Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman
Main Article Content
Abstract
Article Details
Authors who publish with this journal agree to the following terms:
- Author (s) hold copyrights and retain copyrights of articles if the article is accepted for publishing.
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Public allowed to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material) this journal article content.
References
Australian Cyber Security Centre (ACSC). (2016, April). Implementing Application Whitelisting. http://www.asd.gov.au/publications/protect/application_whitelisting.htm
Beechey, Jim. (2010). Application Whitelisting: Panacea or Propaganda?, SANS Institute.
Bontchev, Vesselin. (2007). The dark side of whitelisting. Retrieved from http://www.virusbtn.com/virusbulletin/archive/2007/08/vb200708-whitelisting
Cohen, Fred. (1990). Automated Integrity Maintenance for Viral Defense. IFIP-TC11 Computers & Security.
Communications Security Establishment (CSE). (2015, March). Application Whitelisting Explained. IT Security Bulletin (ITSB-95) for the Government of Canada. https://www.cse-cst.gc.ca/en/publication/itsb-95
Direktorat Pemberdayaan Informatika, Direktorat Jenderal Aplikasi Informatika. (2016). “Sistem Whitelist Nusantara untuk Menciptakan Internet Positif”, slides presentasi dalam rapat 19 Juli 2016.
Hawkins, D.I., R.J. Best, K.A. Coney. (2001). Consumer Behaviour, 8th edition, New York, USA: Mc.Graw-Hill, p.26.
Kotler, Philip. (1997). Marketing Management: Analysis, Planning, Implementation, and Control, 9th Ed., Englewood Cliffs, NJ: Prentice Hall, Inc.
Kotler, P., & G. Armstrong. (2007). Principles of Marketing. Upper Saddle River, NJ: Prentice Hall.
Kurbalija, Jovan. (2010). Sebuah Pengantar tentang Tata Kelola Internet, ed. 1 Bahasa Indonesia, Penerbit: APJII dan DiploFoundation.
Lo, Janet. (2010, November). Whitelisting for Cyber Security: What It Means for Consumers. Public Interest Advocacy Centre (PIAC), Canada. ISBN 1-895-060-94-X.
National Cybersecurity and Communications Integration Center (NCCIC). (2015, Desember). Seven Steps to Effectively Defend Industrial Control Systems. https://ics-cert.us-cert.gov/Seven-Steps-Effectively-Defend-Industrial-Control-Systems
Yamin, M. (2016). “Sistem DNS Whitelist Nusantara”, slides presentasi dalam Focus Group Discussion tanggal 16 Agustus 2016.