Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Informatics and Information Security

Sistem Monitoring Pengiriman Alat Kerja Dengan Mengunakan Teknologi CouchDB M. Hadi Prayitno; Achmad Noe’man
Journal of Informatic and Information Security Vol. 1 No. 2 (2020): Desember 2020
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/jiforty.v1i2.388

Abstract

CV. BJS is a company engaged in the rental of work tools, especially heavy equipment, and serves in the areas of Java, Sumatra, Kalimantan, Sulawesi and Bali. The Work Tools will be sent using company vehicles. The problem that arises from the delivery process is the unknown presence of delivery vehicles from both the company and the customer side, so customers often complain because there is no certainty about the arrival of the heavy equipment being rented. In this study, 2 applications have been made that can answer company problems. The first application, also known as administrative application, is made for administrative processes that are web-based and will be accessed by internal companies and customers. The second application, an Android-based application used by heavy equipment deliverers, will inform the whereabouts of the vehicle through CouchDB technology which is also used to provide real-time tracking and monitoring of the system.
Penanganan Risiko Keamanan Informasi Aplikasi Webmarket Berdasarkan ISO 27001:2013 (Study Kasus pada PT Sanjaya Citra Anugrah) M. Hadi Prayitno
Journal of Informatic and Information Security Vol. 2 No. 1 (2021): Juni 2021
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/3fa8tm26

Abstract

Sanjaya Citra Anugerah (SCA) is a company engaged in the rental and sale of heavy equipment, committed to ensuring the security of organizational information to maintain the confidentiality, integrity and availability of information from the threat of information security failure. This is realized by implementing an information security management system based on the international standard ISO 27001:2013. This study aims to describe the scope of the information security management system, the internal and external factors that influence it and to identify broadly the potential failures of information security and their impact. The potential failure is a risk that must be identified based on current conditions, which will then be determined to cause a risk management plan to be prepared, so that information security can be maintained and ultimately increase the level of trust from stakeholders.