Javascript must be enabled to continue!
Analisis Sistem Manajemen Keamanan Informasi Menggunakan ISO/IEC 27001 : 2013 Serta Rekomendasi Model Sistem Menggunakan Data Flow Diagram pada Direktorat Sistem Informasi Perguruan Tinggi
View through CrossRef
The importance of information and the possible risk of disruption, therefore the universities need to designed and implemented of the information security. One of the standards that can be used to analyze the level of information security in the organization is ISO/IEC 27001 : 2013 and this standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system. The objective of this research is to measure the level of information security based on standard ISO/IEC 27001: 2013 and modeling systems for information security management. This research uses descriptive qualitative approach, data collection and validation techniques with tringulasi (interview, observation and documentation). Data was analyzed using gap analysis and to measure the level of maturity this research uses SSE-CMM (Systems Security Engineering Capability Maturity Model). Based on the research results, Maturity level clause Information Security Policy reaches level 1 (Performed-Informally), clause Asset Management reaches level 3 (Well-Defined), clause Access Control reaches level 3 (Well-Defined), clause Physical and Environmental Security reaches level 3 (Well-Defined), clause Operational Security reaches level 3 (Well-Defined), Communication Security clause reaches the level 2 (Planned and Tracked). Based on the results of maturity level discovery of some weakness in asset management in implementing the policy. Therefore, the modeling system using the flow map and CD / DFD focused on Asset Management System.
Institute of Research and Community Services Diponegoro University (LPPM UNDIP)
Title: Analisis Sistem Manajemen Keamanan Informasi Menggunakan ISO/IEC 27001 : 2013 Serta Rekomendasi Model Sistem Menggunakan Data Flow Diagram pada Direktorat Sistem Informasi Perguruan Tinggi
Description:
The importance of information and the possible risk of disruption, therefore the universities need to designed and implemented of the information security.
One of the standards that can be used to analyze the level of information security in the organization is ISO/IEC 27001 : 2013 and this standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.
The objective of this research is to measure the level of information security based on standard ISO/IEC 27001: 2013 and modeling systems for information security management.
This research uses descriptive qualitative approach, data collection and validation techniques with tringulasi (interview, observation and documentation).
Data was analyzed using gap analysis and to measure the level of maturity this research uses SSE-CMM (Systems Security Engineering Capability Maturity Model).
Based on the research results, Maturity level clause Information Security Policy reaches level 1 (Performed-Informally), clause Asset Management reaches level 3 (Well-Defined), clause Access Control reaches level 3 (Well-Defined), clause Physical and Environmental Security reaches level 3 (Well-Defined), clause Operational Security reaches level 3 (Well-Defined), Communication Security clause reaches the level 2 (Planned and Tracked).
Based on the results of maturity level discovery of some weakness in asset management in implementing the policy.
Therefore, the modeling system using the flow map and CD / DFD focused on Asset Management System.
Related Results
Analisis Keamanan SIKAPEG IVET Berbasis ISO 27001:2013
Analisis Keamanan SIKAPEG IVET Berbasis ISO 27001:2013
Keamanan data sangat penting, sebab dapat memastikan kontinuitas pengelolaan, mengurangi risiko, dan menjadi peluang suatu lembaga untuk berkembang. Semakin banyak informasi yang ...
Faktor Determinan yang Mempengaruhi Minat Siswa dalam Melanjutkan Studi ke Perguruan Tinggi
Faktor Determinan yang Mempengaruhi Minat Siswa dalam Melanjutkan Studi ke Perguruan Tinggi
Background: Students' interest in continuing their studies at university is influenced by several determinant factors. Based on several previous studies, the results showed that th...
EVALUASI RISIKO KEAMANAN INFORMASI DISKOMINFO PROVINSI XYZ MENGGUNAKAN INDEKS KAMI DAN ISO 27005 : 2011
EVALUASI RISIKO KEAMANAN INFORMASI DISKOMINFO PROVINSI XYZ MENGGUNAKAN INDEKS KAMI DAN ISO 27005 : 2011
Dalam proses pelaksanaan tata kelola teknologi informasi di suatu instansi, keamanan merupakan aspek yang sangat penting untuk melindungi aset dari segala bentuk ancaman. Evaluasi ...
AUDIT SISTEM INFORMASI BERBASIS COBIT 2019 MENGGUNAKAN STANDAR ISO 27001 : 2005
AUDIT SISTEM INFORMASI BERBASIS COBIT 2019 MENGGUNAKAN STANDAR ISO 27001 : 2005
Penting bagi semua perguruan tinggi untuk mempelajari dan mengevaluasi manajemen teknologi informasi agar dapat mencapai efektivitas dan efisiensi dalam manajemen bisnis. Keamanan ...
Sistem Akreditasi Pemantauan dan Relevansinya Bagi Sekolah Tinggi Teologi dan Sekolah Tinggi Agama Kristen
Sistem Akreditasi Pemantauan dan Relevansinya Bagi Sekolah Tinggi Teologi dan Sekolah Tinggi Agama Kristen
Abstract. Accreditation is an assessment activity in accordance with established criteria based on the National Higher Education Standards. The legal basis for the monitoring accre...
Standardization in Health and Medical Informatics
Standardization in Health and Medical Informatics
When things go well then often it is because they conform to standards (ISO, 2005). According to the Oxford Dictionary of Modern English, there is a lot of explanation of what stan...
Jurnal Ridwan Fatriawan ,17510049
Jurnal Ridwan Fatriawan ,17510049
Ridwan FatriawanFakultas komputer1 Section 01Audit Keamanan Sistem Informasi Perpustakaan STMIK STIKOM Bali Menggunakan Kerangka Kerja COBITRidwan Fatriawan175100049Program Studi S...

