scholarly journals Audit Keamanan Aplikasi E-Cash Menggunakan Iso 27001

2020 ◽  
Vol 5 (4) ◽  
pp. 243
Author(s):  
Paradise Paradise ◽  
Kusrini Kusrini ◽  
Asro Nasiri

Mandiri e-cash adalah uang elektronik yang dikeluarkan oleh Bank Mandiri, berbasis server yang memanfaatkan teknologi aplikasi di handphone atau yang disebut sebagai uang tunai di handphone. Dalam pelaksanaannya, mandiri e-cash memberikan kemudahan kepada pengguna dalam proses transaksi keuangan, akan tetapi disamping itu banyak juga keluhan masyarakat akan maraknya tindak kejahatan dunia maya melalui mandiri e-cash. Keamanan adalah hal penting yang harus diperhatikan oleh pihak bank, mengingat pentingnya data-data yang ada pada aplikasi ini. Untuk mengukur keamanan informasi tersebut penulis akan melakukan audit menggunakan ISO 27001 untuk memastikan Bank Mandiri bekerja sesuai dengan procedure yang ada. ISO/IEC 27001:2005 adalah standar keamanan sistem informasi yang mempunyai 27 klausul untuk mengukur tingkat keamanan bank. Hasil audit didapatkan dari observasi, wawancara, dan pembagian kuisoner kepada responden yang telah dipilih. Hasil yang didapat dari penelitian ini adalah tingkat maturity level dari hasil perhitungan beberapa klausul yang dipilih. Dari hasil tersebut akan ditemukan rekomendasi dan saran untuk aplikasi Mandiri E-Cash.Kata Kunci — Audit, E-Cash, ISO 27001Mandirie-cash is an electronic money issued by Bank Mandiri, a server-based technology applications in mobile phones or called as cash in mobile. In practice, independent e-cash provides convenience to users in the process of financial transactions, but also many complaints besides communities will be rampant cyberspace crimes through mandiri e-cash. Security is important things that must be considered by the bank, given the importance of the existing data on this application. To measure the information security writers will use ISO 27001 audit to ensure Bank Mandiri working in accordance with the existing procedure. ISO/IEC 27001:2005 information systems security is a standard which has 27 clauses to measure the level of security of a company or organization. Audit results obtained from observation, interview, and Division kuisoner to selected respondents. The results obtained from this research is the level of maturity level of the results of the calculations of some of the selected clause. The results will be found from recommendations and suggestions for the standalone application E-Cash.Keyword — Auditing, E-Cash, ISO 27001

2014 ◽  
Vol 905 ◽  
pp. 663-668 ◽  
Author(s):  
Idris Gautama So ◽  
N.J. Setiadi ◽  
B. Papak ◽  
Rudy Aryanto

The aim of the study is to design remediation information systems security governance at Bank. This study provided proposed solutions to solve the existing gaps between the current condition and the expected information systems of the bank's security governance. A case study of a commercial bank is used in this study. There are 7 process frameworks of COBIT 4.1 used to measure the maturity level of information systems security governance. Of these processes, appropriate controls within the framework of COBIT 4.1 and ISO27001 are undertaken. As a result, the security of governance information systems is increasing. In conclusion, there is a need of reliable information systems security governance to achieve the intended business goals.


2022 ◽  
pp. 533-560
Author(s):  
Winfred Yaokumah

Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured. This chapter conducts an in-depth review of scholarly and practitioner works to conceptualize the domain of operations security management. Drawing upon the existing information systems security literature, the chapter classifies operations security management into 10 domains. Following, the chapter performs an empirical analysis to investigate the state-of-practice of operations security management in organizations. The findings show that the maturity level of operations security management is at the Level 3 (well-defined). The maturity levels range from Level 0 (not performed) to Level 5 (continuously improving). The results indicate that operations security processes are documented, approved, and implemented organization-wide. Backup and malware management are the most applied operations security controls, while logging, auditing, monitoring, and reviewing are the least implemented controls.


Author(s):  
Winfred Yaokumah

Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured. This chapter conducts an in-depth review of scholarly and practitioner works to conceptualize the domain of operations security management. Drawing upon the existing information systems security literature, the chapter classifies operations security management into 10 domains. Following, the chapter performs an empirical analysis to investigate the state-of-practice of operations security management in organizations. The findings show that the maturity level of operations security management is at the Level 3 (well-defined). The maturity levels range from Level 0 (not performed) to Level 5 (continuously improving). The results indicate that operations security processes are documented, approved, and implemented organization-wide. Backup and malware management are the most applied operations security controls, while logging, auditing, monitoring, and reviewing are the least implemented controls.


2014 ◽  
Vol 4 (1) ◽  
Author(s):  
JOŽE ŠREKL ◽  
ANDREJKA PODBREGAR

A company should pay much attention to information systems security. It is necessary to secure the support system of the organization if we want continuity and effectiveness of business. In addition to providing security through technological precautions to prevent intrusion and abuse, it is necessary to pay more attention to the vulnerability and threats caused by the engaged users. Here we refer to unintentional threats, as a result of faulty workmanship or lack of knowledge of the information system. It is important to strive to reduce the possibility of causing the occurrence of incidents which are the result of improper use of information technology, which is due to ignorance. An organization shall consider and identify vulnerabilities of the system and threats to it. We confront the growing amounts of information in electronic form. Ensuring security of information systems (IS) in the workplace involves many steps that a company must adopt and carry out. The vulnerability of the systems is being examined, whereas the form of the new age of terrorism, cyber- terrorism, is being presented. This paper deals with ways of reducing risks and increasing safety and security of IS. It presents possible ways of ensuring the safe use of IS. Key words:Information system, management, safety, security.


2020 ◽  
Vol 2 (2) ◽  
pp. 167-179
Author(s):  
Jane Hom ◽  
Boonsri Anong ◽  
Kim Beom Rii ◽  
Lee Kyung Choi ◽  
Kenita Zelina

Risk management is useful in overcoming various problems such as not optimal business processes, the company’s reputation down, financial loss, or bankruptcy of a company. In the application of information systems, most organizations or companies have not noticed the importance of information systems security as well as the assets and impacts that arise. For that, the risk management assessment is used in reducing the errors that occur in the information system of the company's business processes. The risk management assessment is applied to the information system along with its assets in evaluating the possibilities of menaces and vulnerabilities. The Risk management assessment analysis is applied to the academic information system in universities. The result of the risk assessment is the results of recommendations on the stages that need to be done in protecting the assets of information systems and information systems themselves.


2018 ◽  
Vol 1 (2) ◽  
pp. 1-10
Author(s):  
Nano Suyatna

In an effort to improve electricity services to customers, there needs to be a balance between the supply of electricity and revenue. Payment methods made by the Perusahaan Listrik Negara (PLN) use Postpaid and Prepaid methods. Because services with postpaid methods better meet customer satisfaction, this method is chosen. Sales Accounting Information System is an information technology-based accounting application to support financial transactions in a company to run faster, more precisely and accurately at a reasonable cost. In its operation, it takes competent human resources to not be a source of problems (human error) and adequate infrastructure. To overcome the obstacles that will arise, whether triggered by the application or by the human resources themselves, it is necessary to control both aspects. Based on this research it shows that the application  of  Sales Accounting Information Systems and existing human resources is sufficiently supportive  and  reliable  in  supporting the creation of good control as it is proven that the level of acceptance of sales targets is realized effectively and efficiently.    


Author(s):  
Serhii Kubitskyi ◽  
◽  
Oksana Chaika ◽  

This paper aims at considering the well-known triad of What? How? Why? somewhat anew by suggesting looking at transformational leadership for successful human resources management through the lens of coaching core competencies as the key soft skill. Arising as the strategic approach to the effective management of people, well-thought human resources management that rests on a leadership model definitely enables management of a company or organization to move ahead of the curve and gain a firm foothold in the job market. The transformational leadership model fits the framework of the research and links to the contrastive line between management and leadership.It is emphasized that management processes focus on (i) maintaining and (ii) improving performance at work, on the one hand, and on the other, unlike management, the transformational leadership model focuses on the benefits of visionary thinking and bringing about change. Following the goal in the subject matter associated with successful HR management, the Golden Circle of What? How? Why?introduced by Simon Sinek finds its way in the description analysis. The Why? sectionopens the idea for successful HR managementto move further to What?section and is accompanied with How? section in the end. The final part of the findings embodies 11 current core competencies of coaching, which illustrate how the ways of implementing the soft skills in workplace may increase HR performance, enhance seamless communication among employees and management, drive change and welcome innovation.The four objectives for successful HR management: (i) drive change within a company or organization, (ii) encourage and motivate people for personal and corporate growth and development, (iii) employ innovation including modern technologies, and (iv) lead by example, correspond to the four cornerstones in the framework for successful company or organization management via transformational leadership. They are: (i) create an inspire vision of the future for the company’s (organization’s) employees, (ii) motivate the staff to live by and deliver the vision, (iii) manage delivery of the vision, (iv) attract and retain high-class professionals and young talents, build up strong and competitive teams, create and grow ever-stronger, trust-based relationships with the employees. The toolkit of ways, techniques and approaches may derive from the current core competencies in coaching that can be groupedsimilarly to the ICF ones as follows: (i) foundation, (ii) co-creating the relationship, (iii) communicating effectively, and (iv) cultivating learning and growth.


2020 ◽  
Vol 4 (3(12)) ◽  
pp. 1-15
Author(s):  
Samira Ilgarovna Proshkina ◽  

The work is devoted to an urgent problem — the study of the evolutionary dynamics of web advertising, its assessment and effectiveness, as well as the problem of legal support and security of information systems. The goal is a systematic analysis of web advertising in an unsafe information field, its relevance and criteria for assessing marketing efforts, minimizing risks, maximizing additional profits and image. Research hypothesis — the effectiveness of web advertising is determined by the form of advertising, place of display, location of the block, model of calculation of the advertising campaign. An approach based on the establishment of preferences, partnership between the state and business structures is emphasized. It takes into account the COVID-19 pandemic, a slowdown in the pace and features of the evolution of business companies in self-isolation. The subtasks of influence on the advertising efficiency of the site’s features and web advertising are highlighted. A comprehensive analysis of information and logical security and computational models of web advertising companies was also carried out.


2018 ◽  
Vol 23 (2) ◽  
pp. 95-106
Author(s):  
Mahendra Sunt Servanda ◽  
Achmad Benny Mutiara

The use of information and communication technology in a company gives an important contribution for the achievement of business objectives. PT Perusahaan Gas Negara, especially in the Business Solutions and Services Operations (BSSO), plays a significant role in the utilization of information and communication technology assets to PT Perusahaan Gas Negara. It takes a good IT governance for BSSO to improve the efficiency and effectiveness of IT usage. Audit of IT governance maturity using COBIT 4.1. Maturity model level used to determine the maturity level of IT usage in the enterprise with a scale of 0 (non-existent) to 5 (optimized). This study focused on two domains namely Plan and Organise (PO) and Monitor and Evaluate (ME) model to measure the maturity level of IT maturity levels in PT Perusahaan Gas Negara. From this study, the results of the maturity level domain PO is 3.13 and ME is 2.98, it can be given the conclusion that the maturity level of IT governance at PT PGN is in level 3 (defined). At this level means that all the procedures in the company are standardized and documented, but the company is still not able to detect the deviations that have occurred.


Sign in / Sign up

Export Citation Format

Share Document