Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Submissions
Privacy Statement
Reviewer
About the Journal
Contact
About
Editorial Masthead
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 8 No. 2 (2025): Edisi November 2025
Vol. 8 No. 2 (2025): Edisi November 2025
Published:
07-12-2025
Articles
Tingkat Keamanan Jaringan Home Wi-Fi Di Kota Yogyakarta Terhadap Password Attack
Panggih Gumelaring Praja, Muhammad Taufiq Nuruzzaman, Bambang Sugiantoro
80-88
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5113
Views: 51
|
Downloads: 119
Analisis Forensik Metadata Lokasi Android Dengan Autopsy dan Evaluai Akurasi Haversine
Nuurun Najmi Qonita, Divana Taricha Salmalina, Danita Divka Sajmira, Hery Mustofa
89-96
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5221
Views: 71
|
Downloads: 69
Analisis Pengaruh Kompresi File Pada Media Sosial Terhadap Ketahanan Image Steganografi Pada Metode Least Significant Bit (LSB)
Muhammad Na'im Al Jum'ah, Arifin Arifin
97-106
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5310
Views: 56
|
Downloads: 67
Perbandingan Keamanan dan Performa Protokol VMess, VLESS, Trojan, dan WireGuard pada Passwall Berbasis OpenWRT
fajar; Aulia
107-113
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5368
Views: 136
|
Downloads: 44
Pengujian Kerentanan Website Menggunakan Metode Penetration Testing Dengan OWASP (Studi Kasus : Pemerintah Kabupaten Semarang)
Reynanda Al Ridwan Bintang Firdaus, Tri Ismardiko Widyawan
114-123
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5372
Views: 146
|
Downloads: 124
Analisis Forensik Digital Aplikasi Signal Desktop Pada Windows 11 Menggunakan Metodologi Forensik Digital Berbasis ISO/IEC 27037:2012 Dan ISO/IEC 27042:2015
Ahmad Anwary Adzirudin, Ghaly Arkan Adiyatma, Rizky Pratama Putra, Trystan Adrian Hanggara Wibawa
124-134
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5387
Views: 80
|
Downloads: 93
Analisis Keamanan Jaringan Wi-Fi Pada SMKN 1 Kota Jantho Menggunakan Metode Vulnerability Assessment
Farhan. Y, Aulia Syarif Aziz
135-141
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5476
Views: 51
|
Downloads: 58
Optimasi Keamanan dan Penggunaan Bandwidth pada Jaringan Internet Menggunakan Proxy Server di CV. Peut Sagoe Design
Kasyful Kabir, Aulia Syarif Aziz
142-149
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5478
Views: 31
|
Downloads: 37
Evaluasi Tingkat Keamanan Teknologi Informasi Menggunakan Indeks KAMI Pada Pondok Pesantren di Kabupaten Situbondo
M. Syaifullah, Muhammad Taufiq Nuruzzaman, Agung Fatwanto, Sumarsono
150-159
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5494
Views: 74
|
Downloads: 57
Validasi Cybersecurity Scale (CS-S) pada Konteks Industri di Batam sebagai Langkah Awal Menuju Penilaian Kesiapan Adopsi Zero Trust Architecture
Eryc, Vincent Santoso, Indasari
160-169
PDF
DOI:
https://doi.org/10.14421/csecurity.2025.8.2.5577
Views: 43
|
Downloads: 33
Visitors Statistic
Visitor By Country
Statistik Kunjungan Bulanan
Indexed By
side-menu
Journal Navigation
Online Submission
Online Submission Guidelines
Editorial Team
Peer Review Process
Focus and Scope
Publication Ethics
Plagiarism Check
Article Proccessing Charge
Open Access Statement
License Term
SUPLEMENTARY FILES
Article Template
Free Plagiarism Statement
Covering Letter and Statement Form
License
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Make a Submission
Make a Submission
Browse
Categories