Analisis Kerentanan: Memanfaatkan Kerentanan dan Pengaruh Keamanan Siber pada Cloud Computing
Sari
Kata Kunci
Teks Lengkap:
PDFReferensi
M. Hossain, R. Khan, S. Al Noor, and R. Hasan, “Jugo: A Generic Architecture for Composite Cloud as a Service,” Institute of Electrical and Electronics Engineers (IEEE), Jan. 2017, pp. 806–809. doi: 10.1109/cloud.2016.0112.
G. Manogaran, C. Thota, and M. V. Kumar, “MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing,” in Procedia Computer Science, Elsevier B.V., 2016, pp. 128–133. doi: 10.1016/j.procs.2016.05.138.
Direktorat Operasi Keamanan Siber, “LANSKAP KEAMANAN SIBER INDONESIA 2023,” Jakarta, Dec. 2023.
M. E. Abiezal and I. Afrianto, “Tinjauan Literatur: Keamanan Cloud di Era Digital Menangani Ancaman Saat Ini dan Memastikan Privasi Data.” [Online]. Available: https://www.researchgate.net/publication/368542573
Z. Masyhur, A. Rizaldy, P. Kartini, and D. Publikasi, “Studi Literatur Keamanan dan Privasi Data Sistem Cloud Computing Pada Platform Google Drive,” 2021.
B. G. Sudarsono, I. Zulkarnain, E. Buulolo, and D. P. Utomo, “Analisa Penerapan Metode MOOSRA dan MOORA dalam Keputusan Pemilihan Lokasi Usaha,” Building of Informatics, Technology and Science (BITS), vol. 4, no. 3, pp. 1456–1463, Dec. 2022, doi: 10.47065/bits.v4i3.2696.
A. G. Santika, R. G. Whendasmoro, and I. Zulkarnain, “Aplikasi Manajemen Komplain Gedung Plaza Setiabudi Menggunakan Framework Ionic,” Eksplorasi Teknologi Enterprise & Sistem Informasi (EKSTENSI), vol. 1, no. 1, p. 037045, 2022, [Online]. Available: https://journal.fikom.site/ekstensiCommonsAttribution4.0
P. M. Kumar, “Enhanced Cloud Data Security Using AES Algorithm,” 2019. [Online]. Available: https://www.researchgate.net/publication/334963833
J. L. Keuangan et al., “Asy-Syarikah,” vol. 5, no. 2, p. 2023, [Online]. Available: http://journal.uiad.ac.id/index.php/asy-syarikah
P. Keamanan Siber Dalam Mengatasi Konten Negatif, L. Siagian, A. Budiarto, and P. Strategi Pertahanan Udara Universitas Pertahanan, “THE ROLE OF CYBER SECURITY IN OVERCOME NEGATIVE CONTENTS TO REALIZE NATIONAL INFORMATION RESILIENCE.”
“jitter_herdian,+03+Rusdan_JitterAgustus19_20191128”.
F. Prasetyo Eka Putra, S. Mellyana Dewi, and A. Hamzah, “Jurnal Sistim Informasi dan Teknologi https://jsisfotek.org/index.php Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” vol. 5, no. 2, 2023, doi: 10.37034/jsisfotek.v5i1.232.
“Jurnal+Suhada+Kohesi”.
R. Velumadhava Rao and K. Selvamani, “Data security challenges and its solutions in cloud computing,” in Procedia Computer Science, Elsevier B.V., 2015, pp. 204–209. doi: 10.1016/j.procs.2015.04.171.
F. Shahzad, “State-of-the-art survey on cloud computing security challenges, approaches and solutions,” in Procedia Computer Science, Elsevier B.V., 2014, pp. 357–362. doi: 10.1016/j.procs.2014.08.053.
F. Indriyajati, M. Margarith, S. Damiana Jawa, and H. Utomo, “Analisis Keamanan Data Electronic Medical Record Digital Transformation Office (DTO) Kementerian Kesehatan Indonesia Article Info ABSTRAK,” vol. 02, no. 01, pp. 59–66, doi: 10.58812/smb.v2i01.
A. Nugroho, “PELATIHAN PEMANFAATAN GOOGLE DRIVE UNTUK MANAJEMEN DOKUMEN DAN FILE DI PEMERINTAHAN DESA SIDOWANGI KABUPATEN MAGELANG”.
A. Wijoyo, A. R. Silalahi, A. Raihan, P. Arrasyid, and R. Diana, “Sistem Informasi Manajemen Berbasis Cloud”, [Online]. Available: https://jurnalmahasiswa.com/index.php/teknobis
DOI: https://doi.org/10.24176/sitech.v7i2.13370
Refbacks









