Information Technology Risk Assessment: Octave-S Approach

Main Authors: Gunawan, Bambang, Merry, Merry, Nelly, Nelly
Format: Article PeerReviewed
Terbitan: Binus University , 2011
Subjects:
Online Access: http://eprints.binus.ac.id/26673/
http://library.binus.ac.id/Collections/journal_detail.aspx?subject=6&volnoed=Volume 05 / Nomor 01 / May 2011&title=Information Technology Risk Assessment: Octave-S Approach
Daftar Isi:
  • Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.