Results 21 to 30 of about 10,997 (203)

Risk Risk Assessment and Development of Access Control Information Security Governance Based on ISO/IEC 27001:2013 At XYZ University

open access: yesJATISI (Jurnal Teknik Informatika dan Sistem Informasi), 2022
The rapid development of information technology at this time also has an impact on the use of information technology in the university environment. XYZ University as a university that has quite a lot of students also applies information technology to ...
Laqma Dica Fitrani
semanticscholar   +1 more source

ANALISIS MANAJEMEN RISIKO KEAMANAN INFORMASI MENGGUNAKAN NIST CYBERSECURITY FRAMEWORK DAN ISO/IEC 27001:2013 (Studi Kasus: Badan Pusat Statistik Kalimantan Barat)

open access: yesCoding Jurnal Komputer dan Aplikasi, 2022
Penerapan teknologi informasi yang tepat dapat memberikan dampak baik pada proses bisnis perusahaan maupun instansi pemerintah. Teknologi informasi membuat proses bisnis menjadi efektif dan efisien, sehingga menghasilkan keuntungan lebih besar, salah ...
Tasha Safira Putri   +2 more
semanticscholar   +1 more source

Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Kami 4.2 dan ISO/IEC 27001:2013 (Studi Kasus : Diskominfo Kabupaten Gianyar)

open access: yesJATISI (Jurnal Teknik Informatika dan Sistem Informasi), 2022
Dinas Komunikasi dan Informatika atau Diskominfo Kabupaten Gianyar bertugas membantu Bupati menjalankan kebijakan bidang komunikasi dan informatika, termasuk mengelola dan mengamankan informasi dalam menjalankan pemerintahan daerah sesuai Peraturan ...

semanticscholar   +1 more source

The effect of ISO/IEC 27001 standard over open-source intelligence

open access: yesPeerJ Computer Science, 2022
The Internet’s emergence as a global communication medium has dramatically expanded the volume of content that is freely accessible. Through using this information, open-source intelligence (OSINT) seeks to meet basic intelligence requirements.
A. Qusef, Hamzeh Al-Kilani
semanticscholar   +1 more source

Cybersecurity, Data Privacy and Blockchain: A Review

open access: yesSN Computer Science, 2022
In this paper, we identify and review key challenges to bridge the knowledge-gap between SME’s, companies, organisations, businesses, government institutions and the general public in adopting, promoting and utilising Blockchain technology.
Vinden Wylde   +8 more
semanticscholar   +1 more source

Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry

open access: yesSustainability, 2022
Organizations must be committed to ensuring the confidentiality, availability, and integrity of the information in their possession to manage legal and regulatory obligations and to maintain trusted business relationships. Information security management
F. Kitsios   +2 more
semanticscholar   +1 more source

Information security and privacy in hospitals: a literature mapping and review of research gaps

open access: yesInformatics for Health and Social Care, 2022
Information security and privacy are matters of concern in every industry. The healthcare sector has lagged in terms of implementing cybersecurity measures.
Steve Ahouanmenou   +2 more
semanticscholar   +1 more source

Information Security Risk Assessment Using Situational Awareness Frameworks and Application Tools

open access: yesRisks, 2022
This paper describes the development of situational awareness models and applications to assess cybersecurity risks based on Annex ISO 27001:2013. The risk assessment method used is the direct testing method, namely audit, exercise and penetration ...
Nungky Awang Chandra   +3 more
semanticscholar   +1 more source

Implementation of a data control framework to ensure confidentiality, integrity, and availability of high-quality real-world data (RWD) in the NeuroTransData (NTD) registry

open access: yesJAMIA Open, 2022
Objective To implement a dynamic data management and control framework that meets the multiple demands of high data quality, rigorous information technology security, and flexibility to continuously incorporate new methodology for a large disease ...
Knut Wehrle   +7 more
semanticscholar   +1 more source

Penerapan ISO27001 dalam Menjaga dan Meminimalisir Risiko Keamanan Informasi : Literatur Review

open access: yesMedia jurnal informatika, 2022
Di Masa Sekarang Keamanan data (Data Security) menjadi isu yang sangat penting dan kritis dalam manajemen organisasi. Keamanan data sangat penting untuk melindungi aset atau informasi dengan memberikan kerahasiaan, integritas, dan ketersediaannya tidak ...
Hilaluddin Jauhary   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy