May – June 2020 ISSN: 0193-4120 Page No. 15714 – 15719 15714 Published by: The Mattingley Publishing Co., Inc. Evaluation of Wireless Network Security Using Information System Security Assessment Framework (ISSAF) (Case Study: PT. Keberlanjutan Strategis Indonesia) Muchamad Rusdan 1 , Daniel T. H. Manurung 2 , Franklin Kharisma Genta 3 1 Sekolah Tinggi Teknologi Bandung, Indonesia 2 STIE Widya Gama Lumajang, Indonesia 3 Institut Manajemen Koperasi Indonesia Corresponding Author: rusdan@sttbandung.ac.id Article Info Volume 83 Page Number: 15714 – 15719 Publication Issue: May - June 2020 Article History Article Received: 1May 2020 Revised: 11 May 2020 Accepted: 20 May 2020 Publication: 24May 2020 Abstract: The purpose of this study was conducted to determine the level of wireless network vulnerability using ISSAF with penetration testing and make plans, assessments, and evaluation reports of wireless network security that can be used as guidelines for conducting penetration testing on an organization or company. The study was conducted with an action research approach which was divided into several stages, namely diagnosing, action planning, intervention, evaluation, and reflection. Then for the wireless network security evaluation process by applying ISSAF Penetration Testing. The results of testing the level of wireless network vulnerability of PT. Keberlanjutan Strategis Indonesia using ISSAF with penetration testing shows that the overall results of the four types of testing show the average level of a vulnerability is 0.8, in other words, the overall wireless network at PT. Keberlanjutan Strategis Indonesia has a high level of vulnerability. The outputs from each phase, namely the planning and preparation phase, produce policy documents and agreements, the assessment phase, produce assessment documents, and the reporting, clean-up, and destroy artefacts phases, produce the evaluation documents. The output produced in each phase determines the next phase so that the three phases it is a series of processes that can not be separated. Keywords: Wireless Network Security, Information System Security Assessment Framework, Penetration Testing, Vulnerability.