skip to main content

Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI)

Rusydi Umar  -  Universitas Ahmad Dahlan, Indonesia
Imam Riadi  -  Universitas Ahmad Dahlan, Indonesia
*Eko Handoyo  -  Universitas Ahmad Dahlan, Indonesia
Open Access Copyright (c) 2019 JSINBIS (Jurnal Sistem Informasi Bisnis)

Citation Format:
Abstract

Information technology is a very important part of a company or institution. The information system itself is expected to provide better benefits for companies or institutions. However, along with technological developments are often misused by some irresponsible parties that can lead to threats of the use of technology. Information system security is very important for institutions to maintain information optimally and safely. The existence of a security problem triggers a procedure to control access rights in an information system. A good information system is an information system that can be assessed at a security level, so that it can provide comfort for users. COBIT 5 as an information technology security control standard. Whereas to achieve the standard level of achievement CMMI is needed in information technology security. The combination of the two standards in the information system is able to provide a level of achievement of information technology. The results obtained from the maturity value are 4,458 which means the institutions are at the Managed and Measurable level. This level, institutions are increasingly made aware of technological developments. Institutions have implemented the quantification concept in each process, and are always monitored and controlled for performance. Information system security at this level is good, it's just that it still needs innovation and development to be ready, fast and right in handling security threats.

Note: This article has supplementary file(s).

Fulltext View|Download |  common.other
Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI)
Subject
Type Other
  Download (4MB)    Indexing metadata
Keywords: CMMI; COBIT 5; Security; Managed and Measurable; Information Systems; Information Technology
Funding: Biro Sistem Informasi dan Komunikasi (BISKOM) Universitas Ahmad Dahlan (UAD)

Article Metrics:

  1. Farida, S. I., Rahajeng, E., 2014. Usulan model tata kelola teknologi informasi pada domain monitor , evaluate and assess dengan metode framework COBIT 5.. Studi Informatika: Jurnal Sistem Informasi, (Vol. 7)
  2. Fathoni, L. F., Firdausy, K., Yudhana, A., 2016. Application information system based health services android. Jurnal Ilmu Teknik Elektro Komputer Dan Informatika (JITEKI), 2(1), 39–48
  3. Firmansyah, D., 2015. Pengukuran kapabilitas pengelolaan sistem informasi sub domain deliver , service , support 01 menggunakan framework Cobit 5 Studi Kasus : Politeknik Komputer Niaga LPKIA Bandung. In Konferensi Nasional Sistem & Informatika 2015 (pp. 689–695)
  4. Hermaduanti, N., Riadi, I., 2016. Automation framework for rogue access point mitigation in ieee 802.1X-based WLAN. Journal of Theoretical and Applied Information Technology, 93(2), 287–296
  5. Hicham, E., Boulafdour, B., Makoudi, M., Regragui, B., 2012. Information security, 4TH wave. Journal of Theoretical and Applied Information Technology, 43(1), 1–7
  6. ISACA., 2011. A Business Framework for the Governance and Management of Enterprise IT
  7. Karami, A. F., 2017. Manajemen kualitas data dan informasi berbantuan sistem informasi untuk meningkatkan kinerja operasional pabrik pengolahan kelapa sawit. JSINBIS (Jurnal Sistem Informasi Bisnis), 01, 88–95
  8. Konttinen, V., 2016. Towards Disciplined Software Development
  9. Kurniawan, A. D. E., Riadi, I., Luthfi, A., 2017. Forensic Analysis and Prevent of Cross Site Scripting in Single Victim Attack Using Open Web Application Security Project (OWASP) framework. Journal of Theoretical and Applied Information Technology, 95(6), 1363–1371
  10. Kurniawan, E., Riadi, I., 2018a. Analisis tingkat keamanan sistem informasi akademik berdasarkan standar ISO 27002 : 2013 menggunakan SSE-CMM. Jurnal Ilmia Penelitian Teknologi Dan Penerapan Sistem Informasi, 2(1), 12–23
  11. Kurniawan, E., Riadi, I., 2018b. Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM. International Journal of Computer Science and Information Security (IJCSIS), 16(1), 139–147
  12. Otarkhani, A., Shokouhyar, S., Pour, S., 2017. Analyzing the impact of governance of enterprise it on hospital performance. International Journal of Healthcare Information Systems and Informatics, 12(3), 1–20
  13. Prasetyo, A., Mariana, N., 2011. Analisis tata kelola teknologi informasi (IT governance) pada bidang akademik dengan cobit framework studi kasus pada Universitas Stikubank Semarang. Jurnal Teknologi Informasi DINAMIK, 16(2), 139–149
  14. Rahayu, P., Sensuse, D. I., 2017. Penilaian implementasi e-government di PUSTEKOM Kemendikbud berbasis metode PEGI. Jurnal Sistem Informasi Bisnis, 02, 139–145
  15. Raichel, L., Brannon, K., Fumy, W., Soete, M. De, Humphreys, E. J., Naemura, K., Ohlin, M. 2005. INTERNATIONAL STANDARD ISO / IEC
  16. Riadi, Imam Sunardi Firdonsyah, A. F., 2019. Forensic investigation technique on android’s blackberry messenger using NIST framework. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6, 6(4), 198–205
  17. Riadi, I., 2016. Analisis keamanan informasi berdasarkan kebutuhan teknikal dan operasional mengkombinasikan standar ISO 27001 : 2005 dengan maturity level (studi kasus kantor biro teknologi informasi PT . XYZ). Seminar Nasional Teknologi Informasi Dan Multimedia 2016, 6(6), 6–7
  18. Riadi, I., Yudhana, A., Caesar, M., Putra, F., 2018. Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method, Scientific Journal of Informatics 5(2), 235–247
  19. Rosmiati, Riadi, I., Prayudi, Y., 2016. A Maturity level framework for measurement of information security performance. International Journal of Computer Applications, 141(8), 975–8887
  20. Syafitri, P. D., 2016. Penilaian kualitas pengembangan sistem informasi pada perusahaan distributor. Jurnal Sistem Informasi Bisnis, 10(01), 15–27
  21. Umar, R., Riadi, I., Handoyo, E., 2017. Analisis Tata kelola teknologi informasi menggunakan framework COBIT 5 Pada Domain Delivery, Service, And Support (DSS). In Seminar Nasional Teknologi Informasi dan Komunikasi - SEMANTIKOM 2017 (pp. 41–48)
  22. Umar, R., Riadi, I., Zamroni, G. M., 2018. Mobile Forensic tools evaluation for digital crime investigation. International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 8(3), 949. https://doi.org/10.18517/ijaseit.8.3.3591
  23. Yunanri, W., Riadi, I., Yudhana, A., 2016. Analisis keamanan webserver menggunakan metode penetrasi testing. In Annual Research Seminar (Vol. 2, pp. 300–304)

Last update:

  1. The Office Room Security System Using Face Recognition Based on Viola-Jones Algorithm and RBFN

    Andree E. Widjaja, Hery Hery, David Habsara Hareva. INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, 5 (1), 2021. doi: 10.29407/intensif.v5i1.14435
  2. Audit Tata Kelola Teknologi Informasi dalam Mendukung Penerapan Good Corporate Governance (Studi Kasus PT XYZ)

    Agustin Simatupang, Henricus Judi Adrianto. Jurnal Sistem Informasi Bisnis, 14 (2), 2024. doi: 10.21456/vol14iss2pp162-170
  3. Analisis Multi Computer System Menggunakan Framework COBIT 2019 pada Perusahaan Perkakas

    Michelle Disa Widjaja, Johanes Fernandes Andry. Jurnal Sistem Informasi Bisnis, 13 (2), 2023. doi: 10.21456/vol13iss2pp120-126

Last update: 2024-12-21 07:24:28

No citation recorded.