PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)

One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets...

Full description

Saved in:
Bibliographic Details
Main Authors: , Andrey Ferriyan, , Prof. Jazi Eko Istiyanto, Ph.D
Format: Theses and Dissertations NonPeerReviewed
Published: [Yogyakarta] : Universitas Gadjah Mada 2014
Subjects:
ETD
Online Access:https://repository.ugm.ac.id/128273/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universitas Gadjah Mada
id id-ugm-repo.128273
record_format dspace
spelling id-ugm-repo.1282732016-03-04T07:53:02Z https://repository.ugm.ac.id/128273/ PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN) , Andrey Ferriyan , Prof. Jazi Eko Istiyanto, Ph.D ETD One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets of IT. All of this requires a security management process. One process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. So it needs a method that utilizes a database that has been standardized. One of standardized database for vulnerability is CVE. This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research are to create tool for vulnerability assessment and tool to calculate maturity model. [Yogyakarta] : Universitas Gadjah Mada 2014 Thesis NonPeerReviewed , Andrey Ferriyan and , Prof. Jazi Eko Istiyanto, Ph.D (2014) PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN). UNSPECIFIED thesis, UNSPECIFIED. http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
institution Universitas Gadjah Mada
building UGM Library
country Indonesia
collection Repository Civitas UGM
topic ETD
spellingShingle ETD
, Andrey Ferriyan
, Prof. Jazi Eko Istiyanto, Ph.D
PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
description One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets of IT. All of this requires a security management process. One process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. So it needs a method that utilizes a database that has been standardized. One of standardized database for vulnerability is CVE. This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research are to create tool for vulnerability assessment and tool to calculate maturity model.
format Theses and Dissertations
NonPeerReviewed
author , Andrey Ferriyan
, Prof. Jazi Eko Istiyanto, Ph.D
author_facet , Andrey Ferriyan
, Prof. Jazi Eko Istiyanto, Ph.D
author_sort , Andrey Ferriyan
title PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_short PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_full PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_fullStr PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_full_unstemmed PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_sort pengujian kesesuaian keamanan informasi tata kelola pusat data dengan kerangka kerja cobit (studi kasus pusat data pemerintahan kabupaten sleman)
publisher [Yogyakarta] : Universitas Gadjah Mada
publishDate 2014
url https://repository.ugm.ac.id/128273/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
_version_ 1681232765156065280