Model Pengujian Celah Keamanan Bug Host Pada Layanan Promosi Operator SelulerModel Pengujian Celah Keamanan Bug Host Pada Layanan Promosi Operator Seluler
Abstract
The growth of internet usage in Indonesia can not be separated from market penetration role by Cellular Operator. In this case Celullar Operators often provide promotional services to customers. Behind the promotional services there are several security holes that are utilized by customers. Usually the security hole is called a bug host. This research proposes a model of security testing of the promotional services.
References
Ahmad, K., Verma, S., Kumar, N., Shekhar, J., Vivekananda, S., & Pradesh, U. (2011). Classification of Internet Security Attacks, 11–13. Retrieved from http://www.bvi- cam.ac.in/news/INDIACom 2011/321.pdf
Asosiasi Penyelenggara Jasa Internet Indonesia, & Teknopreneur Indonesia. (2017). Penetrasi & Perilaku Pengguna Internet Indonesia - Survey 2017. Jakarta.
Hootsuite. (2018). Indonesia Digital Landscape Survey January 2018.
Huston, G. (1999). Web Caching. The Internet Protocol Journal, 2(3), 2–20. https://doi.org/10.1016/S0001-2092(16)00183-6
Kent, S., & Atkinson, R. (1998). RFC2406: IP Encapsulating Security Payload.
Luotonen, A., & Kevin Altis. (1994). World- Wide Web Proxies. Retrieved from http://courses.cs.vt.edu/~cs4244/spring.09/documents/Proxies.pdf
Northcutt, S. (2007). Traffic Analysis. Retrieved February 28, 2018, from https://www.sans.edu/cyber-research/security-laboratory/article/traffic- analysis
Copyright (c) 2018 Jurnal INTEK Program Studi Teknologi Informasi
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.