Rizal Syahri
Computer Science Faculty, BinaDarma University Palembang, South Sumatera

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

EVALUATION OF MANAGEMENT NETWORK SECURITY USING SEKCHECK NETWORK EVALUATOR Rizal Syahri; Cholil W; Widiyati Q
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v14i2.658

Abstract

The Utilization of Information Technology in business has become a significant part in supporting the business process. The implementation of IT has been implemented as a value chain system which support the business transaction from first level process till documentation, its result a report which could mark the decision making process in manager level. Indeed the information which is the output of the system has a very important role in the process business; therefore the procedure and mechanism how to protect that information also need a special courtesy. There are several tools which has been use as security evaluator both inn system and network. This paper has concern about one of those tools, the tools called Sekcheck Network Evaluator Security Evaluator. This tools has function to analyze the current system in awareness of user in information security substances especially assessment of user role and activities in a network. The papers will analyze the assessments process by Sekcheck Network Evaluator and how the result is and how to accomplish it with Information Technology Audit process that will influence to the factors of awareness and risk level of information security from user perspective. At the end this could use as consideration input for managers to optimize user awareness about security of information in business.Keywords: Business transaction system, Information Security, Awareness, Assessment, Network, application Sekcheck Network Evaluator security evaluator
DATA SECURITY ASSESMENT: ISO/IEC 27002 MODEL BASED Rizal Syahri; Cholil W; Widiyati Q
Prosiding International conference on Information Technology and Business (ICITB) 2016: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 2
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Most of Organization using the Information Technology is to enhance the performance of their process business and increase the productivity. There are no doubt about the successfully of using IT, but another problems that produce from this paradigm that data security awareness. This paper will describe the assessment process of data security process management and implementation at the research object which is has implementing IT as the main support in their Process Business. The assessment model based on ISO/IEC 27002, as an internal standard of cyber security issues. The result of this paper will be input to the Object in another assessment IT process business. KEY WORDS: Data Security, Risk Assessment, ISO/IEC 27002. Information Technology.