SECURITY ANALYSIS OF INFORMATION SYSTEM USING FRAMEWORK COBIT 5 WITH DOMAIN DSS05 AND APO13 IN PT XYZ
https://doi.org/10.36342/teika.v12i01.2821
Keywords:
Cobit 5, Security, Information System, DSS05, APO13Abstract
The PT XYZ is one of the educational institutions that often uses information technology to support operational activities to be more effective and efficient. This study aims to determine how the security of information systems at the PT XYZ has a security level that is at a certain level of measurement standards is to use the Cobit 5 framework DSS05 and APO13 domains. Respondents to get the data security system is the head of the IT department at PT XYZ. Process To get the results of the interviews that have been conducted, researchers use the formulas that are already in the COBIT 5 book. The results obtained from the DSS05 Domain indicate that the security of the system at PT XYZ is at level 2 which means that the security of the system has been running based on planning, monitoring, and adjustments but in the APO13 Domain shows that the security of the system has not been implemented or has not been implemented because of the level obtained at level 0. Therefore it is necessary to improve the existing security system at PT XYZ according to the COBIT 5 Framework standard.
Downloads
References
A. Pakpahan, “Kajian Keamanan Aplikasi Web Berbasis AJAX Terhadap Serangan Cross Site Request Forgery (CSRF),” TeIKa, vol. 2, no. 2, pp. 35-47, 2009.
M. Muslihidin dan O. , Analisis dan Perancangan Sistem Informasi menggunakan Model Terstruktur dan UML, Yogyakarta: Andi, 2016.
J. Hutahean, Konsep Sistem Informasi, Yogyakarta: Deepublish, 2014.
A. Prihantara dan B. K. Riasti, “Design Dan Implementasi Sistem Informasi Apotek Pada Apotek Mitra Agung Pacitan,” Journal Speed – Sentra Penelitian Engineering dan Edukasi, pp. 1-7, 2012 .
R. R. W. Jermias, “ANALISA SISTEM INFORMASI AKUNTANSI GAJI DAN UPAH,” Jurnal EMBA, pp. 814-827, 2016.
S. D. Haes, W. V. Grembergen dan R. S. Debrecency, “COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities,” American Accounting Association, pp. 307-324, 2013.
A. Al-Rasyid, “Analisis Audit Sistem Informasi Berbasis COBIT 5 Pada Domain Deliver, Service, and SUpport (DSS) (Studi Kasus : SIM-BL di Unit CDC PT Telkom Pusat.Tbk),” Telkom University, Bandung, 2015.
R. G. Mufti, Suprapto dan Y. T. Mursityo, “Evaluasi Tata Kelola Sistem Keamanan Teknologi Informasi Menggunakan Framework COBIT 5 Fokus Proses APO13 dan DSS05 (Studi Pada PT Martina Berto Tbk),” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 1, no. 12, pp. 1622-1631, 2017.
T. “Audit Keamanan Sistem Informasi Menggunakan Frawmework Cobit 5 Dengan Metode DSS05 Pada PT Trisula Textile Industries.Tbk,” Universitas Kristen Maranatha, Bandung, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 TeIKa
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Share Alike Attribution Licence (CC-BY-SA What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.