The conclusion of this research states that the highest vulnerability is obtained in the cloud hosting network type because it is connected to the internet, and it becomes a different thing on a local network that is only connected to a local area network.
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem. Some previous research references make the topic of discussion in this research, namely security on IoT servers. On that basis, the idea was created to conduct vulnerability analysis on the IoT network using Raspberry Pi and OWASP (Open Web Application Security Project). The application of OWASP in IoT networks has proven successful on Raspberry Pi because of its flexibility compared to Personal Computer (PC). This is evidenced when an attack on a local network server is carried out, 7 types of vulnerabilities are found and then the stages of solving solutions to vulnerabilities on the server are carried out. The highest level of vulnerability obtained is categorized as “Medium” and the lowest level obtained is categorized as “Low”. So, the conclusion of this research states that the highest vulnerability is obtained in the cloud hosting network type because it is connected to the internet, and it becomes a different thing on a local network that is only connected to a local area network.