PENGEMBANGAN SECURITY POLICY UNTUK SISTEM JARINGAN TERPADU, Studi Kasus Pada UNIVERSITAS PEMBANGUNAN NASIONAL �VETERAN� JOGJAKARTA
The use of information technology in higher education environments have become common, the various services provided by the college for students or for operational activities campus itself will be more effective when using information technology, namely students' academic system or financial sy...
Saved in:
Main Authors: | , |
---|---|
Format: | Theses and Dissertations NonPeerReviewed |
Published: |
[Yogyakarta] : Universitas Gadjah Mada
2011
|
Subjects: | |
Online Access: | https://repository.ugm.ac.id/90076/ http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=50650 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universitas Gadjah Mada |
Summary: | The use of information technology in higher education environments have become common, the various services provided by the college for students or for operational activities campus itself will be more effective when using information technology, namely students' academic system or financial system that one can imagine how complicated if done manually and not using information technology.
Along with the use of information technology, it is often forgotten in the application of information technology is data security. The data involved in these systems exist in the form of ordinary data that may be accessed by the public but there is also a sensitive data that should be kept secret so as not to be lost, damaged, swapped and not just anyone can access it. Unfortunately this is often not a concern of the managers of campus that could potentially lead to security incidents such as deface websites, databases burglary, theft of data, and things like that. Of these problems required a document that regulates on matters of security related data in the system owned by institution specially educational institutions.
In this thesis, the researcher tries to develop a security policy document for the Universitas Pembangunan Nasional �Veteran� Jogjakarta campus environment. This document was developed starting from the stage of the analysis of business processes that are owned by the Universitas Pembangunan Nasional �Veteran� Jogjakarta, analysis of core infrastructure systems that utilize information technology, then look for security holes and vulnerabilities in the system and network. Based on the analysis results are then compiled an appropriate security policy document with the needs of business processes and expected to make the system work more effectively and efficiently without sacrificing data security and user convenience. |
---|