Perancangan Proses Keamanan Informasi Berdasarkan Framework ISO27001:2022
Abstract
Kata Kunci: Sistem Manajemen Keamanan Informasi (SMKI), Kontrol Teknologi Informasi, ISO/IEC 27001:2022, Design Science Research (DSR)
Full Text:
Download PDFReferences
H. T. Murti, V. Puspita, and P. Ratih, “Pemanfaatan Teknologi Informasi dan Manajemen Perubahan Organisasi dalam Mendukung Bisnis Berkelanjutan Pasca Covid-19 pada UMKM di Kota Bengkulu (Utilization of Information Technology and Organizational Change Management to support Post-Covid 19 Sustainable Business for MSMEs in Bengkulu City),” vol. 1, no. 1, 2021.
F. Gunadi and S. R. Widianto, “Perbandingan Data Warehouse Cloud Computing Menggunakan Konvensional Berbasis Kriptografi,” 2020.
R. McLeod, Sistem Informasi Manajemen. Jakarta : Salemba Empat, 2008.
T. Kristanto, R. Arief, and N. F. Rozi, “PERANCANGAN AUDIT KEAMANAN INFORMASI BERDASARKAN STANDAR ISO 27001:2005 (STUDI KASUS: PT ADIRA DINAMIKA MULTI FINANCE),” 2014.
J. B. Anderson and R. Johannesson, “Understanding Information Transmission”.
H. P. Yockey, “Information theory, evolution and the origin of life,” Information Sciences, 2002.
D. Simarmata and D. M. Situmorang, “PENERAPAN SISTEM INFORMASI AKUNTANSI KOTA BATAM,” 2023.
R. Budiarto, “MANAJEMEN RISIKO KEAMANAN SISTEM INFORMASI MENGGUNAKAN METODE FMEA DAN ISO 27001 PADA ORGANISASI XYZ,” vol. 2, no. 2, 2017.
M. Lenawati, W. W. Winarno, and A. Amborowati, “Tata Kelola Keamanan Informasi Pada PDAM Menggunakan ISO/IEC 27001:2013 Dan Cobit 5,” vol. 9, no. 1, 2017.
F. A. Basyarahil, H. M. Astuti, and J. A. R. Hakim, “Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Berdasarkan ISO/IEC 27001:2013 pada Direktorat Pengembangan Teknologi dan Sistem Informasi (DPTSI) ITS Surabaya,” vol. 6, no. 1, 2017.
C. Chazar, “STANDAR MANAJEMEN KEAMANAN SISTEM INFORMASI BERBASIS ISO/IEC 27001:2005,” 2015.
B. Shojaie, “Implementation of Information Security Management Systems based on the ISO/IEC 27001 Standard in different cultures,” Feb. 2018.
Hevner, March, Park, and Ram, “Design Science in Information Systems Research,” MIS Quarterly, vol. 28, no. 1, p. 75, 2004, doi: 10.2307/25148625.
ISACA, COBIT® 2019 Implementation guide: implementing and optimizing an information and technology governance solution. Schaumburg, Illinois: ISACA, 2018.
ISACA, COBIT Focus Area: Information Security Using COBIT 2019. ISACA, 2020.
A. Viamianni, R. Mulyana, and F. Dewi, “COBIT 2019 INFORMATION SECURITY FOCUS AREA IMPLEMENTATION FOR REINSURCO DIGITAL TRANSFORMATION,” 2023.
SFIA Foundation, Skills Framework for the Information Age: Framework Reference. 2021.
Gartner, “Gartner Magic Quadrant & Critical Capabilities,” 2023. https://www.gartner.com/en/research/magic-quadrant
DOI: https://doi.org/10.37531/sejaman.v6i2.5550
Refbacks
- There are currently no refbacks.