Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 19891 dokumen yang sesuai dengan query
cover
"The basics of IT audit : purposes, processes, and practical information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.
IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements."
Waltham, MA: Syngress, 2014
e20427746
eBooks  Universitas Indonesia Library
cover
Wheeler, Evan
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks SO  Universitas Indonesia Library
cover
Achmad Arthur Pradana R
"ABSTRAK
Berkaitan dengan organisasi pemantauan keamanan Cyber nasional untuk publik, Indonesia memiliki tim insiden respon terhadap gangguan dan ancaman keamanan internet ID-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure coordination centre) yang bertugas melakukan pengamanan pemanfaatan jaringan telekomunikasi berbasis protokol internet di Indonesia dimana menurut Peraturan Menteri nomor 16/PER/M.KOMINFO/10/2010 yang memiliki peran mendukung terlaksananya proses penegakan hukum, menciptakan lingkungan dan pemanfaatan jaringan telekomunkasi berbasis protokol internet yang aman dari berbagai macam potensi ancaman dan gangguan, Mendukung terlaksananya koordinasi dengan pihak pihak terkait di dalam maupun luar negeri dalam upaya pencegahan, pendeteksian, peringatan dini dan mitigasi insiden pada infrastruktur strategis.
ID-SIRTII/CC dalam kegiatan operasionalnya mengandalkan TI untuk menunjang fungsi dan tugasnya dalam pelayanan publik. Tingginya tingkat ketergantungan organisasi terhadap TIK diperlukan manajemen risiko TI untuk mengurangi atau memperkecil risiko risiko yang terjadi. Sesuai dengan permen kominfo no.41 tahun 2007 bahwa dalam melakukan tata kelola TI oleh institusi pemerintahan diperlukan manajemen risiko atas keberlangsungan layanan.
Pada Karya akhir ini disusun evaluasi terhadap manajemen risiko sistem monitoring ID-SIRTII/CC dengan menggunakan kerangka kerja NIST sp800-30. Perancangannya dimulai dari identifikasi Risiko,Mitigasi Risiko dan Evaluasi terhadap risiko yang ada untuk kemudian mendapatkan rekomendasi kontrol yang diperlukan untuk sistem monitoring ID-SIRTII/CC.

ABSTRACT
In connection with the organization of national cyber security monitoring to the public, Indonesia has incident response team to interference and internet security threats named ID-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure coordination centers). which aims to safeguard the use of internet protocol based telecommunications network in Indonesia where, according to Regulation No. 16 / PER / M.KOMINFO / 10/2010 which has the role of support the implementation of the law enforcement process, creating environmental and utilization of telecommunication networks based on Internet protocols that are safe from various kinds of potential threats and disturbances, Supports implementation in coordination with the relevant parties at home and abroad in the prevention, detection, early warning and mitigation of incidents in strategic infrastructure.
ID-SIRTII/CC in its operations rely on IT to support the functions and duties in the publik service. The high level of dependence on ICT organizations IT risk management is needed to reduce or minimize the risk of the risk. In accordance with Kominfo regulation no.41 of 2007 that in performing IT governance by government institutions necessary risk management on the sustainability of the service.
At the end of the work is structured evaluation of risk management monitoring system with the ID-SIRTII/CC using sp800-30 NIST framework. Its design starting from risk identification, Risk Mitigation and evaluation of the risks that exist to then get recommendations necessary controls for monitoring systems Of ID-SIRTII/CC."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2017
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Winterfeld, Steve
"Contents :
Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed?"
Singapore: Elsiver , 2013
355.343 WIN b
Buku Teks  Universitas Indonesia Library
cover
Mufti Rizal
"Kementerian Sekretariat Negara memiliki tugas pokok dan fungsi dalam memberikan dukungan teknis dan administratif yang prima kepada Presiden dan Wakil Presiden serta pelayanan informasi kepada masyarakat luas secara cepat, akurat, komprehensif, konsisten, dan akuntabel. Untuk mendukung tugas pokok dan fungsi tersebut sudah semestinya memiliki sistem manajemen keamanan informasi dalam menjaga dan melindungi aset data dan informasi yang dimiliki untuk mencegah dan menanggulangi terjadinya kejahatan komputer yang mengancam aset-aset penting pada Kementerian Sekretariat Negara yang memiliki tingkat kekritisan tinggi dan vital yang berisi tentang data dan informasi bersifat kenegaraan dalam kaitan layanan kepada Presiden dan Wakil Presiden.
Oleh karenanya dalam rangka penerapan sistem manajemen keamanan informasi tersebut diperlukan kajian yang komprehensif, salah satunya adalah dengan menggunakan Penilaian Indeks KAMI yang bertujuan untuk mengetahui tingkat kesiapan dan kematangan sistem manajemen keamanan informasi yang dalam kajian ini adalah di Kementerian Sekretariat Negara dengan menilai faktor-faktor: tata kelola, pengelolaan risiko, kerangka kerja, pengelolaan aset serta teknologi dan keamanan informasi.
Adapun hasil dari penelitian ini adalah tersusunnya rekomendasi berkaitan dengan sistem manajemen keamanan informasi yang sesuai dengan kondisi di Kementerian Sekretariat Negara berdasarkan hasil penilaian Indeks KAMI sehingga dapat diterapkan secara sistematis.

Ministry of State Secretariat has duties and functions in providing technical support and administrative excellence to President and Vice President as well as an information service to the public in a timely, accurate, comprehensive, consistent, and accountable. To support the main tasks and functions it should have an information security management system to maintain and protect the data and information assets held to prevent and combat computer crimes that threaten critical assets to the Ministry of the State Secretariat who has a high level of critical and vital that contains about the data and information is a state in terms of service to the President and Vice President.
Therefore, in order to implement the information security management system required a comprehensive study, one of which is using Indeks KAMI Assessment which aims to determine the level of readiness and maturity of information security management systems in this study is in the Ministry of the State Secretariat to assess the factors: governance, risk management framework, as well as asset management and information security technologies.
The results of this research is the formulation of recommendations concerning the information security management system in accordance with the conditions in the Ministry of the State Secretariat based on the assessment of Indeks KAMI that can be applied systematically.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
""This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- Provided by publisher."
Hershey, P.A.: Igi Global, 2014
005.8 ARC
Buku Teks  Universitas Indonesia Library
cover
Javier Lopez, editor
"The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community."
Berlin: [, Springer-Verlag], 2012
e20410495
eBooks  Universitas Indonesia Library
cover
Andress, Jason
"As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The basics of information security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects."
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
Whitman, Michael E.
Boston: CENGAGE LEARNING CUSTOM, 2018
005.8 WHI p
Buku Teks SO  Universitas Indonesia Library
cover
Bacik, Sandy
Boca Raton: CRC Press, Taylor & Francis Group, 2008
005.8 BAC b
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>