\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/uploads\/2019\/01\/computer-vulnerability-670x335.jpg\"\n                         alt=\"\"\n                         title=\"computer-vulnerability-670&#215;335\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/uploads\/2019\/01\/penetration.jpg\"\n                         alt=\"\"\n                         title=\"penetration\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/uploads\/2019\/01\/penetration-testing.jpg\"\n                         alt=\"\"\n                         title=\"penetration-testing\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/lasbontech.co.id\/wp-content\/uploads\/2019\/01\/pentest-your-website-professionally.jpg\"\n                         alt=\"\"\n                         title=\"pentest-your-website-professionally\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<!-- If we need pagination -->\n\t\t<div class=\"swiper-pagination\"><\/div>\n\t<\/div>\n\n<\/div><div class=\"widget widget_utouch_facebook kc-elm kc-css-603686\"><h2 class=\"widgettitle\">Facebook<\/h2>\n\t\t<div class=\"fb-page\"\n\t\t     data-href=\"https:\/\/www.facebook.com\/Lasbon-Technology-Indonesia-329345911122682\"\n\t\t     data-width=\"300\"\n\t\t     data-height=\"\"\n\t\t     data-small-header=\"false\"\n\t\t     data-hide-cover=\"false\"\n\t\t     data-show-facepile=\"true\"\n\t\t     data-show-posts=\"false\"\n\t\t     data-adapt-container-width=\"true\">\n\t\t<\/div>\n\t\t<div id=\"fb-root\"><\/div>\n        <script type=\"text\/javascript\" >\t\t\t(function (d, s, id) {\n\t\t\t\tvar js, fjs = d.getElementsByTagName(s)[0];\n\t\t\t\tif (d.getElementById(id)) return;\n\t\t\t\tjs = d.createElement(s);\n\t\t\t\tjs.id = id;\n\t\t\t\tjs.src = \"\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&version=v2.3\";\n\t\t\t\tfjs.parentNode.insertBefore(js, fjs);\n\t\t\t}(document, 'script', 'facebook-jssdk'));\n        <\/script><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>I. Pengertian VAPT Vulnerability Assessment adalah suatu langkah untuk mendeteksi, mengidentifikasi dan mempelajari kelemahan yang dimiliki dari suatu sistem atau infrastruktur yang berbasis teknologi informasi. Security Penetration Testing adalah pengujian keamanan suatu sistem informasi untuk mengetahui kelemahan sistem, dengan melakukan serangan ke sistem dengan memanfaatkan vulnerability (hacking), tanpa melakukan tindakan yang menyebabkan kerusakan sistem. II. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2683","page","type-page","status-publish","hentry"],"aioseo_notices":[],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/pages\/2683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/comments?post=2683"}],"version-history":[{"count":62,"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/pages\/2683\/revisions"}],"predecessor-version":[{"id":3079,"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/pages\/2683\/revisions\/3079"}],"wp:attachment":[{"href":"https:\/\/lasbontech.co.id\/en\/wp-json\/wp\/v2\/media?parent=2683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}