Daftar Pustaka

AusCERT. (2024). AusCERT RFC 2350: Description of AusCERT’s Incident Response Service. https://auscert.org.au/publications/policies-and-agreements/auscert-rfc2350/

Bappenas. (2024). Peta Okupasi Nasional. https://petaokupasi.bappenas.go.id/

Booth, H., Rike, D., & Witte, G. (2013). The National Vulnerability Database (NVD): Overview. ITL Bulletin. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=915172

BSSN. (2019). Peta Okupasi Nasional Keamanan Siber. https://www.bssn.go.id

BSSN. (2021). COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) STARTER KIT v1.0.

BSSN. (2024). Peraturan Badan Siber dan Sandi Negara Nomor 1 Tahun 2024 tentang Pengelolaan Insiden Siber.

Bugcrowd. (2022). Reporting a Bug. https://docs.bugcrowd.com/researchers/reporting-managing-submissions/reporting-a-bug/

CERT-Bund. (2024). RFC 2350: CERT-Bund Description according to RFC 2350. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/KRITIS/rfc2350_CERT-Bund_txt.html

CERT-EU. (2024). RFC2350: CERT-EU Description according to RFC 2350. https://www.cert.europa.eu/static/files/RFC2350.pdf

Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), tyac006. https://doi.org/10.1093/cybsec/tyac006

Chen, K. Y. (2021). A Systematic Approach for Cybersecurity Risk Management [Massachusetts Institute of Technology]. https://dspace.mit.edu/handle/1721.1/139995

CISA. (2020). Cyber Resilience Review (CRR) Resource Guide: Vulnerability Management. https://www.cisa.gov/sites/default/files/publications/CRR_Resource_Guide-VM_0.pdf

CISA. (2024). Traffic Light Protocol (TLP) Definitions and Usage. https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage

Deputi III, B. (2024). Peraturan Deputi Bidang Keamanan Siber dan Sandi Pemerintahan dan Pembangunan Manusia Nomor 1 Tahun 2024 Tentang Pedoman Pembentukan Tim Tanggap Insiden Siber Sektor Pemerintahan.

Direktorat Operasi Keamanan Siber. (2023). Lanskap Keamanan Siber Indonesia 2023. https://www.bssn.go.id/wp-content/uploads/2024/03/Lanskap-Keamanan-Siber-Indonesia-2023.pdf

FIRST. (2015). Common Vulnerability Scoring System v3.0: Specification Document. Forum of Incident Response and Security Teams (FIRST), 1–21. https://www.first.org/cvss/cvss-v30-specification-v1.8.pdf

FIRST. (2017). Common Vulnerability Scoring System v3.0 Examples. https://www.first.org/cvss/cvss-v30-examples_v1.5.pdf

FIRST. (2023). CSIRT Services Framework v2.1. https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1

Foreman, P. (2019). Vulnerability Management (2nd ed.). Auerbach Publications. https://doi.org/10.1201/9780429289651

Gartner. (2020). A Guidance Framework for Developing and Implementing Vulnerability Management. https://www.gartner.com/en/documents/3747620

Goel, J. N., & Mehtre, B. M. (2015). Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology. Procedia Computer Science, 57, 710–715. https://doi.org/https://doi.org/10.1016/j.procs.2015.07.458

Government of South Australia. (2021). Vulnerability Management and Patching Guideline (SACSF-G11.0). https://www.security.sa.gov.au/documents/documents/SACSF-G11.0-Vulnerability-management-and-Patching-Guideline.pdf

Guidelines for Cyber Security Incidents. (2024). https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-cyber-security-incidents

Hanford, S., & Heitman, M. (2015). Common Vulnerability Scoring System v3 . 0 : User Guide. FIRST-Forum of Incident Response and Security Teams, 1–15. https://www.first.org/cvss/cvss-v30-user_guide_v1.5.pdf

Huawei. (2023). Huawei Vulnerability Management White Paper 2023.

IoT Security Foundation. (2021). Vulnerability Disclosure Best Practice Guidelines, Release 2.0. https://www.iotsecurityfoundation.org/wp-content/uploads/2021/09/IoTSF-Vulnerability-Disclosure-Best-Practice-Guidelines-Release-2.0.pdf

ISO. (2018). ISO/IEC 29147:2018 Information technology – Security techniques – Vulnerability disclosure (Issue ISO/IEC 29147:2018). https://www.iso.org/standard/72311.html

ISO. (2019). ISO/IEC 30111:2019 Information technology – Security techniques – Vulnerability handling processes (Issue ISO/IEC 30111:2019). https://www.iso.org/standard/69725.html

JPCERT/CC. (2024). About JPCERT/CC. https://www.jpcert.or.jp/english/about/

Kissoon, T. (2022). Optimal Spending on Cybersecurity Measures: Risk Management. Routledge. https://www.routledge.com/Optimal-Spending-on-Cybersecurity-Measures-Risk-Management/Kissoon/p/book/9781032061412

Knerler, K., Parker, I., & Zimmerman, C. (2022). 11 Strategies of a World-Class Cybersecurity Operations Center.

Matwyshyn, A. M., Cui, A., Keromytis, A. D., & Stolfo, S. J. (2010). Ethics in security vulnerability research. IEEE Security & Privacy, 8(2), 67–72. https://doi.org/10.1109/MSP.2010.67

Mohammed, A. H. Y., Dziyauddin, R. A., & Latiff, L. A. (2023). Current Multi-factor of Authentication: Approaches, Requirements, Attacks and Challenges. International Journal of Advanced Computer Science and Applications, 14(1). https://doi.org/10.14569/IJACSA.2023.0140119

National Cyber Security Centre. (2022). Vulnerability Disclosure Toolkit. https://www.ncsc.gov.uk/files/NCSC-Vulnerability-disclosure-Toolkit-v2.pdf

NIST. (2012a). Computer Security Incident Handling Guide (Issue SP 800-61 Revision 2). https://doi.org/10.6028/NIST.SP.800-61r2

NIST. (2012b). Guide for Conducting Risk Assessments (Issue NIST Special Publication 800-30 Revision 1). https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf

NIST. (2024). National Vulnerability Database (NVD). https://nvd.nist.gov/

Office of the CISO. (2024). Vulnerability management guidelines.

OWASP Foundation. (2021). OWASP Top Ten Web Application Security Risks. https://owasp.org/Top10/

Pipyros, K. (2019). A new systematic modelling methodology for improving cyber-attack evaluation on states’ Critical Information Infrastructure (CII) Kosmas Pipyros.

Presiden Indonesia. (2019). Peraturan Presiden Nomor 71 tahun 2019 tentang Penyelenggaran Sistem dan Transaksi Elektronik.

Recorded Future. (2022). The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program (4th ed.). Recorded Future.

Roytman, M., & Bellis, E. (2023). Modern Vulnerability Management: Predictive Cybersecurity. Artech. http://ieeexplore.ieee.org/document/10121000

Sarker, K. U., Yunus, F., & Deraman, A. (2023). Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods. Sustainability, 15(13). https://doi.org/10.3390/su151310471

Scarfone, K. A., Souppaya, M., Cody, A., & Orebaugh, A. (2008). Technical Guide to Information Security Testing and Assessment (Issues 800–115). https://doi.org/10.6028/NIST.SP.800-115

Scarfone, K., & Souppaya, M. (2022). Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology. https://doi.org/10.6028/NIST.SP.800-40r4

Swanagan, M. (2024, March 1). Vulnerability & Patch Management Metrics: Top 10 KPIs. https://purplesec.us/learn/vulnerability-management-metrics/

University of Toronto. (2024). Vulnerability Management Guidelines. https://security.utoronto.ca/wp-content/uploads/2024/01/vulnerability-management-guidelines-20240118.pdf

US-CERT. (2020). US-CERT InfoSheet v2. https://www.cisa.gov/sites/default/files/publications/infosheet_US-CERT_v2.pdf

Last updated