Results 1 to 10 of about 290,825 (260)

Standardization of Information Security Management in the Banking Sector using the ISO 27001:2022 Framework

open access: yesJournal La Multiapp
This research discusses evaluations related to cyber security standardization in the banking sector at Bank Victoria International Tbk using qualitative methods and data collection techniques, interviews and focus group discussions.
Kamil Ryanto, Vitri Tundjungsari
semanticscholar   +1 more source

Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution

open access: yesTrikonomika, 2018
The purpose of this research is to determine the existing gap to achieve ISO/IEC 27001:2013 certification and determine the maturity level of the information system owned by X Government Institution.
Akmal Zaifullah Maingak   +2 more
doaj   +1 more source

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

Information Technology Security Audit at the YDSF National Zakat Institution Using the ISO 27001 Framework

open access: yesJurnal Sisfokom (Sistem Informasi dan Komputer)
In this era of cyber crimes, data security is an important aspect that needs special attention from an organization. This is reinforced by the ratification of Law Number 27 of 2022 on personal data security.
Mustafa Kamal   +6 more
semanticscholar   +1 more source

Integrating COBIT and ISO Frameworks in IT Audits: A Literature Review

open access: yesInternational Journal of Emerging Research in Engineering, Science, and Management
The accelerated evolution of information technology (IT) has compelled organizations to adopt structured governance frameworks to enhance audit efficacy and ensure robust information security.
Muhammad Fauzan Hanif   +4 more
doaj   +1 more source

Implementation Octave-S and Iso 27001controls in Risk Management Information Systems

open access: yesComTech, 2014
Extensive use of information technology in companies put IT into a position which is of considerable concern, especially in large companies that put IT becomes a strategic part of the company. The importance of IT division, make the companies willing to
Stephanus Stephanus
doaj   +1 more source

Analisa Manajemen Resiko Keamanan Informasi pada Kantor Pelayanan Pajak Pratama XYZ

open access: yesRekayasa, 2016
Penggunaan Teknologi Informasi di lembaga-lembaga pemerintahan saat ini sangat dibutuhkan untuk mempermudah melakukan pendataan dan pengambilan keputusan yang strategis.
Iwan Santosa, Dwi Kuswanto
doaj   +1 more source

Audit Keamanan Informasi: Studi Kasus PT Xyz [PDF]

open access: yes, 2013
PT XYZ is a provider of document management services, in cooperation with local/foreign banks. Documents containing customer information, so that information security should be set to provide services that meet information security criteria.
Aviandi, I. (Ivano)   +3 more
core  

Information Security Management System (ISMS) at BPJS Kesehatan Tondano: Implementation of ISO 27001:2022 Standard

open access: yesJurnal Jaminan Kesehatan Nasional
Information security is crucial for organizations managing sensitive data in the digital era. This is especially true for institutions like the Social Security Administrative Body for Health (BPJS Kesehatan), which organizes social health security for ...
Randa Matthew Iroth
doaj   +1 more source

Анализ событий информационной безопасности для проведения корректирующих действий по управлению безопасностью [PDF]

open access: yes, 2009
The article is devoted to the analysis of the information security events in accordance with international standard ISO/IEC 27001:2005 “Information technology. Security techniques. Information security management systems. Requirements”.
Волокита, А. Н.   +1 more
core  

Home - About - Disclaimer - Privacy