scholarly journals Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)

2021 ◽  
Vol 8 (6) ◽  
pp. 1137
Author(s):  
Rizki Dewantara ◽  
Bambang Sugiantoro

<p>Serangan pada jaringan saat ini sangat sering terjadi, dengan semakin banyaknya cara untuk melakukan pengaksesan terhadap data dan semakin berkembangnya teknologi yang digunakan tentunya akan menyebabkan meningkatnya ancaman keamanan suatu jaringan. Evaluasi manajemen keamanan informasi menggunakan indeks keamanan informasi (KAMI) yang dilakukan pada jaringan di UIN Sunan Kalijaga Yogyakarta didapatkan hasil indeks 407, yang dianggap masih belum optimal. Hal ini yang mendasari perlunya implementasi Open Source SIEM (OSSIM) ke dalam indeks KAMI. Penelitian ini dilakukan untuk mengoptimalkan proses keamanan informasi agar dapat bekerja sesuai dengan standar indeks KAMI. Metode penelitian yang digunakan meliputi studi literatur, melakukan Pre-Assesment Indeks KAMI, mengimplementasi infrastruktur OSSIM, monitoring indeks keamanan informasi menggunakan teknologi OSSIM, dan melakukan Post-Assesment Indeks KAMI, tahapan akhir ini menganalisis hasil monitoring untuk dibuat perbandingan bagaimana kondisi jaringan sebelum dan sesudah diimplementasikan OSSIM pada jaringan. Skor nilai perbandingan dari hasil penelitian terkait Indeks KAMI menunjukkan peningkatan skor penilaian sebesar 25, setelah diterapkan penggunaan OSSIM dari sebelumnya tanpa penerapan OSSIM sebesar nilai 407 menjadi 432. Peningkatan indeks KAMI membantu menaikan nilai pada aspek tata kelola, pengelolaan asset dan teknologi, namun tingkat kelayakan keamanan informasi masih di level I+ sampai dengan II+ sehingga keamanan informasi pada jaringan tidak layak dan butuh perbaikan.</p><p> </p><p><em><strong>Abstract</strong></em></p><p><em>Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. This underlies the need to implement Open Source SIEM (OSSIM) into the KAMI index. This research was conducted to optimize the information security process so that it can work according to the KAMI index standards. The research methods used include literature study, conducting KAMI Index Pre-Assessment, implementing OSSIM infrastructure, monitoring information security index using OSSIM technology and conducting KAMI Index Post-Assessment, this final stage analyzes the results of monitoring to make comparisons of network conditions before and after implementation of OSSIM on the network. Comparative scores from the results of research related to the KAMI Index show an increase in the score of 25, after applying OSSIM from before without applying OSSIM, the value of 407 becomes 432. The increase in the KAMI index helps raise the value of governance aspects, asset management and technology, but the level of information security eligibility is still at the level of I+ to II+ so the information security on the network is not feasible and needs improvement.</em></p><p><em> </em></p><p><em><strong><br /></strong></em></p>

2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


2014 ◽  
Vol 22 (1) ◽  
pp. 24-41 ◽  
Author(s):  
Deepa Mani ◽  
Kim-Kwang Raymond Choo ◽  
Sameera Mubarak

Purpose – Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly affect the security of businesses with online presence and/or connected to the internet. Although the real estate sector is a potential attack vector for and target of malicious cyber activities, it is an understudied industry. This paper aims to contribute to a better understanding of the information security threats, awareness, and risk management standards currently employed by the real estate sector in South Australia. Design/methodology/approach – The current study comprises both quantitative and qualitative methodologies, which include 20 survey questionnaires and 20 face-to-face interviews conducted in South Australia. Findings – There is a lack of understanding about the true magnitude of malicious cyber activities and its impact on the real estate sector, as illustrated in the findings of 40 real estate organisations in South Australia. The findings and the escalating complexities of the online environment underscore the need for regular ongoing training programs for basic online security (including new cybercrime trends) and the promotion of a culture of information security (e.g. when using smart mobile devices to store and access sensitive data) among staff. Such initiatives will enable staff employed in the (South Australian) real estate sector to maintain the current knowledge of the latest cybercrime activities and the best cyber security protection measures available. Originality/value – This is the first academic study focusing on the real estate organisations in South Australia. The findings will contribute to the evidence on the information security threats faced by the sector as well as in develop sector-specific information security risk management guidelines.


2013 ◽  
Vol 25 (3) ◽  
pp. 32-51 ◽  
Author(s):  
Salvatore Aurigemma

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.


2012 ◽  
Vol 3 (2) ◽  
pp. 57-69 ◽  
Author(s):  
Ali M. Al-Khouri

This article provides an overview of the literature surrounding emerging markets and the global paradigm shift taking place towards the development of digital economies. It provides a review of recent practices in the government sector. The article promotes the concept of developing a government based identity management infrastructure to support the progress en route for building the digital economy. In light of increasing information security threats in today’s interconnected world, the article emphasizes that only through identification and authentication capabilities, emerging markets can maintain sustainability.


2016 ◽  
Vol 6 (1) ◽  
pp. 38
Author(s):  
Yuni Cintia Yuze ◽  
Yudi Priyadi ◽  
Candiwan .

The importance of information and the possible risk of disruption, therefore the universities need to designed and implemented of the information security.  One of the standards that can be used to analyze the level of information security in the organization is ISO/IEC 27001 : 2013 and this standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system. The objective of this research is to measure the level of information security based on standard ISO/IEC 27001: 2013 and modeling systems for information security management. This research uses descriptive qualitative approach, data collection and validation techniques with tringulasi (interview, observation and documentation). Data was analyzed using gap analysis and to measure the level of maturity this research uses SSE-CMM (Systems Security Engineering Capability Maturity Model). Based on the research results, Maturity level clause Information Security Policy reaches level 1 (Performed-Informally), clause Asset Management reaches level 3 (Well-Defined), clause Access Control reaches level 3 (Well-Defined), clause Physical and Environmental Security reaches level 3 (Well-Defined), clause Operational Security reaches level 3 (Well-Defined), Communication Security clause reaches the level 2 (Planned and Tracked). Based on the results of maturity level discovery of some weakness in asset management in implementing the policy. Therefore, the modeling system using the flow map and CD / DFD focused on Asset Management System.


2019 ◽  
Vol 2 (1) ◽  
pp. 1-7
Author(s):  
CITRA ARFANUDIN ◽  
Bambang Sugiantoro ◽  
Yudi Prayudi

Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region. Security Information and Event Management (SIEM) is a security technology to secure information assets. SIEM is expected to provide information on attacks that occur on the router network and increase the value of the Indeks KAMI of government agencies. However, the use of SIEM is still questionable whether it can recognize a router attack and its impact on the value of our index. This research simulates attacks on routers with 8 attacks namely Mac Flooding, ARP-Poisoning, CDP Flooding, DHCP Starvation, DHCP Rogue, SYN Flooding SSH Bruteforce and FTP Bruteforce. 8 types of attacks followed by digital forensic analysis using the OSCAR method to see the impact on routers and SIEM. Also measured is index KAMI before and after the SIEM to be able to measure the effect of SIEM installation on the value of index KAMI. It was found that the use of SIEM to conduct security monitoring proved successful in identifying attacks, but not all were recognized by SIEM. SIEM only recognizes DHCP Starvation, DHCP Rogue, SSH Bruteforce and FTP Bruteforce. Mac Flooding, ARP-Poisoning, CDP Flooding, SYN Flooding attacks are not recognized by SIEM because routers do not produce logs. Also obtained is the use of SIEM proven to increase our index from the aspect of technology


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


2018 ◽  
Vol 25 (3) ◽  
pp. 22-32
Author(s):  
Tria Nopi Herdiani ◽  
Mika Oktarina ◽  
Yeni Nuraeni

Reproductive health problems are dysmenorrhea is a problem related with menstruation. research show the highest prevalence of menstrual pain in adolescent women, adolescent who experience dysmenorrhea report pain that interferes with daily activities. Handling to reduce pain during menstruation, one of which is using the olive oil aroma therapy aroma method. This research to determine the effect of aroma therapy olive oil massage pain dysmenorrhea on midwifery student level I and II Stikes Tri Mandiri Sakti Bengkulu.This study used a pre experiment in one group (one group pre-post test design) the dependent variable of pain before and after treatment. Sampling was done by accidental sampling technique using the criteria totaling 41 student who experience dysmenorrhea. The study was conducted from May to June 2017. Retrievel of data using the observatioan sheet and analyzed using compared mean paired T-test. The Result of the research: (1) At 41 people in the first and second grade obstetric students who had dysmenorrhea before the massive olive oil odor therapy aroma got the average pain scale 5,73 with the standard deviation 1,450. (2) In 41 subjects who had dysmenorrhea after the massage of olive oil odor therapy, the average pain scale was 5,00 with a standard deviation of 1,414. (3) There is massive effect of olive oil odor therapy to dysmenorrhea pain in female students of Level I and II Prodi DIII Midwifery Tri Mandiri Sakti Institute of Health Sciences Bengkulu. Keywords : aroma therapy, dysmenorrhea, massage 


Jurnal Akta ◽  
2018 ◽  
Vol 5 (2) ◽  
pp. 523
Author(s):  
Hemastuti Arini ◽  
Djauhari Djauhari

In this study will be discussed how the consideration of judges in deciding this case and land management measures HGB assets. This research is an analytical description with normative juridical approach, by studying library materials (literature study) that the data used is secondary data, which includes the primary legal materials, secondary, and tertiary.  The judges consider that the vulnerable period from 2009 to 2016 the land was returned to state control because certificate of HGB have expired in 2009 and was not renewed due to the occurrence of the land dispute. So PT CMJT and occupants of the home office, the same is not so entitled to the house. But in 2015, PT CMJT has committed an unlawful act that is with noticeboards statement of ownership and forcible emptying of the occupants of the house. Then the judges ruled on compensation of 100 million rupiah to PT CMJT the residents were harmed. This can be avoided if the PT CMJT have a good asset management can be done through asset management, namely certification, storage, security,Keywords: Asset Management; Regional Enterprise; Land Broking.


Sign in / Sign up

Export Citation Format

Share Document