Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Cyberweapon - Wikipedia
Cyberweapon - Wikipedia
From Wikipedia, the free encyclopedia
Malware agent

Part of a series on
War
(outline)
History
  • Prehistoric

  • Ancient
    • Thermal
    • Gunpowder
      • Timeline

  • Post-classical
    • Castles

  • Early modern
    • Military revolution
    • Pike and shot
    • Napoleonic warfare

  • Late modern
    • Industrial warfare
    • Fourth-gen warfare
    • AI warfare
Military
  • Organization
  • Command and control
  • Defense ministry
  • Reserves
  • Ranks

  • Branches:
  • Army
  • Navy
  • Air force
  • Marines
  • Coast guard
  • Border guard
  • Special forces
  • Cyber force
  • Space force

  • Specialties:
  • Staff
  • Engineers
  • Intel
  • Recon
  • Medical
  • Police
  • Diving
  • Pilot

  • Land units:
  • Infantry
  • Armor
    • Cavalry
  • Artillery
  • Special forces
  • Signal corps

  • Naval units:
  • Warships
  • Submarines
  • Aircraft carriers
  • Landing craft
  • Auxiliary ships

  • Air units:
  • Fighters
  • Bombers
  • Command
  • Close air support
  • Electronic-warfare
  • Reconnaissance

  • Combat systems:
  • Fire-control system
  • Fire-control radar
  • Director (military)
  • Combat information center
  • Sonar
  • Radar

  • Historical:
  • Ship gun fire-control
  • Gun data computer
  • Torpedo data computer

  • Development:
  • Basic training
  • Military maneuvers
  • Combat training
Battlespace
  • Aerospace
    • Aerial
    • Airborne
    • Space

  • Land
    • Cold-region
    • Desert
    • Fortification
    • Jungle
    • Mountain
    • Urban
    • Subterranean
      • Tunnel

  • Sea
    • Amphibious
    • Blue
    • Brown
    • Green
    • Surface
    • Underwater
      • Seabed

  • Cyber
  • Information
  • Night
Weapons
  • Air defense
  • Armor
  • Artillery
  • Barrage
  • Biological
  • Camouflage
  • Cavalry
    • Horses
    • Air cavalry
  • Chemical
  • Combined arms
  • Conventional
  • Cyber
  • Denial
  • Disinformation
  • Drone / Robot
  • Electromagnetic
  • Firearms
  • Infantry
  • Loitering
  • Missile
  • Music
  • Nuclear
  • Psychological
  • Radiological
  • Submarine
  • Unconventional
Tactics
List of military tactics
  • Aerial
  • Airlift
    • Air assault
    • Airbridge
    • Airdrop
  • Anti-aircraft
  • Anti-sub
  • Anti-tank
  • Battle
  • Cavalry
  • Charge
  • CQC
  • Counterattack
  • Counterinsurgency
  • Counter-battery
  • Convoy
  • Defeat in detail
  • Foxhole
  • Drone
  • Envelopment
  • Formation
  • Guerrilla
  • Naval
  • Shock
    • Rapid dominance
  • Encirclement
  • Investment
    • Siege
  • Swarm
  • Screen
  • Tactical objective
  • Target saturation
  • Trench
  • Withdrawal
Operational
  • Military operation
    • Special
  • Operations research
  • Blitzkrieg
  • Expeditionary
  • Deep operation
  • Maneuver
  • Operational maneuver group
  • Raid
  • Covert
  • Stay-behind
Strategy
List of military strategies and concepts
  • Military campaign
  • Anti-access
  • Attrition
  • Commerce raiding
  • Counter-offensive
  • Culminating
  • Decapitation
  • Defense in depth
  • Fabian
  • Empty fort
  • Mosaic
  • Deception
  • Defensive
  • Depth
  • Goal
  • Nuclear
  • Naval
  • Offensive
  • Scorched earth
Grand strategy
  • Alliance
  • Asymmetric
  • Blockade
  • Broken-backed
  • Class
  • Cold war
  • Colonial
  • Conquest
  • Containment
  • Divide and conquer
  • Economic
  • Endemic
  • Fleet in being
  • Irregular
  • Liberation
  • Limited
  • Network-centric
  • New generation
  • Perpetual
  • Political
  • Princely
  • Proxy
  • Religious
  • Resource
  • Strategic
  • Succession
  • Technology
  • Theater
  • Total war
  • World war
Administrative
  • Branch
  • Policy
  • Staff
  • Training
  • Service
  • Sociology
Organization
  • Area of responsibility
  • Chain of command
  • Command and control
  • Doctrine
  • Order of battle
  • Principles of war
  • Economy of force
  • Medicine
  • Engineers
  • Intelligence
  • Ranks
  • Technology and equipment
Personnel
  • Recruitment
  • Conscription
  • Draft evasion
  • Mobilization
  • Training
  • Specialism
  • Soldier
  • Morale
  • Volunteer
  • Women
  • Children
  • Transgender
  • Harassment
  • Conscientious objector
  • Conscription and sexism
  • Counter-recruitment
Logistics
  • History
  • War economy
  • Arms industry
  • Materiel
  • Train
  • Supply-chain management
  • Defense industrial base
  • Base
    • MOB
    • FOB
    • Outpost
Science
  • Power projection
  • Loss-of-strength gradient
  • Lanchester's laws
    • Force multiplication
  • Morale
Law
  • Belligerent
  • Occupation
  • Armistice
  • Ceasefire
  • Court-martial
  • Desertion
  • Geneva Conventions
  • Geneva Protocol
  • Islamic rules
  • Justice
  • Lawful / Unlawful combatant
  • Perfidy
  • Regular / Irregular
  • Jewish laws on war
  • Right of conquest
  • Right of self-defense
  • Rules of engagement
  • Self-determination
  • Martial law
  • War crime
  • War and genocide
  • War treason
  • Warlord
Theory
  • Air supremacy
  • Appeasement
  • Command of the sea
  • Deterrence theory
  • Full-spectrum dominance
  • Overmatch
  • Just war theory
  • Principles of war
  • Philosophy of war
  • Security dilemma
    • Tripwire force
  • Wargaming
    • Simulation
    • Exercises
  • Combat effectiveness
  • Center of gravity
Non-warfare
  • Arms control
  • Counter-insurgency
  • Deterrence
  • Disaster response
  • Gray-zone
  • Gunboat diplomacy
  • Humanitarian aid
  • Law enforcement
  • Low-intensity conflict
  • Military engineering
  • Peacekeeping
    • Peacebuilding
    • Peace through strength
  • Show of force
Culture
  • Awards and decorations
  • Battle cry
  • Warrior
  • War film
  • Military science fiction
  • War novel
  • Anti-war movement
  • Foot drill
  • War song
  • Uniform
  • Wargame
  • Militarization / Militarism
    • Antimilitarism
  • Camp follower
Diplomacy
  • Gunboat diplomacy
  • Grey-zone
Books
  • Seven Military Classics
    • The Art of War
  • De re militari
  • Strategemata
  • On War
  • Summary of the Art of War
Related
  • Women in war
  • War resister
  • War studies
  • Horses in warfare
  • Wartime sexual violence
  • Fifth column
  • Mercenary
  • Pacifism
  • Privateer
  • Private military company
  • Soldiers are murderers
Lists
  • Battles
  • Military occupations
  • Military terms
  • Operations
  • Sieges
  • War crimes
  • Wars
    • by death toll
  • Weapons
  • Writers
  • v
  • t
  • e

Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into existing software, causing a computer to perform actions or processes unintended by its operator.

Characteristics

[edit]

A cyberweapon is usually sponsored or employed by a state or non-state actor, meets an objective that would otherwise require espionage or the use of force, and is employed against specific targets. A cyberweapon performs an action that would normally require a soldier or spy, and which would be considered either illegal or an act of war if performed directly by a human agent of the sponsor during peacetime. Legal issues include violating the privacy of the target and the sovereignty of its host nation.[1] Example of such actions are surveillance, data theft and electronic or physical destruction. While a cyberweapon almost certainly results in either direct or indirect financial damages to the target group, direct financial gains for the sponsor are not a primary objective of this class of agent. Often cyberweapons are associated with causing physical or functional harm to the system which it attacks, despite being software.[2] However, there is no consensus on what officially constitutes a cyberweapon.[2]

Unlike malware used by script kiddies to organize botnets, where the ownership, physical location, and normal role of the machines attacked is largely irrelevant, cyberweapons show high selectivity in either or both of their employment and their operation. Before the attack, cyberweapons usually identify the target using different methods.[3] Likewise, malware employed by fraudsters for the theft of personal or financial information demonstrates lower selectivity and wider distribution.

Cyberweapons are dangerous for multiple reasons. They are typically difficult to track or defend against due to their lack of physical components.[2] Their anonymity allows them to hide in systems undetected until their attack is unleashed.[4] Many of these attacks exploit "zero days" (vulnerabilities in software that companies have zero days to fix).[4] They are also significantly cheaper to produce than cyber defenses to protect against them.[4] Oftentimes, cyberweapons from one force are obtained by an opposing force and are then repurposed to be used against the original force, as can be seen with the cyberweapons WannaCry[5] and NotPetya.[6]

While the term cyber weapon is frequently used by the press,[7][8] some articles avoid it, instead using terms such as "internet weapon", "hack", or "virus".[9] Mainstream researchers debate the requirements of the term while still referring to the employment of the agent as a "weapon",[10] and the software development community in particular uses the term more rarely.

Examples

[edit]

The following malware agents generally meet the criteria above, have been formally referred to in this manner by industry security experts, or have been described this way in government or military statements:

  • Duqu
  • Flame
  • Great Cannon
  • Mirai
  • Stuxnet
  • Wiper
  • Pegasus

History

[edit]
[icon]
This section needs expansion. You can help by adding missing information. (April 2017)

Stuxnet was among the first and one of the most influential cyberweapons.[2][11] In 2010, it was launched by the United States and Israel to attack Iranian nuclear facilities.[11][12] Stuxnet is considered to be the first major cyberweapon.[11] Stuxnet was also the first time a nation used a cyberweapon to attack another nation.[13] Following the Stuxnet attacks, Iran used cyberweapons to target top American financial institutions, including the New York Stock Exchange.[14]

Stuxnet was subsequently followed by Duqu in 2011 and Flame in 2012.[11] Flame's complexity was unmatched at the time.[1] It used vulnerabilities in Microsoft Windows to spread.[3] It specifically targeted Iranian oil terminals.[7]

In 2017, data breaches showed that supposedly secure hacking tools used by government agencies can be obtained − and sometimes exposed − by third parties. Furthermore, it was reported that after losing control of such tools the government appears to leave "exploits open to be re-used by scammers, criminals, or anyone else − for any purpose".[15] Claudio Guarnieri, a technologist from Amnesty International states: "what we learn from the disclosures and leaks of the last months is that unknown vulnerabilities are maintained secret even after they've been clearly lost, and that is plain irresponsible and unacceptable".[15]

Also in that year WikiLeaks released the Vault 7 documents series that contain details of CIA exploits and tools with Julian Assange stating that they are working to "disarm" them before publication.[16][17] Disarmament of cyber weapons may come in the form of contacting respective software vendors with information of vulnerabilities in their products as well as potential help with or autonomous development (for open source software) of patches. The exploitation of hacking tools by third parties has particularly affected the United States National Security Agency (NSA). In 2016, information about NSA hacking tools was captured by a Chinese hacking group, ATP3, that allowed them to reverse engineer their own version of the tool. It was subsequently used against European and Asian nations, though the United States was not targeted.[18][19] Later that year, an anonymous group called the "Shadow Brokers" leaked what are widely believed to be NSA tools online.[19][20] These two groups are not known to be affiliated, and ATP3 had access to the tools at least a year before the Shadow Brokers leak.[19] The leaked tools were developed by the Equation Group, a cyberwarfare group with suspected ties to the NSA.[19]

Among the tools leaked by the Shadow Brokers was EternalBlue, which the NSA had used to exploit bugs in Microsoft Windows.[5] This prompted Microsoft to issue updates to guard against the tool.[8] When the Shadow Brokers publicly released EternalBlue, it was quickly used by North Korean and Russian hackers, who formed it into the ransomware WannaCry[5] and NotPetya,[6] respectively. NotPetya, which was initially launched in Ukraine but subsequently spread around the world, encrypted hard drives and forced users to pay a ransom fee for their data, despite never actually giving the data back.[6][9]

In September 2018, the United States Department of Defense officially confirmed that the United States uses cyberweapons to advance national interests.[14]

Potential Regulations

[edit]

While there has been no full regulation of cyberweapons, possible systems of regulation have been proposed.[2] One system would have cyberweapons, when not being used by a state, subject to criminal law of the country and, when being used by a state, subject to international laws on warfare.[2] Most proposed systems rely on international law and enforcement to stop the inappropriate use of cyberweaponry.[2] Considering the novelty of the weapons, there has also been discussion about how previously existing laws, not designed with cyberweapons in mind, apply to them.[2]

See also

[edit]
  • Cyber-arms industry
  • Cyberattack
  • Cyberwarfare
  • Exploit (computer security)
  • List of cyber warfare forces
  • Proactive cyber defence
  • Zero-day (computing)

References

[edit]
  1. ^ a b Downes, Cathy (2018). "Strategic Blind–Spots on Cyber Threats, Vectors and Campaigns". The Cyber Defense Review. 3 (1): 79–104. ISSN 2474-2120. JSTOR 26427378.
  2. ^ a b c d e f g h Stevens, Tim (10 January 2017). "Cyberweapons: an emerging global governance architecture". Palgrave Communications. 3 (1): 1–6. doi:10.1057/palcomms.2016.102. ISSN 2055-1045. S2CID 55150719.
  3. ^ a b "Cyber Weapon Target Analysis". 26 May 2014.
  4. ^ a b c Tepperman, Jonathan (9 February 2021). "The Most Serious Security Risk Facing the United States". The New York Times. ISSN 0362-4331. Retrieved 5 May 2022.
  5. ^ a b c Nakashima, Ellen; Timberg, Craig (16 May 2017). "NSA officials worried about the day its potent hacking tool would get loose. Then it did". The Washington Post. Retrieved 9 May 2022.
  6. ^ a b c Brandom, Russell (27 June 2017). "A new ransomware attack is hitting airlines, banks and utilities across Europe". The Verge. Retrieved 9 May 2022.
  7. ^ a b "Powerful 'Flame' Cyberweapon Torching Mideast Computers : Discovery News". News.discovery.com. 30 May 2012. Archived from the original on 1 June 2012. Retrieved 7 December 2012.
  8. ^ a b "Infosecurity – 2012: The Year Malware Went Nuclear". Infosecurity-magazine.com. 5 December 2012. Retrieved 7 December 2012.
  9. ^ a b Perlroth, Nicole (28 May 2012). "Virus Infects Computers Across Middle East - NYTimes.com". Iran: Bits.blogs.nytimes.com. Retrieved 7 December 2012.
  10. ^ "Infosecurity – Kaspersky looks at the wreckage of Wiper malware". Infosecurity-magazine.com. 29 August 2012. Retrieved 7 December 2012.
  11. ^ a b c d Farwell, James P.; Rohozinski, Rafal (1 September 2012). "The New Reality of Cyber War". Survival. 54 (4): 107–120. doi:10.1080/00396338.2012.709391. ISSN 0039-6338. S2CID 153574044.
  12. ^ Farwell, James P.; Rohozinski, Rafal (1 February 2011). "Stuxnet and the Future of Cyber War". Survival. 53 (1): 23–40. doi:10.1080/00396338.2011.555586. ISSN 0039-6338. S2CID 153709535.
  13. ^ Dooley, John F. (2018). Dooley, John F. (ed.). "Cyber Weapons and Cyber Warfare". History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. History of Computing. Cham: Springer International Publishing. pp. 213–239. doi:10.1007/978-3-319-90443-6_13. ISBN 978-3-319-90443-6. Retrieved 5 May 2022.{{citation}}: CS1 maint: work parameter with ISBN (link)
  14. ^ a b "How Cyber Weapons Are Changing the Landscape of Modern Warfare". The New Yorker. 18 July 2019. Retrieved 5 May 2022.
  15. ^ a b Cox, Joseph (14 April 2017). "Your Government's Hacking Tools Are Not Safe". Motherboard. Retrieved 15 April 2017.
  16. ^ Fox-Brewster, Thomas. "Julian Assange: Wikileaks May Have Evidence CIA Spied On US Citizens". Forbes. Retrieved 15 April 2017.
  17. ^ "WikiLeaks vows to disclose CIA hacking tools; CIA to investigate". SearchSecurity. Retrieved 15 April 2017.
  18. ^ Perlroth, Nicole; Sanger, David E.; Shane, Scott (6 May 2019). "How Chinese Spies Got the N.S.A.'s Hacking Tools, and Used Them for Attacks". The New York Times. ISSN 0362-4331. Retrieved 5 May 2022.
  19. ^ a b c d Doffman, Zak. "China Set Traps To Capture Dangerous NSA Cyberattack Weapons: New Report". Forbes. Retrieved 5 May 2022.
  20. ^ Pagliery, Jose (15 August 2016). "Hacker claims to be selling stolen NSA spy tools". CNNMoney. Retrieved 5 May 2022.

External links

[edit]
  • Prashant Mali, Jan 2018 Defining Cyber Weapon in Context of Technology and Law
  • Stefano Mele, Jun 2013, Cyber-Weapons: Legal and Strategic Aspects (version 2.0)
  • Stefano Mele, 30 September 2010, Cyberwarfare and its damaging effects on citizens
  • Michael Riley and Ashlee Vance, 20 July 2011, Cyber Weapons: The New Arms Race
  • v
  • t
  • e
Weapons
History
Premodern
  • African
  • Artillery
  • Chinese
  • Early thermal weapons
  • Japanese
  • Medieval
Modern
  • Early modern
  • Napoleonic
  • War of 1812
  • American Indian Wars
  • War of the Pacific
  • Crimean War
  • American Civil War
  • War of the Triple Alliance
  • Spanish–American War
  • Mexican Revolution
  • Antique
  • Pre-20th century firearms
World War I
  • Chemical
  • Infantry
  • Australia
  • Austria-Hungary
  • Belgium
  • Bulgaria
  • Canada
  • France
  • Germany
  • Greece
  • India
  • Italy
  • Japan
  • Montenegro
  • New Zealand
  • Portugal
  • Romania
  • Russia
  • Serbia
  • Turkey
  • United Kingdom
  • United States
Interwar period
  • Chaco War
  • Spanish Civil War (Nationalist/Republican)
  • Second Sino-Japanese War (Japanese/National Revolutionary Army)
World War II
  • Infantry
  • Australia
  • Austria
  • Belgium
  • Brazil
  • Bulgaria
  • Canada
  • China
  • Croatia
  • Czechoslovakia
  • Denmark
  • Finland
  • France
  • Germany
  • Greece
  • Hungary
  • Italy
  • Japan
  • Mexico
  • Netherlands
  • New Zealand
  • Norway
  • Poland
  • Romania
  • Soviet Union
  • Thailand
  • United Kingdom
  • United States
  • Yugoslavia
Cold War
  • Greek Civil War
  • Malayan Emergency
  • First Indochina War
  • Korean War
  • Vietnam War
  • Algerian War
  • Six-Day War
  • Portuguese Colonial War
  • Rhodesian Bush War
  • South African Border War
  • Cambodian Civil War
  • Cambodian–Vietnamese War
  • Iran–Iraq War
  • Laotian Civil War
  • Lebanese Civil War
  • Dominican Civil War
  • Nicaraguan Revolution
  • Salvadoran Civil War
  • Soviet–Afghan War
  • Falklands War
  • Gulf War
Post-Cold War
  • Yugoslav Wars
  • Afghanistan War
  • Iraq War
  • Russo-Georgian War
  • Syrian Civil War
  • Russo-Ukrainian War
Types
  • Aircraft
  • Anti-aircraft
  • Anti-ballistic
  • Anti-personnel
  • Anti-tank
  • Area denial
  • Artillery
  • Biological
  • Blunt instrument
  • Ceremonial
  • Chemical
  • Conventional
  • Crew-served
  • Cyber
  • Deadly
  • Directed-energy
  • Explosive
    • Depth charge
    • List
  • Firearm
  • Hunting
  • Improvised
  • Incendiary
  • Martial arts
  • Mass destruction
  • Non-lethal
  • Nuclear
  • Offensive
  • Pneumatic
  • Practice
  • Radiological
  • Sonic
  • Space
  • Tectonic
  • Torpedo
  • Toy
  • Vehicle
Other
  • Arms industry
  • Arsenal
  • Civilian gun ownership
  • Science fiction
  • Weapon mount
  • Category
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Cyberweapon&oldid=1292360273"
Categories:
  • Types of malware
  • Cyberwarfare
  • Weapons
Hidden categories:
  • CS1 maint: work parameter with ISBN
  • Articles with short description
  • Short description matches Wikidata
  • Use dmy dates from May 2025
  • Articles to be expanded from April 2017
  • All articles to be expanded

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id