Analisis Tingkat Keamanan Sistem Informasi Akademik Berdasarkan Standard ISO/IEC 27002:2013 Menggunakan SSE-CMM
The objective of this research is to find out the level of information security in the academic information system to give recommendations improvements in information security management. The method used is qualitative research method, which data obtained based on the results of questionnaires distributed to respondents with the Guttmann scale. Based on the analysis results, 13 objective controls and 43 security controls were scattered in 3 clauses. From the analysis, it was concluded that the maturity level of information system security governance was 2.51, which means the level of maturity is still at level 2 but is approaching level 3 well defined.
Hermaduanti, Ninki & Riadi, Imam. Automation framework for rogue access point mitigation in ieee 802.1X-based WLAN. Journal of Theoretical and Applied Information Technology. 93. 287-296. 2016
Imam Riadi, Jazi Eko Istiyanto, Ahmad Ashari and Subanar, “Internet Forensics Framework Based-on Clustering” International Journal of Advanced Computer Science and Applications(IJACSA), 4(12), 2013.
Elachgar, H., Boulafdour, B., Makoudi, M., & Regragui, B. Information security, 4TH wave. 2012
Tractenberg, R. E., Yumoto, F., Aisen, P. S., Kaye, J. A., & Mislevy, R. J. (2012). Using the Guttman scale to define and estimate measurement error in items over time: The case of cognitive decline and the meaning of “points lost.” PLoS ONE, 7(2).2012
Luhua, Z. (2012). Analysis of software capability maturity model (CMM). In Proceedings of the 2012 National Conference on Information Technology and Computer Science, CITCS 2012 (pp. 830–833)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to INTENSIF and University of Nusantara PGRI Kediri as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc., will be allowed only with a written permission from INTENSIF and University of Nusantara PGRI Kediri.
INTENSIF and University of Nusantara PGRI Kediri, the Editors and the reviewer make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the INTENSIF are sole and exclusive responsibility of their respective authors and advertisers.
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share alike (CC BY-SA)