Results 1 to 10 of about 290,825 (260)
This research discusses evaluations related to cyber security standardization in the banking sector at Bank Victoria International Tbk using qualitative methods and data collection techniques, interviews and focus group discussions.
Kamil Ryanto, Vitri Tundjungsari
semanticscholar +1 more source
Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution
The purpose of this research is to determine the existing gap to achieve ISO/IEC 27001:2013 certification and determine the maturity level of the information system owned by X Government Institution.
Akmal Zaifullah Maingak +2 more
doaj +1 more source
The NPFIT strategy for information security of care record service [PDF]
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core
In this era of cyber crimes, data security is an important aspect that needs special attention from an organization. This is reinforced by the ratification of Law Number 27 of 2022 on personal data security.
Mustafa Kamal +6 more
semanticscholar +1 more source
Integrating COBIT and ISO Frameworks in IT Audits: A Literature Review
The accelerated evolution of information technology (IT) has compelled organizations to adopt structured governance frameworks to enhance audit efficacy and ensure robust information security.
Muhammad Fauzan Hanif +4 more
doaj +1 more source
Implementation Octave-S and Iso 27001controls in Risk Management Information Systems
Extensive use of information technology in companies put IT into a position which is of considerable concern, especially in large companies that put IT becomes a strategic part of the company. The importance of IT division, make the companies willing to
Stephanus Stephanus
doaj +1 more source
Analisa Manajemen Resiko Keamanan Informasi pada Kantor Pelayanan Pajak Pratama XYZ
Penggunaan Teknologi Informasi di lembaga-lembaga pemerintahan saat ini sangat dibutuhkan untuk mempermudah melakukan pendataan dan pengambilan keputusan yang strategis.
Iwan Santosa, Dwi Kuswanto
doaj +1 more source
Audit Keamanan Informasi: Studi Kasus PT Xyz [PDF]
PT XYZ is a provider of document management services, in cooperation with local/foreign banks. Documents containing customer information, so that information security should be set to provide services that meet information security criteria.
Aviandi, I. (Ivano) +3 more
core
Information security is crucial for organizations managing sensitive data in the digital era. This is especially true for institutions like the Social Security Administrative Body for Health (BPJS Kesehatan), which organizes social health security for ...
Randa Matthew Iroth
doaj +1 more source
Анализ событий информационной безопасности для проведения корректирующих действий по управлению безопасностью [PDF]
The article is devoted to the analysis of the information security events in accordance with international standard ISO/IEC 27001:2005 “Information technology. Security techniques. Information security management systems. Requirements”.
Волокита, А. Н. +1 more
core

