Results 181 to 190 of about 290,825 (260)
Quantum cryptography and data protection for medical devices before and after they meet Q-Day. [PDF]
Freyer O +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023 9th International Conference on Signal Processing and Intelligent Systems (ICSPIS), 2023
This study evaluates, compares and discuss the approaches of COBIT and ISO 27001 in auditing the Credit Bureau Automation System (CBAS) at PT XYZ. The authors employ a qualitative comparative analysis to explore and synthesize qualitative information ...
Reyhan Syafier Al Hadad, Hanhan Maulana
semanticscholar +1 more source
This study evaluates, compares and discuss the approaches of COBIT and ISO 27001 in auditing the Credit Bureau Automation System (CBAS) at PT XYZ. The authors employ a qualitative comparative analysis to explore and synthesize qualitative information ...
Reyhan Syafier Al Hadad, Hanhan Maulana
semanticscholar +1 more source
ISO 27001 As Information Security Solution In Society 5.0 Era: Systematic Literature Review
SinkrOnIn the era of Society 5.0, information security is an important issue along with the increasing use of technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and big data.
Nurbojatmiko Nurbojatmiko +3 more
semanticscholar +1 more source
Jurnal Indonesia : Manajemen Informatika dan Komunikasi
As service quality becomes paramount, ICT governance is increasingly important for organizations. This study will audit Purwokerto Eye Specialty Hospital's SIMRS against ISO/IEC 27001 standards to evaluate its information security posture.
Rafii Nur Akmal +4 more
semanticscholar +1 more source
As service quality becomes paramount, ICT governance is increasingly important for organizations. This study will audit Purwokerto Eye Specialty Hospital's SIMRS against ISO/IEC 27001 standards to evaluate its information security posture.
Rafii Nur Akmal +4 more
semanticscholar +1 more source
Implementasi ISO 27001:2022 dalam Manajemen Risiko Keamanan Informasi
JURNAL PETISI (Pendidikan Teknologi Informasi)Abstrak: Implementasi ISO 27001:2022 merupakan langkah strategis dalam memperkuat manajemen risiko keamanan informasi di berbagai organisasi. Penelitian ini bertujuan untuk menganalisis penerapan standar ISO 27001:2022 dalam mengelola risiko keamanan ...
Filany Cahya Arumdiya, Christ Rudianto
semanticscholar +1 more source
A Roadmap to ISMS ISO 27001 Implementation Process
2023 3rd International Conference on Range Technology (ICORT), 2023Due to advancement in ICT systems their usage has increased manifold now a days but at the same time these systems cyber-attacks have also increased at the same pace.
C. Rajak +5 more
semanticscholar +1 more source
Jurnal Ilmiah Media Sisfo
PT XYZ merupakan salah satu perusahaan pelayaran di Indonesia yang mengadopsi penggunaan teknologi dalam proses bisnisnya. Hasil wawancara menunjukkan bahwa perusahaan memiliki risiko gangguan pada listrik, jaringan internet, komunikasi antar user dan ...
Raizsa Noor Jevera Meimo Nakashita +6 more
semanticscholar +1 more source
PT XYZ merupakan salah satu perusahaan pelayaran di Indonesia yang mengadopsi penggunaan teknologi dalam proses bisnisnya. Hasil wawancara menunjukkan bahwa perusahaan memiliki risiko gangguan pada listrik, jaringan internet, komunikasi antar user dan ...
Raizsa Noor Jevera Meimo Nakashita +6 more
semanticscholar +1 more source
Data Leakage Prevention in ISO 27001: Compliance and Implementation
International Conference on Information Technology, 2023Control 8.12, Data Leakage Prevention, was introduced in the 2022 version of the ISO 27001 standard. Information security professionals responsible for ensuring compliance with the latest standard should have a thorough understanding of how to implement ...
Veselin Monev
semanticscholar +1 more source
Jurnal Media Informasi Teknologi
This study discusses the evaluation of information security at Benyamin Guluh Kolaka Hospital Using the KAMI Index 4.2 with ISO 27001:2013. This study emphasizes two areas of the KAMI Index 4.2 assessment, namely the first area of information security ...
Karmila Sari +3 more
semanticscholar +1 more source
This study discusses the evaluation of information security at Benyamin Guluh Kolaka Hospital Using the KAMI Index 4.2 with ISO 27001:2013. This study emphasizes two areas of the KAMI Index 4.2 assessment, namely the first area of information security ...
Karmila Sari +3 more
semanticscholar +1 more source
2022 1st International Conference on Software Engineering and Information Technology (ICoSEIT), 2022
XYZ government agency utilizes information technology in its operations. The utilization of Information Technology (IT) assets cannot be separated from the risk of information security.
Alfan Cahyo Wicaksono +2 more
semanticscholar +1 more source
XYZ government agency utilizes information technology in its operations. The utilization of Information Technology (IT) assets cannot be separated from the risk of information security.
Alfan Cahyo Wicaksono +2 more
semanticscholar +1 more source

