Results 101 to 110 of about 10,997 (203)

Enhancing Network Security and Performance using DNS Sinkhole and QoS: A Practical ISO/IEC 27001:2022 Implementation

open access: yesInternational Journal of Management Science and Application
This study aims to design and validate a low-cost network security model based on open-source solutions by integrating Pi-hole and Quality of Service (QoS) as a technical implementation of ISO/IEC 27001:2022 controls for resource-constrained organizations.
Budi Wibowo   +3 more
openaire   +1 more source

Common governance model: a way to avoid data segregation between existing trusted research environment. [PDF]

open access: yesInt J Popul Data Sci, 2023
Torabi F   +6 more
europepmc   +1 more source

Manajemen Risiko Keamanan Informasi Menggunakan Standar ISO 27001:2022 Studi Kasus Komisi Pemilihan Umum

open access: yesJURNAL MANAJEMEN RISIKO
Perlindungan informasi menjadi sangat penting untuk menjaga keamanan suatu organisasi. Komisi Pemilihan Umum (KPU) mengumpulkan dan memproses informasi sensitif, sehingga memerlukan sistem manajemen risiko keamanan informasi yang efektif. Penelitian ini bertujuan untuk menganalisis penerapan standar ISO 27001:2022 dalam manajemen risiko keamanan ...
openaire   +1 more source

Perancangan Framework Mitigasi Risiko Pengelolaan Server Menggunakan ISO 27001:2022 (Studi Kasus: Unit KJSI Politeknik Negeri Bengkalis)

open access: yesJournal of Accounting Law Communication and Technology
Dengan meningkatnya penggunaan teknologi informasi dan komunikasi (TIK) dalam kegiatan operasional pendidikan, risiko terhadap keamanan informasi, seperti serangan siber dan bencana alam, menjadi semakin signifikan. Penelitian ini bertujuan untuk mengidentifikasi, menganalisis, dan merancang langkah-langkah mitigasi risiko yang sistematis dan ...
Rosyidah Rosyidah   +2 more
openaire   +1 more source

MANAJEMEN SISTEM KEAMANAN INFORMASI (KAMI) BERDASARKAN ISO/IEC 27001:2022 PADA SIAK UPI [PDF]

open access: yes
Keamanan informasi merupakan salah satu bentuk pemanfaatan teknologi pada masa sekarang yang dinilai dapat mengurangi risiko adanya tindak kejahatan dalam pengelolaan sistem informasi.
Diyah Nur Fauziyah, -
core  

Enhancing Access Control Security Using ISO 27001:2013 and OCTAVE Method [PDF]

open access: yes
The development of Information Technology (IT) has brought various conveniences in organizational operations, but also introduced significant security risks.
Atmodjo, Dwi   +3 more
core   +2 more sources

Preparation of Information Security Risk Management Based on Iso / IEC 27001: 2022 at Diskominfo West Java Province

open access: yesInternational Journal of Marketing & Human Resource Research
Information security and awareness of the dangers of information leakage are the most important things in information technology, especially information that is classified and has strategic value. Information security risk management is an approach organizations use to identify, distribute, measure, and manage risks related to information security ...
Ginanjar Nugraha   +3 more
openaire   +1 more source

Managing change in cybersecurity: navigating transition between standard versions and compliance with legislation: A case study [PDF]

open access: yes
The International Organization for Standardization introduced a renewed version of the international standard ISO/IEC 27001 in 2022 with new requirements and an updated structure, mandating certified organizations to update their certification to the new
Viheriäranta, Henna-Jasmin
core  

Comparative Study between PCI-DSS v4.0 and ISO/IEC 27001:2022

open access: yesInternational Journal of Science and Research (IJSR), 2023
openaire   +1 more source

Home - About - Disclaimer - Privacy