Nelly Nelly
Binus University

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Information Technology Risk Assessment: Octave-S Approach Bambang Gunawan; Merry Merry; Nelly Nelly
CommIT (Communication and Information Technology) Journal Vol. 5 No. 1 (2011): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.549

Abstract

Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.Index Terms - IT, Risk Assessment, Octave-S