System Security Awareness Planning Model Using The Octave Method Approach
Zaied Saad Shouran(1*), Nur Rokhman(2), Tri Kuntoro Priyambodo(3)
(1) Computer and Electronics Science, Department, UGM, Yogyakarta
(2) Department of Computer Science and Electronics, Universitas Gadjah Mada
(3) Department of Computer Science and Electronics, Universitas Gadjah Mada
(*) Corresponding Author
Abstract
Keywords
Full Text:
PDFReferences
[1] Chazar, C. (2015). Management Standards for Information Systems Security Based on ISO / IEC 27001. Information Journal Volume VII No.2 / November / 2015. Bandung.
[2] M. Thierry and T. K. Priyambodo, “SMS and Web-Based e-Government Model Case Study: Citizens Complaints Management System at District of Gihosha –Burundi,” IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 11, no. 1, p. 67, Jan. 2017 [Online]. Available: https://journal.ugm.ac.id/ijccs/article/view/17167.
[3] T. Wachowicz and P. Błaszczyk, “TOPSIS Based Approach to Scoring Negotiating Offer in Negotiation Support Systems,” Gr. Decis. Negot., vol. 22, no. 6, pp. 1021–1050, Nov. 2014 [Online]. Available: http://link.springer.com/10.1007/s10726-012-9299-1
[4] H. Núñez, M. Sànchez-Marrè, U. Cortés, J. Comas, M. Martínez, I. Rodríguez-Roda, and M. Poch, “A comparative study on the use of similarity measures in case-based reasoning to improve the classification of environmental system situations,” Environ. Model. Softw., vol. 19, no. 9, pp. 809–819, 2016.
[5] Sembiring, S. & Lubis, S. A. (2015). Application of ISO 27001 Based Information Security Index to Measure the Level of Information Security Readiness in Higher Education Institutions. 2014 SNASTIKOM Proceeding Vol-2.
[6] Cheristian, I., Fatoni., Negara, E. S.: ISO 27001: 2016 Planning and Implementation of Standards at PT. Sinar Sosro Palembang. From http://digilib.binadarma.ac.id/files/disk1/139/123-123- imamcheris-6945-1-journal-n.pdf.
[7] Rahardjo, B. (2015). Internet-based Information System Security. Bandung.
[8] P. S. Ardiantara, R. Sumiharto, and S. B. Wibowo, “Prototype of Control of Stable Position and Attitude on Unmanned Aircraft Using IMU and the Kalman Filter Fusion Sensor Algorithm,” IJEIS (Indonesian J. Electron. Instrum. Syst., vol. 4, no. 1, pp. 25–34, 2014 [Online]. Available: https://jurnal.ugm.ac.id/ijeis/article/view/4219.
[9] I. Dwicahyo Pratomo, A. Rouf, and T. Wahyu Supardi, “Hole Distance Measurement in Solid Objects Using Ultrasonic Sensors,” IJEIS (Indonesian J. Electron. Instrum. Syst., vol. 6, no. 1, p. 81, Apr. 2016 [Online]. Available: https://jurnal.ugm.ac.id/ijeis/article/view/10774.
[10] T. Nur Syahril Sidiq, A. Rouf, and T. Wahyu Supardi, “Solid Object Disability Detection System Using Ultrasonic Angle Variation Techniques,” IJEIS (Indonesian J. Electron. Instrum. Syst., vol. 6, no. 1, p. 69, Apr. 2016 [Online]. Available: https://jurnal.ugm.ac.id/ijeis/article/view/10773.
[11] Richard. A. Caralli. (2017). Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process. http://www.sei.cmu.edu/pub/documents/07.reports/07tr012.pdf.
[12] S. K. Pandey dan K. Mustafa. (2015). A Comparative Study of Risk Assessment Methodologies for Information Systems. Buletin Teknik Elektro dan Informatika, 1(2),111-122.
[13] A. M. Suduc, M. Bîzoi dan F. G. Filip. (2016). Audit for Information Systems Security. Journal Informatica Economică, 14(1),43-48.
[14] Christopher Alberts, Audrey Dorofee. 2016). Managing Information Security Risks: The OCTAVESM Approach. Publisher: Addison Wesley. ISBN : 0-321-11886-3.
[15] J. Simons. (2015). Information Security & ISO 27001. IT Governance Green Paper. The United Kingdom.
[16] S. K. Pandey dan K. Mustafa. (2012). A Comparative Study of Risk Assessment Methodologies for Information Systems. Buletin Teknik Elektro dan Informatika, 1(2),111-122.
[17] Joint Task Force Transformation Initiative (2011). Managing Information Security Risk: Organization, Mission, and Information System View. NIST Special Publication 800-39.
[18] A. M. Suduc, M. Bîzoi dan F. G. Filip. (2010). Audit for Information Systems Security. Journal Informatica Economică, 14(1),43-48.
[19] Technical Department of ENISA Section Risk Management (2006). Implementation principles and Inventories for Risk Management/Risk Assessment methods and tools. ENISA.
DOI: https://doi.org/10.22146/ijccs.43922
Article Metrics
Abstract views : 3289 | views : 3507Refbacks
- There are currently no refbacks.
Copyright (c) 2019 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats1