Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 18647 dokumen yang sesuai dengan query
cover
Fisher, Royal P.
Englewood Cliffs, NJ: Prentice-Hall, 1984
658.478 FIS i
Buku Teks  Universitas Indonesia Library
cover
Kuong, Javier F.
Englewood Cliffs, NJ: Prentice-Hall, 1987
005.8 KUO c
Buku Teks  Universitas Indonesia Library
cover
Fitri Handayani
"Perubahan dalam industri adalah hal yang tidak dapat dihindari. Segala jenis perubahan dalam industri farmasi termasuk pada Haleon, baik dalam ukuran produksi, kontrol kualitas, kegiatan pergudangan hingga perubahan dalam kontrol akses dan manajemen keamanan password yang digunakan untuk mengakes sistem yang terdapat dalam industri, harus dipertanggung jawabkan melalui sistem manajemen pengendalian perubahan. Tujuan dari penulisan tugas khusus ini adalah mengidentifikasi gambaran manajemen untuk akses kontrol dan manajemen password sistem komputerisasi di PT Sterling Products Indonesia (Haleon) sesuai dengan ketentuan yang terdapat di CDOB. Pelaksanaan dan penulisan tugas khusus ini diawali dengan penjelasan dari validation manager dan membaca LSOP (Local Standard Operating Procedure) terkait dengan manajemen akses kontrol di Industri Haleon, kemudian membuat list table manajemen akses kontrol. Hasil yang diperoleh adalah manajemen akses kontrol dan manajemen password yang telah dikelola oleh PT Sterling Products Indonesia (Haleon) telah sesuai dengan ketentuan yang terdapat di CDOB baik dari segi dokumentasi, persyaratan yang harus dilakukan personil untuk memperoleh akses dan penggunaan password untuk mencegah hal-hal yang tidak diinginkan.

Change in the industry is inevitable. All types of changes in the pharmaceutical industry, including at Haleon, whether in production measures, quality control, warehousing activities to changes in access control and password security management used to access systems in the industry, must be accounted for through a change control management system. The purpose of writing this special assignment is to identify the management description for access control and computerized system password management at PT Sterling Products Indonesia (Haleon) in accordance with the provisions contained in CDOB. Implementing and writing this special assignment begins with an explanation from the validation manager and reading the LSOP (Local Standard Operating Procedure) related to access control management in the Haleon Industry, then creating a list of access control management tables. The results obtained are that access control management and password management which have been managed by PT Sterling Products Indonesia (Haleon) are in accordance with the provisions contained in CDOB both in terms of documentation, requirements that must be carried out by personnel to gain access and use of passwords to prevent things from happening. which is undesirable.
"
Depok: Fakultas Farmasi Universitas Indonesia, 2023
PR-PDF
UI - Tugas Akhir  Universitas Indonesia Library
cover
Perry, William E.
New York: John Wiley & Sons, 1981
629.895 PER c
Buku Teks  Universitas Indonesia Library
cover
"Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.
The basics of digital privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.
The basics of digital privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy"
Waltham, MA: Syngress, 2014
e20427744
eBooks  Universitas Indonesia Library
cover
Wooldridge, Susan
New York : John Wiley & Sons, 1973
658.47 WOO s
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"Managing information security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions."
Waltham, MA: Syngress, 2014
e20427185
eBooks  Universitas Indonesia Library
cover
Putri Fauziah Romadhona
"Sebagai salah satu perusahaan yang bergerak di bidang teknologi, bisnis dari PT XYZ sangat bergantung pada teknologi dan keamanan informasi. Dalam mengamankan informasi, data, dan aset penting perusahaan, PT XYZ menerapkan pengamanan fisik yaitu Physical Access Control System (PACS). Sistem ini diimplementasi untuk melindungi bisnis dan aset perusahaan dari vandalisme, pencurian, dan pelanggaran, khususnya membatasi akses ke fasilitas organisasi yang memerlukan tingkat keamanan dan perlindungan yang lebih tinggi. Namun tingginya kasus insiden yang terjadi pada PACS menjadi kekhawatiran pihak manajemen perusahaan. Padahal tingkat ketergantungan organisasi terhadap keamanan fisik terutama pada PACS sangat tinggi. Insiden-insiden terkait PACS dengan sumber ancaman yang sama kerap terjadi berulang kali tanpa ada pemantauan yang memadai. Maka dari itu, penelitian ini bertujuan untuk melakukan evaluasi manajemen risiko terhadap Physical Access Control System PT XYZ. Pada penelitian ini digunakan beberapa seri standar ISO/IEC 27000 yang dapat membantu penelitian dalam menganalisis risiko dan melengkapi proses dalam mengevaluasi manajemen risiko di organisasi. Standar yang digunakan antara lain ISO/IEC 27001, ISO/IEC 27002, dan ISO/IEC 27005. Penelitian ini merupakan penelitian kualitatif dengan metode pengumpulan data secara studi literatur, dokumen, wawancara, observasi dan Focus Group Discussion. Hasil yang diperoleh dari penelitian ini adalah profil risiko dari PACS dengan total 54 skenario risiko keamanan informasi yang terdiri dari 44 skenario yang tidak diterima, dan 10 skenario risiko diterima. Adapun manfaat dari penelitian ini adalah dihasilkannya rekomendasi penanganan risiko keamanan informasi berdasarkan hasil evaluasi risiko keamanan informasi yang mengacu pada rekomendasi kontrol berdasarkan ISO/IEC 27002 dan diimplementasikan dalam bentuk dokumen Statement of Applicability (SoA).

As a technology company, the business of PT XYZ is highly dependent on technology and information security. In securing information, data, and important company assets, PT XYZ applies a physical security system, namely the Physical Access Control System (PACS). This system is implemented to protect the company’s business and assets from vandalism, theft, and breaches, specifically by restricting access to organizational facilities that require a higher level of security and protection. However, the high occurrence of incidences in PACS is a concern for company management, due to the organization's high level of dependence on physical security, especially PACS. Incidents related to PACS with the same source of threat often occur repeatedly without adequate monitoring. Therefore, this study aims to evaluate the risk management of PT XYZ's Physical Access Control System. In this research, several series of ISO/IEC 27000 standards are used to assist the study in analyzing risk and completing the process of risk management evaluation in organizations. The standards used include ISO/IEC 27001, ISO/IEC 27002, and ISO/IEC 27005. This research is qualitative research with data collection methods of literature studies, documents, interviews, observations, and Focus Group Discussions. The result of this study is the risk profile of PACS with a total of 54 information security risk scenarios consisting of 44 unacceptable scenarios and 10 acceptable risk scenarios. The benefit of this research is the production of recommendations for handling information security risks based on the results of the evaluation of information security risks that refer to control recommendations based on ISO/IEC 27002 and implemented in the form of a Statement of Applicability (SoA) document."
Jakarta: Fakultas Ilmu Komputer Universitas Indonesia, 2022
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Martin, James
Englewood Cliffs, NJ: Prentice-Hall, 1973
651.84 MAR s
Buku Teks  Universitas Indonesia Library
cover
Gore, Marvin R.
New York: McGraw-Hill, 1984
001.64 GOR c
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>