Analysis And Implementation Of Operational Security Management On Computer Center At The University X

Main Authors: Gunawan, Ibnu, Noertjahyana, Agustinus, Rusli, Hartanto
Format: Proceeding PeerReviewed application/pdf
Terbitan: , 2014
Subjects:
Online Access: https://repository.petra.ac.id/16626/1/Publikasi1_02055_1415.pdf
https://repository.petra.ac.id/16626/
Daftar Isi:
  • This paper presents how to asses an Operational Security Management on Computer Center At the University X. In carrying out operations using information technology- based computer network, it is an organization needs to consider factors in information systems security. The Security of communication networks is absolutely necessary to be able to provide continuous service to its users. Most of the staff were involved in the making of this security policy, often feel confused in starting to work, due to not having enough experience or feeling that it will not require a policy because there was no incident related to a security policy. To resolve these problems, we need a tool to help the staff in making the security system design that is structured with implementation modules sourced from security policy and risk management module so that it can be monitored if an error occurs. In last section, this paper show how to testing by using the engine to perform the questionnaire calculations, making planning and operations. Occurs similarity between the results of risk management high risk states with a CISSP standard studied on a case study.