Page 159 - ESSAI AGRARIA 22.indd
P. 159
PCMan. (2020). Endpoint Security. [Online] Available at: https://
www.pcman.co.id/security-it/endpoint-security/ [Diakses
21 Oktober 2022].
Peddoju, S. K., Upadhyay, H. & Lagos, L. (2020). File integrity
monitoring tools: Issues, challenges, and solutions. Wiley,
pp. 1-8.
Pinheiro, A., Canedo, E. D., Rafael Timóteo De Sousa, J. &
Albuquerque, R.D.O., (2020). Monitoring File Integrity
Using Blockchain and Smart Contracts. IEEE, Issue 8, pp.
198548-198579.
SecurityScorecard. (2021). What is the CIA Triad? Definition,
Importance, & Examples. [Online] Available at: https://
securityscorecard.com/blog/what-is-the-cia-triad
[Diakses 11 Oktober 2022].
Stanković, S., Gajin, S. & Petrović, R. (2022). A Review of Wazuh
Tool Capabilities for Detecting Attacks Based on Log
Analysis. Serbia, IEEE, pp. 1-5.
Tek-Tools. (2020). Understanding File Integrity Monitoring (FIM)
and Its Role in Cybersecurity. [Online] Available at: https://
www.tek-tools.com/security/file-integrity-monitoring-
fim- in-cybersecurity [Diakses 22 Oktober 2022].
Wilbert, B. & Chen, L. (2014). Comparison of File Integrity
Monitoring (FIM) Techniques for Small Business
Networks. Department of Computer Science Sam Houston
State University , Issue IEEE, pp. 1-7.
Winarianto, P. & Daud, D.E., (2022). CIA Triad. [Online]Available
at: https://student-activity.binus.ac.id/csc/2022/08/cia-
triad/ [Diakses 21 Oktober 2022].
148 Akselerasi Peningkatan Kualitas Pelayanan Pertanahan dan Tata Ruang
Menuju Sebesar-Besarnya Kemakmuran Rakyat