Pengembangan Sistem Manajemen Keamanan Informasi (SMKI) Pada Pusat Data UPT Puskom Polinela
DOI:
https://doi.org/10.25181/esai.v9i2.934Abstract
In the implementation of ICT an educational institution, a data center is an ICT facility which is used as a placement, storage, and data and information processing. The ICT facilities are very risky at main business process when unmanaged appropriately. ISO27001 is an information security management system standard that can be used as a reference in designing a management of ICT facilities. This paper describes the design of an information security management system in a data center of State Polytechnics of Lampung (Polinela). This study begins by studying general description of the organization; defining the scope of the evaluation, and designing the tools. Expert judgment evaluation results show that the control of the recommended risk control is appropriate and can be applied to the locus of research.Key words : ISMS, security, information, managementDownloads
References
Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on, (pp. 715-722).
Hajdarevic, K., Pattinson, C., Kozaric, K., & Hadzic, A. (2012). Information security measurement infrastructure for KPI visualization. MIPRO, 2012 Proceedings of the 35th International Convention, (pp. 1543-1548).
ISACA;. (2013). Cobit 5 For Risk. Illinois: ISACA.
ISO/IEC. (2005). ISO/IEC 27001 Information technology — Security techniques — Information security management systems — Requirements. Switzerland,: ISO/IEC.
ISO/IEC. (2005). ISO 17799:2005 (ISO 27002:2005) )Information technology -- Security techniques -- Code of practice for information security management. Swiziterland,: ISO/IEC.
ISO/IEC. (2005). ISO/IEC 27002:2005 Information technology — Security techniques — Code of practice for information security management . Switzerland,: ISO/IEC.
Iqbal, A., Horie, D., & Cheng, J. (2009). A Database System for Effective Utilization of ISO/IEC 27002. International Conference on Frontier of Computer Science and Technology. Saitama.
Paulina, J., & Marek, P. (2007). Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology.
Salmeha, H., Toivonen, S., & Scholliers, J. (2009). Enhancing supply chain security with vulnerability management and new technology. IET Intelligent Transport Systems. Finland.