SECURITY HARDENING SISTEM OPERASI VIRTUAL PRIVATE SERVER PADA INSTANSI PENDIDIKAN XYZ BERDASARKAN NIST SP 800-123
Abstract
Keywords
Full Text:
PDFArticle Metrics :
References
BSSN, Laporan Tahunan Monitoring Keamanan Siber Tahun 2021 | bssn.go.id. 2021. [Online]. Available: https://bssn.go.id/laporan-tahunan-monitoring-keamanan-siber-tahun-2021/
A. Laurensius Faleddo Giri Retza, Security Hardening Dengan Cloud Web Service Untuk Pengamanan Website Berbasis Wordpress, Univ. dian nuswantoro, pp. 110, 2016.
A. R. Hevner, S. T. March, J. Park, and S. Ram, Design science in information systems research, MIS Q. Manag. Inf. Syst., vol. 28, no. 1, pp. 75105, 2004, doi: 10.2307/25148625.
F. Sirait and M. K. Sofyan Putra, Implementasi Metode Vulnerability Dan Hardening Pada Sistem Keamanan Jaringan, Univ. Mercu Buana, vol. 9, no. 1, p. 16, 2018.
U. of Portsmouth, Patch anagement, 2020.
G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis, Detecting DNS amplification attacks, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5141 LNCS, no. June 2014, pp. 185196, 2008, doi: 10.1007/978-3-540-89173-4_16.
Desmira and R. Wiryadinata, Rancang Bangun Keamanan Port Secure Shell ( SSH ), J. Inov. dan Sains Tek. Elektro, vol. 3, no. 1, pp. 15, 2022, [Online]. Available: http://jurnal.bsi.ac.id/index.php/insantek
Sahren, Implementasi Ssl Untuk Pencegahan Man in the Middle Attack Pada Ftp Server, J. Sci. Soc. Res., vol. IV, no. 1, pp. 2833, 2021, [Online]. Available: http://jurnal.goretanpena.com/index.php/JSSR
N. Deshpande, S. Joshi, S. Pawar, and A. Parkavi, Application of C / C ++ Compiler, Int. J. Res. Eng. Sci. Manag., vol. 2, no. 5, pp. 409411, 2019, [Online]. Available: www.ijresm.com
J. Bartlett, Building Scalable PHP Web Applications Using the Cloud. 2019. doi: 10.1007/978-1-4842-5212-3.
H. Koskinen, SECURING LINUX SYSTEMS IN AN ADVANCED IOT, p. 31, 2020.
K. A. Prasetyo, M. Idhom, and H. E. Wahanani, SISTEM PENCEGAHAN SERANGAN BRUTEFORCE PADA MULTIPLE SERVER DENGAN MENGGUNAKAN FAIL2BAN, vol. 1, no. 3, pp. 789796, 2020.
M. C. I. Putri, P. Sukarno, and A. A. Wardana, Two factor authentication framework based on ethereum blockchain with dapp as token generation system instead of third-party on web application, Regist. J. Ilm. Teknol. Sist. Inf., vol. 6, no. 2, pp. 7485, 2020, doi: 10.26594/register.v6i2.1932.
H. D. Lie, M. M. Engel, F. T. Informasi, and U. C. Surabaya, LIBRARY SELF SERVICE SYSTEM USING NFC AND 2FA GOOGLE AUTHENTICATOR SISTEM PEMINJAMAN MANDIRI PERPUSTAKAAN MENGGUNAKAN NFC DAN 2FA GOOGLE AUTHENTICATOR, vol. 3, no. 3, 2022.
S. H. Han, H. K. Lee, G. Y. Gim, and S. J. Kim, Empirical Study on Anti-Virus Architecture for Container Platforms, IEEE Access, vol. 8, pp. 134940134949, 2020, doi: 10.1109/ACCESS.2020.3005591.
M. A. Muin, T. Yusnanto, and I. Managenent, Campus Website Security Vulnerability Analysis Using Nessus, J. IJCIS, vol. 03, no. 02, pp. 7982, 2020, [Online]. Available: https://ijcis.net/index.php/ijcis/index
I. G. A. S. Sanjaya, G. M. A. Sasmita, and D. M. S. Arsa, Evaluasi Keamanan Website Lembaga X Melalui Penetration Testing Menggunakan Framework ISSAF, J. Ilm. Merpati (Menara Penelit. Akad. Teknol. Informasi), vol. 8, no. 2, p. 113, 2020, doi: 10.24843/jim.2020.v08.i02.p05.
R. Darman, Metasploid Pada Android Menggunakan Kali Linux untuk Menyadap Kamera, SMS, dan Kontak Telepon. 2017. doi: 10.13140/RG.2.2.25589.42722.