scholarly journals Analisis Tingkat Keamanan Informasi: Studi Komparasi Framework Cobit 5 Subdomain Manage Security Services (DSS05) dan NIST Sp 800 – 55

Author(s):  
Eko Handoyo

Information technology is a very important part of the organization. IT is expected to provide a good profit for the company. However, as technology evolves, it is often exploited by some irresponsible parties that can lead to the emergence of threats and risks from the use of technology. The organization needs to measure the level of information security to identify the system's weaknesses and threats to the organization. Standards for measuring information security are COBIT 5 subdomain manage security services (DSS05) and NIST SP 800-55 revision 1. This study is comparing the two standards. Comparative analysis uses qualitative analysis based on three aspects in information security that are confidentiality, integrity, and availability. Based on the analysis result obtained the advantages and disadvantages of each standard.

2020 ◽  
Vol 30 (3) ◽  
pp. 67-74
Author(s):  
N. V. Evglevskaya ◽  
A. Yu. Zuev ◽  
A. O. Karasenko ◽  
O. S. Lauta

At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose.


Author(s):  
Yuliia Nehoda

The subject of the research – is a set of organizational-economic relations arising in the process of structural transformation of financial and credit relations in the agricultural business. The purpose of the article is a retrospective analysis of structural transformations of financial and credit relations in the agricultural business, evaluation of the effectiveness and feasibility of the introduction of agricultural receipts as a new instrument of lending to the agricultural business of the regions. Methodology of work – system-structural and comparative analyzes (to determine the effectiveness of the crediting mechanism according to the agricultural receipts of the farmers of the region); monographic (when studying the problems of the functioning of the mechanism of lending to agrarians by agrarian receipts) economic analysis (when carrying out a comparative analysis of the mechanism of classical bank lending to the agrarian business and the mechanism of lending to agrarians according to agrarian receipts); modeling and forecasting (when determining ways to overcome the existing deficiencies in the mechanism of lending to agrarian business entities of the region according to agrarian receipts). The results of the work – a retrospective analysis of the structural transformation of financial and credit relations in the agricultural business was carried out. The mechanism of crediting agrarians according to agrarian receipts and the scale of its distribution in the agrarian business of the region are considered. A comparative analysis of the mechanism of classical bank lending to the agrarian business and the mechanism of lending to agrarians according to agrarian receipts was carried out. In the framework of the pilot project “Agrarian receipts in Ukraine” of the international financial corporation (IFC) in partnership with the Swiss Confederation in Ukraine, the example of the Poltava region defined the effectiveness of the crediting mechanism according to the agrarian receipts of the agrarians of the region. The advantages and disadvantages of the mechanism of crediting the subjects of the agrarian business on agrarian receipts are noted. The ways to overcome the existing shortcomings of the mechanism of crediting the subjects of the agrarian business of the region according to agricultural receipts are determined. Conclusions – according to the results of the conducted research, the effectiveness of the mechanism of lending to the agricultural business of the regions according to agricultural receipts was proved, its advantages and disadvantages were noted, and attention was also focused. Proposed in Art. 7 of Law No. 5479-VI clearly delineate cases and restrictions on the debtor’s reimbursement of expenses incurred by the lender with the acquisition of the right to grow and harvest the pledged crop of agricultural products, which will ensure the principle of equality of parties on economic benefits and distribution of credit risks according to agricultural receipts.


2020 ◽  
Vol 3 (2) ◽  
Author(s):  
Oktaria Ardika Putri

Instagram is a social media application that is currently very popular in the community, especially among artist, politicians, and business people. Companies or advanced business must quicly adapt to the advancement of information technology in the form of social media as a marketing tool. Instagram social media also necessary to developing educational institutions. One of the educational institution that ae currently developing is the newly established Faculty of Economics and Business Islam (FEBI) at the Kediri State Islamic Institute (IAIN Kediri). This writing aims to examine the importance of Instagram as social media marketing to building FEBI IAIN Kediri Brand Awareness. Instagram social media is considered more effectives to embrace students and the community, so it is expected to facilitate marketing and communication between FEBI IAIN Kediri with the students or other agencies. The method of this reasearch is a qualitative analysis which reference libraries are used as a basis. Keywods:  Instagam,  social media, Faculty of Economics and Business Islam, IAIN Kediri


2019 ◽  
Author(s):  
Rika ramadani ◽  
Hade Afriansyah

Progress in information technology that is so fast is expected to improve the quality of education in Indonesia. In the world of information technology education can help and support the learning process. Especially now all the learning process activities can be done online. Progress in information technology must also be supported by quality human resources. In this case the teacher is very instrumental in the utilization of information technology in the world of education. Because the teacher is one of the education supervisors who will encourage the advancement of the quality of education in Indonesia. But in reality the quality of teachers in Indonesia is inadequate. There are still many teachers who cannot use information technology in learning especially for teachers who are senior or old. As teacher supervisors, they must improve the quality of their performance in using technology. To improve the ability of teachers to use technology, ongoing training is needed to use technology. The role of the head of the school as a supervisor is also needed, namely the principal is obliged to supervise, control, and approach the teacher in terms of the use of technology in the learning process.


2020 ◽  
pp. 29-45
Author(s):  
O.A. Naydis ◽  
I.O. Naydis

The article considers the types, forms, mechanisms and classification of mergers and acquisitions, identifies their positive effects, and studies the tactics of acquisitions. The analysis of anti-capture measures: active and preventive methods of protection against hostile mergers and acquisitions. A comparative analysis of anti-capture measures with acquisitions tactics was carried out, the advantages and disadvantages of their application were identified.


Sign in / Sign up

Export Citation Format

Share Document