Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3 dokumen yang sesuai dengan query
cover
Doni Dwi Hantyoko Wahyudiwan
Abstrak :
ABSTRAK
IdGov-CSIRT melaporkan bahwa selama kurun waktu tahun 2015 terdapat 1.811 insiden keamanan informasi pada sistem informasi milik pemerintah domain go.id . Data tersebut menunjukkan bahwa pemanfaatan TI di lingkungan pemerintahan terutama yang menggunakan domain go.id masih tidak aman dan rentan terhadap serangan. Berdasarkan kondisi tersebut, maka perlu adanya kontrol untuk mengurangi risiko keamanan informasi. Kementerian Riset, Teknologi dan Pendidikan Tinggi Kemenristekdikti memiliki 40 sistem informasi berbasis web dengan domain go.id yang digunakan untuk mendukung operasional unit kerja, sehingga pemanfaatan TI di Kemenristekdikti memiliki risiko dan rentan terhadap serangan keamanan informasi. Beberapa ahli menyatakan, keamanan informasi tidak hanya terkait permasalahan teknis saja, tetapi juga terkait dengan orang dalam hal ini pegawai yang berada di dalam internal organisasi. Ahli juga berpendapat bahwa ancaman terbesar keamanan informasi organisasi berasal dari pegawai organisasi tersebut. Hal ini disebabkan pegawai merupakan orang yang paling dekat dan setiap hari bersinggungan dengan data organisasi. Berdasarkan kondisi tersebut, penelitian ini bertujuan untuk mengukur tingkat kesadaran pegawai Kemenristekdikti terhadap keamanan informasi. Penelitian ini menggunakan variabel pengetahuan, sikap dan perilaku dari Knowledge, Attitude and Behaviour KAB model untuk mengukur tingkat kesadaran pegawai terhadap keamanan informasi. Hasil yang didapat pada penelitian ini adalah tingkat kesadaran pegawai Kemenristekdikti terhadap keamanan informasi berada pada tingkat baik. Berdasarkan ketiga variabel yang digunakan untuk mengukur kesadaran terhadap keamanan informasi, variabel perilaku berada pada tingkat sedang, sedangkan variabel pengetahuan dan sikap berada pada tingkat baik.
ABSTRAK
IdGov CSIRT reported that during the period of 2015 there were 1,811 incidents of information security at government owned information systems domain go.id . The data indicate that the use of IT in government, especially the use of domain go.id still insecure and vulnerable to attack. Under these conditions, neededcontrols to reduce the risk of information security. Ministry of Research, Technology and Higher Education Kemenristekdikti has 40 web based information systems with domain go.id used to support the unit operation, so that the use of IT in Kemenristekdikti at risk and vulnerable to security attacks information. Some experts said that information security is not only related to technical problems, but also related to the people in this case the employees who were in the internal organization. The expert also believes that the greatest threat comes from the organization 39 s information security employees of the organization. Because an employee is the closed person and daily contact with the organization 39 s data. Under these conditions, this study aims to measure the level of Kemenristekdikti employee rsquo s information security awareness. This study uses knowledge, attitudes and behavior variable from KAB models to measure the level of employees information security awareness. The results of this study is the level of Kemenristekdikti employee rsquo s information security awareness at a good level. Based on the three variables used to measure awareness of information security, behavioral variables are at the average level, while the variable knowledge and attitudes are at a good level.
2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Abstrak :
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA compliance handbook, explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of certification and accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST risk management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an authority to operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government?s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Waltham, MA: Syngress, 2013
e20427059
eBooks  Universitas Indonesia Library
cover
Abstrak :
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.
Waltham, MA: Syngress, 2013
e20427926
eBooks  Universitas Indonesia Library