PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)

One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: , Andrey Ferriyan, , Prof. Jazi Eko Istiyanto, Ph.D
التنسيق: Theses and Dissertations NonPeerReviewed
منشور في: [Yogyakarta] : Universitas Gadjah Mada 2014
الموضوعات:
ETD
الوصول للمادة أونلاين:https://repository.ugm.ac.id/128273/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets of IT. All of this requires a security management process. One process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. So it needs a method that utilizes a database that has been standardized. One of standardized database for vulnerability is CVE. This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research are to create tool for vulnerability assessment and tool to calculate maturity model.