Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : BERKALA SAINSTEK

Information System Security Audit Based on the DSS05 Framework Cobit 5 at Higher Education XX Sinaga, Rudolf; Samsinar, Samsinar; Afriany, Renny
BERKALA SAINSTEK Vol 9 No 1 (2021)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v9i1.20361

Abstract

Currently, information has become a commodity or basic need, it can even be said that we are already in an "information-based social" era. It is undeniable that the ability to access and ensure the availability of information quickly and accurately has become a very essential component for an organization, whether in the form of social or commercial organizations, educational institutions such as universities, government agencies, and individuals. Various channels were created to regulate access rights to information, to prevent unauthorized people from accessing it, to minimize losses for the owner of the information. Based on the results of interviews with the research object of XX college, there are still frequent disruptions to information system security such as attacks on servers that result in server downtime, attacks on institutional e-mails that result in being unable to receive or even send e-mails, and other disturbances. This certainly harms information services at the tertiary institution, therefore an information system security audit is required. This study aims to measure the level of information system security capabilities using the Cobit 5 framework in the APO13 and DSS05 domains. Based on the results of the audit, it was found that the GAP value was 3.6 for the APO13 domain or at level 1 while 3.4 for the GAP DSS05 value or at level 2, it can be concluded that the information system security maturity level is still very low so that it needs improvement. It is recommended to make SOPs and documentation of maintenance, control, and periodic security evaluation, install an antivirus that has high and up to date protection accuracy, and make regular maintenance reports both on software and hardware.
Information Technology Governance Audit at XYZ College Using COBIT Framework 2019 Samsinar, Samsinar; Sinaga, Rudolf
BERKALA SAINSTEK Vol 10 No 2 (2022)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v10i2.30325

Abstract

Reliable and up-to-date information services are one of the parameters for the achievement of an organization's performance, including for a university, which is currently required to be able to adapt to technological advances to produce graduates who can master information technology to support the competence of their respective fields. The curriculum changes launched by the current government are also proof that the application of information technology in higher education is a must. Seeing this, universities have a difficult task, especially at the implementation stage of implementing information technology, because they must prepare not only infrastructure but also human resources who can develop good information system governance. Therefore it is necessary to carry out an IT governance audit. From the results of observations made, XYZ College has utilized information technology in academic services and other information services. However, it was found that information technology governance does not yet have a standard so that it is considered not to be able to meet the desired goals, and instead will cause various problems including uncontrolled operational costs and other problems. The purpose of this study is to measure the performance of information technology governance at XYZ College using the COBIT 2019 framework. Based on the results of an audit conducted from 7 EGIT components, namely processes, organizational structure, information flow and items, people skills and competencies, policies and procedures, culture, ethical behavior, and service infrastructure and application are on average at level 3, it can be concluded that the application of information technology has been running, the infrastructure is adequate but does not have good governance procedures or standards. It is recommended that XYZ Higher Education make standards for information technology governance as well as periodic evaluations of the use of all components of information technology, both software, hardware, and brainware.
Fuzzy Employee Placement Suitability Assessment using Mamdani Fuzzy Method Afriany, Renny; Sinaga, Rudolf; Samsinar, Samsinar
BERKALA SAINSTEK Vol 10 No 2 (2022)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v10i2.30280

Abstract

For a company, employees are the spearhead for the company because they have a function as Customer Service, customer satisfaction is obtained after interacting with the company through the performance of its employees. Employees are expected to meet all customer needs with the applicable regulations in the company and become a source of income for the company. To get reliable employees, one way is to assess the suitability of their placement in the appropriate position. With the assessment of the suitability of positioning, companies can consider and determine the provision of rewards, promotions, punishments, training, coaching, counseling, or transfers for their employees. The choice of method used to assess the suitability of employee placement in a company is Fuzzy Mamdani. With the Fuzzy Mamdani method, a system that is completely measurable and human assessments that tend to be immeasurable can be bridged. Assessment of the suitability of employee placement using the resulting fuzzy method, is expected to be an alternative solution for companies to give positions to their employees.