Abstrakt: |
The Raspberry Pi has been increasingly utilized as a network-attached storage (NAS) server, with Open Media Vault (OMV) software handling file and data storage. Access to the NAS server is provided through a Local Area Network (LAN), where open ports can pose potential security risks, enabling unauthorized intrusion. In this study, the network design method incorporating the PPDIOO model was employed to conduct a vulnerability assessment and to offer security recommendations for the OMV Cloud server running on Raspberry Pi. The analysis was executed using two prominent security tools, Nmap and Nessus. Upon employing Nmap and Nessus in the evaluation, several security vulnerabilities were identified on the OMV Cloud server utilizing Raspberry Pi. Through continuous monitoring and analysis, open ports were detected, including: port 22 (SSH), port 80 (WEB), port 111 (rcpbind), port 139 (netbios-ssn), port 445 (netbios-ssn), port 2049 (NFS), port 3389 (ms-wbt-server), and port 5357 (WSDAPI). Based on the assessment, seven solutions were proposed, addressing three vulnerability categories: high (2%), medium (2%), and informational (96%). This comprehensive examination provides valuable insight into securing the OMV Cloud server, enhancing the overall security of Raspberry Pi-based NAS implementations. [ABSTRACT FROM AUTHOR] |