Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI)
Subject | |
Type | Other |
Download (4MB) Indexing metadata |

Information technology is a very important part of a company or institution. The information system itself is expected to provide better benefits for companies or institutions. However, along with technological developments are often misused by some irresponsible parties that can lead to threats of the use of technology. Information system security is very important for institutions to maintain information optimally and safely. The existence of a security problem triggers a procedure to control access rights in an information system. A good information system is an information system that can be assessed at a security level, so that it can provide comfort for users. COBIT 5 as an information technology security control standard. Whereas to achieve the standard level of achievement CMMI is needed in information technology security. The combination of the two standards in the information system is able to provide a level of achievement of information technology. The results obtained from the maturity value are 4,458 which means the institutions are at the Managed and Measurable level. This level, institutions are increasingly made aware of technological developments. Institutions have implemented the quantification concept in each process, and are always monitored and controlled for performance. Information system security at this level is good, it's just that it still needs innovation and development to be ready, fast and right in handling security threats.
Note: This article has supplementary file(s).
Article Metrics:
- Farida, S. I., Rahajeng, E., 2014. Usulan model tata kelola teknologi informasi pada domain monitor , evaluate and assess dengan metode framework COBIT 5.. Studi Informatika: Jurnal Sistem Informasi, (Vol. 7)
- Fathoni, L. F., Firdausy, K., Yudhana, A., 2016. Application information system based health services android. Jurnal Ilmu Teknik Elektro Komputer Dan Informatika (JITEKI), 2(1), 39–48
- Firmansyah, D., 2015. Pengukuran kapabilitas pengelolaan sistem informasi sub domain deliver , service , support 01 menggunakan framework Cobit 5 Studi Kasus : Politeknik Komputer Niaga LPKIA Bandung. In Konferensi Nasional Sistem & Informatika 2015 (pp. 689–695)
- Hermaduanti, N., Riadi, I., 2016. Automation framework for rogue access point mitigation in ieee 802.1X-based WLAN. Journal of Theoretical and Applied Information Technology, 93(2), 287–296
- Hicham, E., Boulafdour, B., Makoudi, M., Regragui, B., 2012. Information security, 4TH wave. Journal of Theoretical and Applied Information Technology, 43(1), 1–7
- ISACA., 2011. A Business Framework for the Governance and Management of Enterprise IT
- Karami, A. F., 2017. Manajemen kualitas data dan informasi berbantuan sistem informasi untuk meningkatkan kinerja operasional pabrik pengolahan kelapa sawit. JSINBIS (Jurnal Sistem Informasi Bisnis), 01, 88–95
- Konttinen, V., 2016. Towards Disciplined Software Development
- Kurniawan, A. D. E., Riadi, I., Luthfi, A., 2017. Forensic Analysis and Prevent of Cross Site Scripting in Single Victim Attack Using Open Web Application Security Project (OWASP) framework. Journal of Theoretical and Applied Information Technology, 95(6), 1363–1371
- Kurniawan, E., Riadi, I., 2018a. Analisis tingkat keamanan sistem informasi akademik berdasarkan standar ISO 27002 : 2013 menggunakan SSE-CMM. Jurnal Ilmia Penelitian Teknologi Dan Penerapan Sistem Informasi, 2(1), 12–23
- Kurniawan, E., Riadi, I., 2018b. Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM. International Journal of Computer Science and Information Security (IJCSIS), 16(1), 139–147
- Otarkhani, A., Shokouhyar, S., Pour, S., 2017. Analyzing the impact of governance of enterprise it on hospital performance. International Journal of Healthcare Information Systems and Informatics, 12(3), 1–20
- Prasetyo, A., Mariana, N., 2011. Analisis tata kelola teknologi informasi (IT governance) pada bidang akademik dengan cobit framework studi kasus pada Universitas Stikubank Semarang. Jurnal Teknologi Informasi DINAMIK, 16(2), 139–149
- Rahayu, P., Sensuse, D. I., 2017. Penilaian implementasi e-government di PUSTEKOM Kemendikbud berbasis metode PEGI. Jurnal Sistem Informasi Bisnis, 02, 139–145
- Raichel, L., Brannon, K., Fumy, W., Soete, M. De, Humphreys, E. J., Naemura, K., Ohlin, M. 2005. INTERNATIONAL STANDARD ISO / IEC
- Riadi, Imam Sunardi Firdonsyah, A. F., 2019. Forensic investigation technique on android’s blackberry messenger using NIST framework. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6, 6(4), 198–205
- Riadi, I., 2016. Analisis keamanan informasi berdasarkan kebutuhan teknikal dan operasional mengkombinasikan standar ISO 27001 : 2005 dengan maturity level (studi kasus kantor biro teknologi informasi PT . XYZ). Seminar Nasional Teknologi Informasi Dan Multimedia 2016, 6(6), 6–7
- Riadi, I., Yudhana, A., Caesar, M., Putra, F., 2018. Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method, Scientific Journal of Informatics 5(2), 235–247
- Rosmiati, Riadi, I., Prayudi, Y., 2016. A Maturity level framework for measurement of information security performance. International Journal of Computer Applications, 141(8), 975–8887
- Syafitri, P. D., 2016. Penilaian kualitas pengembangan sistem informasi pada perusahaan distributor. Jurnal Sistem Informasi Bisnis, 10(01), 15–27
- Umar, R., Riadi, I., Handoyo, E., 2017. Analisis Tata kelola teknologi informasi menggunakan framework COBIT 5 Pada Domain Delivery, Service, And Support (DSS). In Seminar Nasional Teknologi Informasi dan Komunikasi - SEMANTIKOM 2017 (pp. 41–48)
- Umar, R., Riadi, I., Zamroni, G. M., 2018. Mobile Forensic tools evaluation for digital crime investigation. International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), 8(3), 949. https://doi.org/10.18517/ijaseit.8.3.3591
- Yunanri, W., Riadi, I., Yudhana, A., 2016. Analisis keamanan webserver menggunakan metode penetrasi testing. In Annual Research Seminar (Vol. 2, pp. 300–304)
Last update: 2021-04-15 18:55:53
Last update: 2021-04-15 18:55:53
Penulis yang mengirimkan naskah harus memahami dan menyetujui bahwa jika diterima untuk dipublikasikan, hak cipta dari artikel adalah milik JSINBIS dan Universitas Diponegoro sebagai penerbit jurnal.
Hak cipta (copyright) meliputi hak eksklusif untuk mereproduksi dan memberikan artikel dalam semua bentuk dan media, termasuk cetak ulang, foto, mikrofilm dan setiap reproduksi lain yang sejenis, serta terjemahan. Penulis mempunyai hak untuk hal-hal berikut:
- menggandakan seluruh atau sebagian materi yang dipublikasikan untuk digunakan oleh penulis sendiri sebagai bahan pengajaran di kelas atau bahan presentasi lisan dalam berbagai forum;
- menggunakan kembali sebagian atau keseluruhan materi sebagai bahan kompilasi bagi karya tulis penulis;
- membuat salinan dari bahan yang dipublikasikan untuk didistribusikan di lingkungan institusi tempat penulis bekerja.
JSINBIS dan Universitas Diponegoro serta Editor melakukan segala upaya untuk memastikan bahwa tidak ada data, pendapat atau pernyataan yang salah atau menyesatkan yang dipublikasikan di jurnal ini. Isi artikel yang diterbitkan di JSINBIS adalah tanggung jawab tunggal dan eksklusif dari masing-masing penulis.