Analisa Sistem Keamanan Jaringan Nirkabel Menggunakan Kerangka Kerja Issaf Pada PT. Gerak Puncak Lancar
Main Article Content
Abstract
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
œHoneynet Map | BSSN. Accessed: Oct. 21, 2023. [Online]. Available: https://honeynet.bssn.go.id/
M. Rusdan, D. T. H Manurung, and F. Kharisma Genta, œEvaluation of Wireless Network Security Using Information System Security Assessment Framework (ISSAF) (Case Study: PT. Keberlanjutan Strategis Indonesia), TEST Engineering and Management, vol. 83, no. 15714, pp. 15714 “ 15719, 2020.
B. RUTH WITKIN Belle Ruth Witkin -PhD and V. Scholar, œArticles Needs Assessment Since 1981: The State of the Practice.
œDiscover Wi-Fi | Wi-Fi Alliance. Accessed: Apr. 02, 2023. [Online]. Available: https://www.wi-fi.org/discover-wi-fi
F. Fachri, A. Fadlil, I. Riadi, A. Dahlan, Y. Jln Soepomo, and I. Artikel, œAnalisis Keamanan Webserver Menggunakan Penetration Test, JURNAL INFORMATIKA, vol. 8, no. 2, 2021, [Online]. Available: http://ejournal.bsi.ac.id/ejurnal/index.php/ji
I. Yaqoob, S. A. Hussain, S. Mamoon, N. Nasseer, J. Akram, and A. ur Rehman, œPenetration Testing and Vulnerability Assessments, no. February 2021, pp. 1“2, 2017.
A. Zein, J. Raya, P. Serpong, N. 10 Tangerang, and S. Banten, œEvaluasi Keamanan Wireless Lan Menggunakan Issaf (Information System Security Assessment Framework), doi: 10.37277/stch.v32i2.
œInformation Systems Security Assessment Framework (ISSAF) draft 0.2, 2005.
N. A. Chandra, K. Ramli, A. A. P. Ratna, and T. S. Gunawan, œInformation Security Risk Assessment Using Situational Awareness Frameworks and Application Tools, Risks, vol. 10, no. 8, Aug. 2022, doi: 10.3390/risks10080165.
œOWASP Risk Rating Methodology | OWASP Foundation. Accessed: May 01, 2024. [Online]. Available: https://owasp.org/www-community/OWASP_Risk_Rating_Methodology