scholarly journals ENHANCING SAFETY INFORMATION SYSTEMS WITH THE USE ISO/IEC 27000

2014 ◽  
Vol 4 (1) ◽  
Author(s):  
JOŽE ŠREKL ◽  
ANDREJKA PODBREGAR

A company should pay much attention to information systems security. It is necessary to secure the support system of the organization if we want continuity and effectiveness of business. In addition to providing security through technological precautions to prevent intrusion and abuse, it is necessary to pay more attention to the vulnerability and threats caused by the engaged users. Here we refer to unintentional threats, as a result of faulty workmanship or lack of knowledge of the information system. It is important to strive to reduce the possibility of causing the occurrence of incidents which are the result of improper use of information technology, which is due to ignorance. An organization shall consider and identify vulnerabilities of the system and threats to it. We confront the growing amounts of information in electronic form. Ensuring security of information systems (IS) in the workplace involves many steps that a company must adopt and carry out. The vulnerability of the systems is being examined, whereas the form of the new age of terrorism, cyber- terrorism, is being presented. This paper deals with ways of reducing risks and increasing safety and security of IS. It presents possible ways of ensuring the safe use of IS. Key words:Information system, management, safety, security.

2020 ◽  
Vol 2 (2) ◽  
pp. 167-179
Author(s):  
Jane Hom ◽  
Boonsri Anong ◽  
Kim Beom Rii ◽  
Lee Kyung Choi ◽  
Kenita Zelina

Risk management is useful in overcoming various problems such as not optimal business processes, the company’s reputation down, financial loss, or bankruptcy of a company. In the application of information systems, most organizations or companies have not noticed the importance of information systems security as well as the assets and impacts that arise. For that, the risk management assessment is used in reducing the errors that occur in the information system of the company's business processes. The risk management assessment is applied to the information system along with its assets in evaluating the possibilities of menaces and vulnerabilities. The Risk management assessment analysis is applied to the academic information system in universities. The result of the risk assessment is the results of recommendations on the stages that need to be done in protecting the assets of information systems and information systems themselves.


2018 ◽  
Vol 8 (2) ◽  
pp. 97
Author(s):  
Sri Anardani ◽  
Andi Rahman Putera

Manies Group is a company engaged in the sale of fashion that has been known by the people of the City of Madiun since 1971. Business competition is getting higher with the construction of several Mall and Department Stores. One strategy to deal with such competition is through information technology and information systems. For this reason, it is necessary to analyze the information system strategic planning for Manies Group. The purpose of this study is to identify data needs to develop information systems and information technology. The planning analysis methodology uses the framework of John Ward and Joe Peppard. The analysis results are mapped using portfolio designs using McFarlan's Strategic Grid. The final result of this research is a document on the IS / IT strategic plan that supports the process of designing and building information systems for Manies Group


2020 ◽  
Vol 1 (1) ◽  
pp. 78-85
Author(s):  
Tasha Amaraesty

The development of information technology has changed the world to become easier and bring development and progress in all fields. With the support of computer technology it is proven that the mechanism of long and repetitive work becomes effective and efficient. Information systems play an important role in supporting the smooth work activities in an information, how to organize data with a database system that has been supporting the performance of many agencies. Writing Purpose This would like to know how much influence an information system is implemented in a company and what are the strengths and weaknesses arising from the application of an information system in a traveloka company. This writing uses a qualitative method with literauture studies in the field of Scientific Information Systems and Information Technology (IT). Information is obtained from the artiker, module and the internet. Besides that, based on empirical experience and direct observation on the object of research.  


2014 ◽  
Vol 3 (1) ◽  
pp. 336-349
Author(s):  
Bichanga Walter Okibo ◽  
Obara Brigit Ochiche

With the popularity of internet applications, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of attention from both academia and practitioners. However, there is lacking a theoretical framework for the challenges facing information security management in higher learning institutions. Thus this research looked into the challenges facing information systems security management in higher learning institutions. The study was guided by understanding the major challenges facing Information Systems Security Management and establishing the extent of the use of Information Systems Security Management in higher learning institutions. The study used descriptive survey design. It targeted information systems projects managers, administrators or top management and other users (staff) of the systems in key departments. Systematic sampling strategy was used. Descriptive statistics of SPSS were used to analyze the data. Factor analysis technique was used to identify the major challenges that affect management of an institution’s information system security. Pearson’s Chi-Square was used to test the relationships that exist between the categorical variables. The study found out that system vulnerability, computer crime and abuse, environmental security and financial backing/security are key challenges institutions of higher learning are experiencing in the management of their information systems. The study recommends the implementation of new policies and procedures to guide information system security. Programs for monitoring and evaluating information systems security in relation to performance indicators should be put in place. Institutions should invest heavily in developing their staff through training programmes such as seminars, workshops and conferences to further develop staff skills and abilities on information systems security issues.


2020 ◽  
Vol 3 (1) ◽  
pp. 39-44
Author(s):  
Dedy Hariyadi ◽  
Fazlurrahman Fazlurrahman ◽  
Hendro Wijayanto

Keamanan merupakan hal penting dalam sistem maupun jaringan dalam melindungi data informasi. Tingginya tingkat laporang celah keamanan dari Edgescan menunjukkan masih minimnya pengembang sistem dan jaringan dalam hal menutamakan keamanan. Information System Security Assesment Framework (ISSAF) merupakan metodologi penetration testing yang dikembangkan oleh Open Information Systems Security Group. Dalam framework tersebut terdiri dari tiga fase, yaitu Planing and Preparation, Assessment dan Reporting, Clean-up and Destroy Astefacts. Dalam melakukan Vulnerabilities Identification diperlukan tools untuk mengetahui potensi celah keamanan dalam bentuk laporan. Ini sangat diperlukan untuk mempermudah analisis, penggunaan dan meminimalisir biaya pentesting. Selama ini tools pentesting kebanyakan masih menggunakan model Command Line Interface (CLI) sehingga sulit digunakan oleh orang awam. Sehingga diperlukan tools berbasis Graphic User Interface (GUI). Dengan pendekatan Hybrid Apps dapat dikembangkan aplikasi pentesting berbasis Graphic User Interface  yang memanfaatkan kelebihan teknologi native dan web. Bangkolo merupakan aplikasi untuk pentesting yang dikembangkan dari framework ISSAF dan pendekatan Hybrid Apps.


2018 ◽  
Author(s):  
Kevin McReynolds

<p>Monthly, even weekly, information systems security researchers seem to report thousands of Information Systems Network (ISN) node attacks and hundreds of new attack vectors. The current view of networking nodes does not account for their roughness and complexity. This paper presents a theory, Fractal Network Security (FNS), which is more dynamic and natural and the only theory addressing hardware nodes on ISNs.</p>


2018 ◽  
Author(s):  
Kevin McReynolds

<p>Monthly, even weekly, information systems security researchers seem to report thousands of Information Systems Network (ISN) node attacks and hundreds of new attack vectors. The current view of networking nodes does not account for their roughness and complexity. This paper presents a theory, Fractal Network Security (FNS), which is more dynamic and natural and the only theory addressing hardware nodes on ISNs.</p>


2018 ◽  
Vol 8 (2) ◽  
pp. 211
Author(s):  
Sri Anardani ◽  
Andi Rahman Putera

Manies Group is a company engaged in the sale of fashion that has been known by the people of the City of Madiun since 1971. Business competition is getting higher with the construction of several Mall and Department Stores. One strategy to deal with such competition is through information technology and information systems. For this reason, it is necessary to analyze the information system strategic planning for Manies Group. The purpose of this study is to identify data needs to develop information systems and information technology. The planning analysis methodology uses the framework of John Ward and Joe Peppard. The analysis results are mapped using portfolio designs using McFarlan's Strategic Grid. The final result of this research is a document on the IS / IT strategic plan that supports the process of designing and building information systems for Manies Group


Sign in / Sign up

Export Citation Format

Share Document