PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)

One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: , Andrey Ferriyan, , Prof. Jazi Eko Istiyanto, Ph.D
التنسيق: Theses and Dissertations NonPeerReviewed
منشور في: [Yogyakarta] : Universitas Gadjah Mada 2014
الموضوعات:
ETD
الوصول للمادة أونلاين:https://repository.ugm.ac.id/128273/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
id id-ugm-repo.128273
record_format dspace
spelling id-ugm-repo.1282732016-03-04T07:53:02Z https://repository.ugm.ac.id/128273/ PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN) , Andrey Ferriyan , Prof. Jazi Eko Istiyanto, Ph.D ETD One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets of IT. All of this requires a security management process. One process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. So it needs a method that utilizes a database that has been standardized. One of standardized database for vulnerability is CVE. This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research are to create tool for vulnerability assessment and tool to calculate maturity model. [Yogyakarta] : Universitas Gadjah Mada 2014 Thesis NonPeerReviewed , Andrey Ferriyan and , Prof. Jazi Eko Istiyanto, Ph.D (2014) PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN). UNSPECIFIED thesis, UNSPECIFIED. http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
institution Universitas Gadjah Mada
building UGM Library
country Indonesia
collection Repository Civitas UGM
topic ETD
spellingShingle ETD
, Andrey Ferriyan
, Prof. Jazi Eko Istiyanto, Ph.D
PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
description One of control domain of COBIT describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity o f the information assets of IT. All of this requires a security management process. One process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. So it needs a method that utilizes a database that has been standardized. One of standardized database for vulnerability is CVE. This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research are to create tool for vulnerability assessment and tool to calculate maturity model.
format Theses and Dissertations
NonPeerReviewed
author , Andrey Ferriyan
, Prof. Jazi Eko Istiyanto, Ph.D
author_facet , Andrey Ferriyan
, Prof. Jazi Eko Istiyanto, Ph.D
author_sort , Andrey Ferriyan
title PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_short PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_full PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_fullStr PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_full_unstemmed PENGUJIAN KESESUAIAN KEAMANAN INFORMASI TATA KELOLA PUSAT DATA DENGAN KERANGKA KERJA COBIT (STUDI KASUS PUSAT DATA PEMERINTAHAN KABUPATEN SLEMAN)
title_sort pengujian kesesuaian keamanan informasi tata kelola pusat data dengan kerangka kerja cobit (studi kasus pusat data pemerintahan kabupaten sleman)
publisher [Yogyakarta] : Universitas Gadjah Mada
publishDate 2014
url https://repository.ugm.ac.id/128273/
http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=68612
_version_ 1681232765156065280