Results 101 to 110 of about 10,997 (203)
This study aims to design and validate a low-cost network security model based on open-source solutions by integrating Pi-hole and Quality of Service (QoS) as a technical implementation of ISO/IEC 27001:2022 controls for resource-constrained organizations.
Budi Wibowo +3 more
openaire +1 more source
Common governance model: a way to avoid data segregation between existing trusted research environment. [PDF]
Torabi F +6 more
europepmc +1 more source
Perlindungan informasi menjadi sangat penting untuk menjaga keamanan suatu organisasi. Komisi Pemilihan Umum (KPU) mengumpulkan dan memproses informasi sensitif, sehingga memerlukan sistem manajemen risiko keamanan informasi yang efektif. Penelitian ini bertujuan untuk menganalisis penerapan standar ISO 27001:2022 dalam manajemen risiko keamanan ...
openaire +1 more source
Dengan meningkatnya penggunaan teknologi informasi dan komunikasi (TIK) dalam kegiatan operasional pendidikan, risiko terhadap keamanan informasi, seperti serangan siber dan bencana alam, menjadi semakin signifikan. Penelitian ini bertujuan untuk mengidentifikasi, menganalisis, dan merancang langkah-langkah mitigasi risiko yang sistematis dan ...
Rosyidah Rosyidah +2 more
openaire +1 more source
MANAJEMEN SISTEM KEAMANAN INFORMASI (KAMI) BERDASARKAN ISO/IEC 27001:2022 PADA SIAK UPI [PDF]
Keamanan informasi merupakan salah satu bentuk pemanfaatan teknologi pada masa sekarang yang dinilai dapat mengurangi risiko adanya tindak kejahatan dalam pengelolaan sistem informasi.
Diyah Nur Fauziyah, -
core
Enhancing Access Control Security Using ISO 27001:2013 and OCTAVE Method [PDF]
The development of Information Technology (IT) has brought various conveniences in organizational operations, but also introduced significant security risks.
Atmodjo, Dwi +3 more
core +2 more sources
Information security and awareness of the dangers of information leakage are the most important things in information technology, especially information that is classified and has strategic value. Information security risk management is an approach organizations use to identify, distribute, measure, and manage risks related to information security ...
Ginanjar Nugraha +3 more
openaire +1 more source
Managing change in cybersecurity: navigating transition between standard versions and compliance with legislation: A case study [PDF]
The International Organization for Standardization introduced a renewed version of the international standard ISO/IEC 27001 in 2022 with new requirements and an updated structure, mandating certified organizations to update their certification to the new
Viheriäranta, Henna-Jasmin
core
Comparative Study between PCI-DSS v4.0 and ISO/IEC 27001:2022
openaire +1 more source

