p-Index From 2020 - 2025
8.541
P-Index
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JuTISI (Jurnal Teknik Informatika dan Sistem Informasi)

Tata Kelola pada Perguruan Tinggi Menggunakan Control Objective for Information & Related Technology (COBIT) 5 asriyanik asriyanik; Mokhamad Hendayun
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.665

Abstract

A College needs a good governance in implementation of information technology, especially which related with information security because information is an important asset. Framework which can be used for the preparation of information security governance is COBIT 5 from ISACA. The first  step to start the preparation of the governance using COBIT is mapping between the goal of college with enterprise goals (EG), IT Related Goals and domain process COBIT 5. From 15 colleges that have been accredited in West Java (15 Januari 2015), produced 13 EG related for college accreditation A, B and 10 for college accreditation EG C. For a sample in process capability assessment of information security governance, we used Universitas Muhammadiyah Sukabumi (UMMI) as the research object, which is an accredited college C, and EG focused on optimization of business process functionality associated with the alignment of IT goals of IT and business strategy, and 10 processes, i.e EDM01, EDM01, APO01, APO02, APO03, APO05, APO07, APO08, BAI01, BAI02. From the results obtained capability assessment process UMMI value of 7 is on level 0, ie the value of the attribute <15-50% and 3 process closer to fulfillment level 1, ie the interval> 50-85%. Gap analysis results, it turns out that making such UMMI lack of work products (evidence / result) of activities of governance processes deemed to have been executed. To meet the achievement level, it is recommended to perform compliance on each best practice and work products, and can be initiated by creating a guide to information security.
Manajemen Risiko Keamanan Informasi Menggunakan ISO 27005:2011 pada Sistem Informasi Akademik (SIAK) Universitas Muhammadiyah Sukabumi (UMMI) Asriyanik Asriyanik; Prajoko Prajoko
Jurnal Teknik Informatika dan Sistem Informasi Vol 4 No 2 (2018): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information security is an important part of an academic information system, including Muhammadiyah University of Sukabumi (UMMI). Information security is conducted to protect UMMI assets, especially data and information. Data and information have become an important asset in an organization because it relates to the image of the organization. At this time academic information system at UMMI is built online, causing various threats that may occur. Threats can arise inside or outside. If the threat occurs then the information security aspect will be disrupted and enable the disruption of business process on academic information system of UMMI. The likelihood of this threat is called risk. To minimize losses from risks, risk management should be done well. The risk management method used in risk management in the academic information system of UMMI is ISO 27005. The selection of this method to facilitate the development in the next stage of information security management system on UMMI Academic Information System uses ISO 27000 series. Data collection is done by interview and discussion. The risk management process under ISO 27005 includes four main steps: scope determination, risk assessment, risk treatment and risk acceptance. The result of the risk assessment found 73 possible threat scenarios divided into 3 risk levels, which were 2 low risks, 64 medium risks and 7 high risks. Out of 73 threat scenarios, 47 were made to risk treatment planning. Results of the risk treatment plan, 19 modified risks, 1 risk transferred and 27 risks could be avoided. This risk treatment plan is a recommendation for the leadership of UMMI to conduct risk management.
Implementasi Algoritma Apriori Pada Penyusunan Menu Makanan Rumah Makan Prasmanan Asep Budiman Kusdinar; Daris Riyadi; Asriyanik Asriyanik
Jurnal Teknik Informatika dan Sistem Informasi Vol 6 No 2 (2020): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v6i2.2742

Abstract

A buffet restaurant is a restaurant that provides buffet food that is served directly at the dining table so that customers can order more food according to their needs. This study uses the association rule method which is one of the methods of data mining and a priori algorithms. Data mining is the process of discovering patterns or rules in data, in which the process must be automatic or semi-automatic. Association rules are one of the techniques of data mining that is used to look for relationships between items in a dataset. While the apriori algorithm is a very well-known algorithm for finding high-frequency patterns, this a priori algorithm is a type of association rule in data mining. High- frequency patterns are patterns of items in the database that have frequencies or support. This high-frequency pattern is used to develop rules and also some other data mining techniques. The composition of the food menu in the Asgar restaurant is now arranged randomly without being prepared on the food menu between one another. The result of this research is to support the composition of the food menu at the Asgar restaurant so that it is easier to take food menu with one another.
Co-Authors Abhista Hibatullah, Akbar Adi Sunarto, Asril Adiwijaya, Fahmi Adzkia, Hawarizmi Ummul Afiansyah, Rifan Agung Pambudi Agung Pambudi Akyas Hifdzi Rahman, Rifqi Alifatih, Auriel Haiqal Asep Budiman Kusdinar Asep M.Ramdan Asep Muhamad Ramdan Asril Adi Sunarto Azhilla Margiani Saraswati Budhy Adzy, Luthfy Budiman Kusdinar, Asep Dafa Satria Sidik, Muhamad Dang Kurniawan, Dito DANNY RAMADHAN Daris Riyadi Didik Indrayana Din Azwar Uswatun Edward, MA Algifari Eka Fitriah, Tika Elwanda Putra, Isra Fadhil Faizal Akbar Fahmi Nurfalah Fajar Hikmal Gunawan Fathia Frazna Az-Zahra Fathia Frazna Azzahra Frananda Adiezwara Ramadhan, Mohamad Frazna Azzahra, Fathia Frazzna Az-zahra, Fathia Ilmi Barokah Indra Griha Tofik Isa iqbal setiawan Isa, Indra Griha Tofik Iwan Rizal Setiawan Jamaludin, Firdaus kania, euis Kokom Komariah Kokom Komariah Larasati Mayan Pramesti Lelah Lelah Lelah Lelah Leonita Siwiyanti lucky valiant M. Rizky Suherlan M.Ramdan, Asep MA Algifari Edward Maulana Muhammad Rizky Mohamad Nurizki Mohamad Ridwan Mokhamad Hendayun Mubharak, Gilang Fauzul Muhammad Drajat Ramdhani muhammad musyfik Muhammad Zaynurroyhan Mulud Muchamad, Reski musyfik, muhammad Nesta Suandana, Ilham Nur Asiah Ramdani Nuraeni, Fika Nurmilah, Risma Nurmillah, Risma Prajoko . Prajoko Prajoko Putra, Muhammad Rafli Afandi Rahmawati, Verra Sri Yulia Ramadhan, Vito Rambe, Sarah Syakira Ramdan, Adam Rijal Agus Rusmana Risma Nurmilah Riyadi, Daris Rustiandi, Ryan Santiastry, Sany Sarah Novia Hermawanti Soebandi, Andry Subhan, Roby Azhari Suhendar Syafira Zahara Syah Rizal Fauzy Syahputra, M Ramdhan widi aulia rohmah Winda Apriandari Winda Apriyandari Zahra, Fathia Frazna Az