ANALISIS KEAMANAN SIBER KAMPUS MENGGUNAKAN FRAMEWORK COBIT 2019 PADA DOMAIN DELIVERY, SERVICE AND SUPPORT (DSS)
DOI:
https://doi.org/10.31000/jika.v9i2.12845Abstract
PerkPerkembangan teknonogi informasi saat ini maju dengan pesat Keamanan informasi bertujuan agar informasi yang dimiliki terjamin kerahasiaannya (confidentiality), keutuhannya (integrity) dan ketersediaannya (availability). Banyaknya ancaman keamanan informasi yang berdampak besar pada institusi perlu dilakukanan penilaian resiko keamanan siber. Kampus yang menjadi salah satu penimplementasian siber dalam ruang lingkup pendidikan dengan banyaknya data dan informasi yang perlu dipasikan keamananya. Fremwork COBIT 2019 merupakan kerangka kerja untuk mengarahkan organisasi pada aktivitas keamanan siber dan asesemen keamanan. Fokus keamanan siber ini terdapat pada domain (DSS). Maturity level memilki tingkat penilaian yang baik, dan diharpkan bisa memberikan rekomendasi terkait temuan pada proses audit. Penelitian ini bertujuan membantu memberikan analisis penilaian keamannan yang tepat digunakan dalam perbaikan cybersecurity kampus. Objek penelitian ini berada pada layanan siber di kampus, dimulai dengan penggumpulan data terkait dengan layanan siber kampus sampai dengan pemberian rekomendasi. Hasil dari penelitian ini domain DSS nilai ketercapaian 3,50 menunjukkan maturity level pada defined. Level ini berarti dinyatakan institusi telah menjalankan proses yang sudah didefinisikan dan semua tim paham bagaimana proses seharusnya berjalan.
References
Budhy, E., & Hendra. (2021). Peningkatan Keamanan Sistem Informasi Akademik Universitas Muhammadiyah Jakarta Melalui Klasifikasi Serangan Cyber Dalam Menunjang WFH. Seminar Nasional Sains Dan Teknologi, November, 1–6. jurnal.umj.ac.id/index.php/semnastek%0Ap
Hadari Nawawi, J. H., & Barat, K. (n.d.). JEPIN (Jurnal Edukasi dan Penelitian Informatika).
Handoyo, E., & Aprillya, M. R. (n.d.). Handoyo, Penilaian resiko keamanan siber kampus menggunakan NIST cybersecurity framework 1.1 dengan Peringkat PEGI 1 Penilaian Resiko Keamanan Siber Kampus Menggunakan NIST Cybersecurity Framework 1.1 Dengan Peringkat PEGI.
Handoyo, E., & Izza Eka Nigrum. (2024). Penilaian risiko keamanan siber kampus menggunakan framework cybersecurity NIST 1.1. Jurnal CoSciTech (Computer Science and Information Technology), 4(3), 677–685. https://doi.org/10.37859/coscitech.v4i3.5628
Haster, A. P., & Hartomo, K. D. (2022). Analisis Tingkat Kematangan Smart City Kabupaten Lombok Utara Menggunakan COBIT 2019. Jurnal Media Informatika Budidarma, 6(3), 1459. https://doi.org/10.30865/mib.v6i3.4344
Ilmiah, J., & Grafis, K. (2023). Tata Kelola Teknologi Informasi Menggunakan COBIT 2019 Pada Val. 16(1), 196–208. https://doi.org/10.51903/pixel.v16i1.1247
Isnaini, K. N., & Suhartono, D. (2022). Evaluation of Basic Principles of Information Security at University Using COBIT 5. MATRIK : Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 21(2), 317–326. https://doi.org/10.30812/matrik.v21i2.1311
Lim, M. V., & Fianty, M. I. (n.d.). Enhancing Information Technology Governance: A Comprehensive Evaluation Of The 2019 COBIT Framework In The Retail Industry. In International Journal of Science. http://ijstm.inarah.co.id
Niqotaini, Z., Zaidiah, A., & Isnainiyah, I. N. (2024). Evaluasi Penerimaan Situs Web Fakultas Ilmu Komputer Menggunakan Tam Dan Eucs. JIKA (Jurnal Informatika), 8(3), 350. https://doi.org/10.31000/jika.v8i3.11935
Nursanjaya. (2019). Eksistensi pendidikan tinggi di indonesia: idealisme atau bisnis? (Vol. 2, Issue 1).
Riadi, I., Riyadi Yanto, I. T., & Handoyo, E. (2020). Cyber Security Analysis of Academic Services based on Domain Delivery Services and Support using Indonesian E-Government Ratings (PEGI). Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 263–270. https://doi.org/10.22219/kinetik.v5i4.1083
Riadi, I., Yanto, I. T. R., & Handoyo, E. (2020). Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI. IOP Conference Series: Materials Science and Engineering, 821(1). https://doi.org/10.1088/1757-899X/821/1/012003
Saputra, M. A., & Redo, R. (2021). Penerapan Framework Cobit 2019 Untuk Perancangan Tata Kelola Teknologi Informasi Pada Perguruan Tinggi. In Journal of Science and Social Research (Issue 3). http://jurnal.goretanpena.com/index.php/JSSR
Setyadi, R., & Priyatiningsih, E. (2021). Maturity Level of ITSM Analysis Using ITIL V3 Framework in State Electricity Enterprise Purwokerto (Vol. 9, Issue 1).
Sopandi, A., Hannan, A. R., & Khotimah, H. (2024). Perancangan Aplikasi Mobile Menggunakan Framework Flutter Pada Sistem Informasi Akademik. JIKA (Jurnal Informatika), 8(3), 304. https://doi.org/10.31000/jika.v8i3.11402
Umar, R., Riadi, I., & Handoyo, E. (2019). Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration ( CMMI ). Scientific Journal of Informatics, 6(2), 193–202.
Wattimury, G., & Faza, A. (2023). COBIT 2019 Implementation for Enhancing IT Governance in Educational Institutions. In Jurnal Informatika Sunan Kalijaga) (Vol. 8, Issue 3).
Downloads
Published
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.