Disusun Oleh :
Angel Vallerine Liu XII MIPA1/6
Raphaela Kaira XII MIPA 1/29
https://www.niagahoster.co.id/blog/cyber-security-adalah
https://www.goldenfast.net/blog/jenis-metode-ancaman-cyber-security/
https://www.cloudmatika.co.id/blog-detail/ancaman-keamanan-jaringan
https://www.exabytes.co.id/blog/pengertian-cyber-security/#:~:text=Konsep%20Cyber
%20Security%20(Keamanan%20Siber,%2C%20integritas%2C%20dan
%20ketersediaan%20informasi.https://www.exabytes.co.id/blog/pengertian-cyber-
security/#:~:text=Konsep%20Cyber%20Security%20(Keamanan%20Siber,%2C
%20integritas%2C%20dan%20ketersediaan%20informasi.
https://runsystem.id/id/blog/cyber-security/
https://www.cloudmatika.co.id/blog-detail/spoofing-adalah
https://www.niagahoster.co.id/blog/mengatasi-phishing/?amp
https://www.dewaweb.com/blog/pengertian-man-in-the-middle-attack/