Penyusunan Manajemen Risiko Keamanan Informasi IT Telkom Purwokerto Dengan Standar ISO 27001

Moniq, Kartika Sari (2021) Penyusunan Manajemen Risiko Keamanan Informasi IT Telkom Purwokerto Dengan Standar ISO 27001. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text
1. Cover.pdf

Download (377kB)
[img] Text
3. Abstract.pdf

Download (220kB)
[img] Text
2. Abstrak.pdf

Download (223kB)
[img] Text
4. BAB I.pdf

Download (282kB)
[img] Text
5. BAB II.pdf

Download (695kB)
[img] Text
6. BAB III.pdf

Download (257kB)
[img] Text
7. BAB IV.pdf
Restricted to Registered users only

Download (1MB) | Request a copy
[img] Text
8. BAB V.pdf

Download (223kB)
[img] Text
9. Daftar Pustaka.pdf

Download (341kB)
[img] Text
10. Lampiran.pdf
Restricted to Registered users only

Download (777kB) | Request a copy

Abstract

Information security risk management planning is very important to measure the level of organizational readiness in dealing with threats that may occur. Information security risk management planning at the IT Telkom Purwokerto (ITTP) Campus is also very important, because it is to determine the security of data or information on the campus. The purpose of this study is to design information security risk management in ITTP in accordance with ISO 27001. In relation to ITTP SMKI does not yet have a reference for Information Security. So it is necessary to prepare an ISMS for ITTP. In compiling the ISMS at ITTP the method used is the Information Security Index (KAMI) which is in accordance with the ISO 27001 standard which is one of the ISMS for organizations or companies. These standards will help maintain and build the ISMS of an organization or company. The use of ISMS is to maintain confidentiality, integrity, availability of information, control and manage information security risks. The data collection method used in this study is a qualitative method by conducting interviews with the related units. The results of this study are several assets that have a high level of risk, namely hardware assets including Servers and Routers, software assets including Elerning Applications, E-Learning backup servers, eLearning Databases, Igracias Development and ITTP Suket. Mitigation is needed for assets that have a high level of risk, namely the server requires CCTV in every room and also a light fire extinguisher (APAR). Routers require regular monitoring. Learning Application assets (LMS) require regular data backups. Elearning backup server assets require server storage space, Non Disclosure Agreement (NDA) documents and antivirus. The e-learning and Igracias development database assets require an antivirus. Suket ITTP assets require antivirus, information security policies, NDA documents and regular data backups. Key word : Information Security (KAMI), Risk Profile, ISO 27001

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Informatics > Information System
Depositing User: pustakawan ittp
Date Deposited: 18 Nov 2021 07:09
Last Modified: 27 Jul 2022 01:59
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/6592

Actions (login required)

View Item View Item