ANALISIS MANAJEMEN RISIKO KEAMANAN DATA SISTEM INFORMASI MENGGUNAKAN METODE OCTAVE ALLEGRO (Studi Kasus: CV. Arta Rahmat Sejati Cilacap)

Kristina, Aprilia Meli (2021) ANALISIS MANAJEMEN RISIKO KEAMANAN DATA SISTEM INFORMASI MENGGUNAKAN METODE OCTAVE ALLEGRO (Studi Kasus: CV. Arta Rahmat Sejati Cilacap). Other thesis, Universitas Amikom Purwokerto.

[thumbnail of FILE COVER1.pdf]
Preview
Text
FILE COVER1.pdf

Download (563kB) | Preview
[thumbnail of FILE DAFTAR ISI.pdf]
Preview
Text
FILE DAFTAR ISI.pdf

Download (243kB) | Preview
[thumbnail of FILE ABSTRAK1.pdf]
Preview
Text
FILE ABSTRAK1.pdf

Download (135kB) | Preview
[thumbnail of BAB 1.pdf] Image
BAB 1.pdf
Restricted to Registered users only

Download (149kB)
[thumbnail of BAB 2.pdf] Image
BAB 2.pdf
Restricted to Registered users only

Download (272kB)
[thumbnail of BAB 3.pdf] Image
BAB 3.pdf
Restricted to Registered users only

Download (261kB)
[thumbnail of BAB 4.pdf] Image
BAB 4.pdf
Restricted to Registered users only

Download (1MB)
[thumbnail of BAB 5.pdf] Image
BAB 5.pdf
Restricted to Registered users only

Download (130kB)
[thumbnail of FILE DAFTAR PUSTAKA.pdf] Image
FILE DAFTAR PUSTAKA.pdf
Restricted to Registered users only

Download (168kB)
[thumbnail of FILE LAMPIRAN1.pdf] Text
FILE LAMPIRAN1.pdf
Restricted to Repository staff only

Download (2MB)

Abstract

The use of information technology is very important and has a lot of influence on company performance, especially on business processes and company data security. However, in the process of implementing information technology, it can allow the emergence of various kinds of risks that threaten the security in it. If observed, the thing that is very influential in the company is the quality of the resources that work as well as threats from internal and external parties. Security at the company can be guaranteed if workers can have references and knowledge about company security or lead to security, whether it includes security of important company data or physical security. This needs to be considered so that companies are more aware of threats or risks that occur. Companies must also pay attention to the types of attacks and security requirements such as confidentiality, availability and integrity because if they do not make efforts for security, it can be fatal for the company. Examples of attacks on data are viruses, credential reuse, cross-site, crypting, password cracking and the effects that can be obtained in the form of destruction, disclosure, interruption and reputational and financial losses. The purpose of this study is to provide a recommendation to CV ARTA RAHMAT SEJATI CILACAP against threats and risks that occur using the Octave Allegro method. This research is a descriptive qualitative research, also tends to use systematic quantitative analysis and research to provide a risk assessment, information security strategy for vulnerability evaluation. The results of this study are that there are threats in the form of things that have the potential to exploit security vulnerabilities including using technical means, human actors using physical means, technical problems and the results of the highest risk analysis assessment are 12 (high) in the impact area of data security. The overall results show critical information assets that require planning efforts to provide indications in the form of handling, risk mitigation and reasonable changes in security practices at the limited liability company.
Item Type: Thesis (Other)
Additional Information: Dosen Pembimbing: Dr. Berlilana, M.Kom., M.Si.
Uncontrolled Keywords: Manajemen Risiko, Teknologi Informasi, Company Security, Data Security
Subjects: T Technology > T Technology (General)
Z Bibliography. Library Science. Information Resources > ZA Information resources
Z Bibliography. Library Science. Information Resources > ZA Information resources > ZA4450 Databases
Divisions: Fakultas Ilmu Komputer > Sistem Informasi
Depositing User: UPT Perpustakaan Pusat Universitas Amikom Purwokerto
Date Deposited: 24 Jan 2022 02:14
Last Modified: 24 Jan 2022 02:14
URI: https://eprints.amikompurwokerto.ac.id/id/eprint/1177

Actions (login required)

View Item
View Item