Pengembangan Laboratorium Virtual untuk Simulasi Uji Penetrasi Sistem Keamanan Jaringan
Abstract
Keywords
Article Metrics
Abstract view : 278 timesPDF view : 261 times
Full Text:
PDFReferences
Pirmansyah, "Analisis Persepsi Auditor Sistem Informasi mengenai Pencegahan atas Tindakan Cybercrime.
Moon,J. A Handbook of Reflective and Experiential Learning:Theory and practice.London:Routledge Falmer.pp.126.2004
Wolf. Tilman, "Assessing Sudent Learning in Virtual Laboratory Environment. IEEE Transcalation on Education", Vol. 53, No.2, pp. 216-221, 2010.
Bulbrook. Harry, "Using Virtual Machine to provide a secure Teaching Lab environmnet,". 2009.
Arjun, CV 2017, 'Penetration testing: Vulnerability analysis in a virtual environment' Journal of Engineering and Applied Sciences, vol. 12, no. Specialissue9, pp. 8723-8729. DOI: 10.3923/jeasci.2017.8723.8729
Trabelsi Z. and McCoey M., “Ethical hacking in information security curricula,” International Journal of Information and Communication Technology Education (IJICTE), Vol. 12, Issue 1, pp. 1-10, 2016.
Ankita Gupta, Kavita, kirandeep Kaur.“Vulnerability Assessment and Penetration testing”. Computer Science Department, PEC University of Technology, India *Electronics and Electrical Communication Depertement, PEC University of Technology, India IJETT Vol 4 Issue3 -2013
S. Christoper, Z. Janusz, Penetration testing in a Virtual Environment. CNT 4104 Fall Networks, 2011
Li, C. (2015). Penetration testing curriculum development in practice. Journal of Information Technology Education: Innovations in Practice, 14, 85-99. Retrieved from http://www.jite.org/documents/Vol14/JITEv14IIPp085-
Li1014.pdf
Bulbrook.H, “Using Virtual Machine to provides a secure Teaching Lab Environment.”
Hutagalung. R. H, Nugroho. L. E and Hidayat. R, "Analisis Uji Penetrasi Menggunakan ISSAF", ISSN : 2338 - 0276, 2017.
T. Edition, Top-Down Network Design. .
Refbacks
- There are currently no refbacks.