Results 1 to 10 of about 6,798 (142)

EVALUASI KEAMANAN SISTEM INFORMASI AKADEMIK DI STMIK JAYAKARTA BERDASARKAN ISO/IEC 27001:2022 [PDF]

open access: yesIJIS - Indonesian Journal On Information System
Meningkatnya penggunaan sistem informasi akademik di perguruan tinggi menuntut perhatian serius terhadap aspek keamanan informasi. Penelitian ini bertujuan untuk mengevaluasi tingkat kesesuaian keamanan sistem informasi akademik di STMIK Jayakarta dengan mengacu pada standar ISO/IEC 27001:2022.
Desiani Zalukhu   +2 more
openaire   +3 more sources

Pengembangan Model Penilaian Kepatuhan Salah Satu Perguruan Tinggi Terhadap Standar ISO 27001:2022 [PDF]

open access: yesJurnal Teknik Informatika dan Sistem Informasi
Sistem keamanan informasi penting bagi organisasi, termasuk perguruan tinggi karena merupakan aspek yang krusial dalam dunia digital saat ini. Dalam konteks ini ISO 27001:2022 adalah standar penting. Salah satu perguruan tinggi yang ada di Kota Jambi mengelola data sensitif , menggunakan berbagai sistem informasi seperti data mahasiswa, dosen, keuangan,
Rudolf Sinaga
openaire   +4 more sources

Standardization of Information Security Management in the Banking Sector using the ISO 27001:2022 Framework [PDF]

open access: yesJournal La Multiapp
This research discusses evaluations related to cyber security standardization in the banking sector at Bank Victoria International Tbk using qualitative methods and data collection techniques, interviews and focus group discussions. The focus of this research is evaluation related to Data Leaks, Threats of Attacks from outside, and Policies for ...
Kamil Ryanto, Vitri Tundjungsari
openaire   +3 more sources

Information Security Failures Measured and ISO/IEC 27001:2022 Controls Ranked by General Data Protection Regulation Penalty Analysis [PDF]

open access: yes2023 11th International Conference on Cyber and IT Service Management (CITSM), 2023
Selecting the most important information security controls is a critical and difficult process. Therefore, the decision-making on how to manage risks and threats has to be supported with data-driven performance measurement metrics. This paper identifies and explores the failures and impacts of information security, as well as the most effective ...
Suorsa, Mikko, Helo, Petri
openaire   +4 more sources

Risk Assessment at it Company by Focusing on Information Security Area Using Iso 27001:2022 [PDF]

open access: yesSyntax Literate ; Jurnal Ilmiah Indonesia
Modern technology companies should prioritize information security by focusing on system vulnerabilities and adopting a risk management approach based on the ISO/IEC 27001:2022 standard. This method needs to be implemented through several stages of risk assessment to ensure and measure the extent to which the organization effectively addresses ...
Athallariq Rafii Nugroho, Nilo Legowo
openaire   +3 more sources

Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update

open access: yesInternational Journal on Cybernetics & Informatics, 2023
The risk of data theft has increased significantly over the past years. As a consequence, overwhelming damage is caused to institutions and private persons, respectively. Even the widespread ISO standard 27001 was updated recently in October 2022 to integrate data exfiltration aspects. Corresponding new security controls have been introduced.
Michael Mundt, Harald Baier
openaire   +1 more source

Assessing Information Security Management Using ISO 27001:2013 [PDF]

open access: yes, 2023
To ensure operational continuity, reduce risks to businesses, and optimize investment returns and business opportunities, information security is an essential element in ensuring the protection of information from different threats.
Clarissa, Stella, Wang, Gunawan
core   +2 more sources

РОЗРОБКА МЕТОДОЛОГІЇ ОЦІНКИ ВІДПОВІДНОСТІ СТАНДАРТУ ISO 27001 [PDF]

open access: yes, 2023
This document proposes the methodology for assessing organizations' compliance with the new version of the ISO 27001 standard, which was introduced at the end of 2022.
Курій , Євгеній   +2 more
core   +2 more sources

Forecasting the diffusion of ISO/IEC 27001: a Grey model approach [PDF]

open access: yes, 2023
Purpose: The aim of this paper is to present the first diffusion analysis of ISO/IEC 27001, the fourth most popular ISO certification at global level and the most important standard for information security.
Podrecca M., Sartor M.
core   +4 more sources

Peran IT Governance dan Security di PT. United Tractors Tbk [PDF]

open access: yes, 2023
PT. United Tractors adalah perusahaan yang berperan sebagai distributor alat berat terbesar di Indonesia sejak tahun 1972 dan berperan di bidang kontraktor, penambangan, dan pertambangan batu bara. PT.
Nauli Marpaung, Anggita
core  

Home - About - Disclaimer - Privacy