Claim Missing Document
Check
Articles

Found 11 Documents
Search

Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI) Umar, Rusydi; Riadi, Imam; Handoyo, Eko
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 9, No 1 (2019): Volume 9 Nomor 1 Tahun 2019
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4214.301 KB) | DOI: 10.21456/vol9iss1pp47-54

Abstract

Information technology is a very important part of a company or institution. The information system itself is expected to provide better benefits for companies or institutions. However, along with technological developments are often misused by some irresponsible parties that can lead to threats of the use of technology. Information system security is very important for institutions to maintain information optimally and safely. The existence of a security problem triggers a procedure to control access rights in an information system. A good information system is an information system that can be assessed at a security level, so that it can provide comfort for users. COBIT 5 as an information technology security control standard. Whereas to achieve the standard level of achievement CMMI is needed in information technology security. The combination of the two standards in the information system is able to provide a level of achievement of information technology. The results obtained from the maturity value are 4,458 which means the institutions are at the Managed and Measurable level. This level, institutions are increasingly made aware of technological developments. Institutions have implemented the quantification concept in each process, and are always monitored and controlled for performance. Information system security at this level is good, it's just that it still needs innovation and development to be ready, fast and right in handling security threats.
ANALYSIS SECURITY OF SIA BASED DSS05 ON COBIT 5 USING CAPABILITY MATURITY MODEL INTEGRATION (CMMI) Handoyo, Eko; Umar, rusydi; Riadi, Imam
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.17387

Abstract

A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.
Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration (CMMI) Handoyo, Eko; Umar, rusydi; Riadi, Imam
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.17387

Abstract

A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.
Security Analysis of Grr Rapid Response Network using COBIT 5 Framework Imam Riadi; Sunardi Sunardi; Eko Handoyo
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.805 KB) | DOI: 10.24843/LKJITI.2019.v10.i01.p04

Abstract

Connection from the Internet is required to always be maintained under any conditions, but not always connectivity will run smoothly, lots of crowds or problems that require connections do not run smoothly. Application of security systems to overcome all problems and difficulties, both technical and non-technical which can affect system performance. GRR Rapid Response is the answer to internet network security. GRR asks for a client-server model, agents installed on the machine (client) to be able to communicate with the Grr server to access and provide unique client IDs. After setting this active and running, the server can send a request to the client who collects information, and the client sends a response to the request. After Grr is made, it is necessary to do a system evaluation and evaluation. The COBIT 5 framework is a good standard for determining the level of maturity of network security. The maturity level obtained is 2.899 can be decided at an institutional maturity level defined. The level of support the institution has agreed to, supports and supports all activities related to network security.
Mapping Risk Level Based on Peak Ground Acceleration (PGA) and Earthquake Intensity Using Multievent Earthquake Data in Malang Regency, East Java, Indonesia Uswatun Chasanah; Eko Handoyo; Nesya Nuur Rahmawati; Masria Musfiana
Jurnal Ilmu Fisika (JIF) Vol 14 No 1 (2022): March 2022
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jif.14.1.64-72.2022

Abstract

This research aimed to identify the earthquake hazard, developing a peak ground acceleration (PGA) and earthquake intensity map to reduce earthquake disaster risk in Malang, East Java, Indonesia. This map is based on historical data of earthquake occurrence in 2011-2021 using the International Seismological Centre (ISC) earthquake catalog. Peak ground acceleration was analyzed using Donovan and McGuire equation, and the earthquake intensity was analyzed using the Wald equation. The result of this study represented peak ground acceleration value in Malang Regency, which was varied from 23.687 – 33.069 gal (Donovan attenuation equation) and 22.245 – 31.705 gal (McGuire attenuation equation). While based on earthquake depth, Malang Regency had a damage capacity of IV-V MMI on an intensity scale. This intensity was equivalent to the formation of cracks in the ground. Almost all residents also feel the vibrations. The most severe damage was due to the earthquake on April 10, 2021, at 14:00:16 WIB spoiled Dampit and Bantur district's public facilities. This study provides an overview of the riskiest area affected by the disasters that can be used for disaster mitigation in Malang regency.
Analisis Tingkat Keamanan Informasi: Studi Komparasi Framework Cobit 5 Subdomain Manage Security Services (DSS05) dan NIST Sp 800 – 55 Eko Handoyo
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2199

Abstract

Information technology is a very important part of the organization. IT is expected to provide a good profit for the company. However, as technology evolves, it is often exploited by some irresponsible parties that can lead to the emergence of threats and risks from the use of technology. The organization needs to measure the level of information security to identify the system's weaknesses and threats to the organization. Standards for measuring information security are COBIT 5 subdomain manage security services (DSS05) and NIST SP 800-55 revision 1. This study is comparing the two standards. Comparative analysis uses qualitative analysis based on three aspects in information security that are confidentiality, integrity, and availability. Based on the analysis result obtained the advantages and disadvantages of each standard.
An Evaluation of Students’ Readiness to Use E-learning Media in the MBKM Program Humairah Humairah; Uswatun Chasanah; Eko Handoyo
Jurnal Basicedu Vol 6, No 3 (2022): June Pages 3200-5500
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/basicedu.v6i3.2388

Abstract

This study aimed to prepare the readiness of students to use E-learning media in the MBKM (Freedom to Learn – Independent Campus) program at the Faculty of Science, Technology and Education. This was an evaluation research with a quantitative research approach and descriptive method. The data collection technique used lecturer and student questionnaires based on the CIPP evaluation model (context, input, process, product). The samples were 98 students. The results indicated that in terms of readiness and understanding of E-learning-based learning management, the lecturers were included in the high category with a percentage of 87.78%. The score obtained by students based on the understanding of E-learning-based learning was included in the high category with a percentage of 82.16%. The results of the questionnaire showed that the E-learning-based learning activities were carried out well (structured, according to schedule and coordinated).
Analisis Tingkat Kegempaan Wilayah Jawa Timur berbasis Distribusi Spasial dan Temporal Magnitude Of Completeness (Mc), A-Value Dan B-Value Uswatun Chasanah; Eko Handoyo
INDONESIAN JOURNAL OF APPLIED PHYSICS Vol 11, No 2 (2021): October
Publisher : Department of Physics, Sebelas Maret University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.13057/ijap.v11i2.45984

Abstract

The Space and temporal distribution of the seismicity parameters consisting of magnitude of completeness (Mc), a-value, and b-value were estimated for the East Java, Indonesia using the International Seismological Center (ISC) earthquake catalogue. The main purposes of this research were to determine the parameters of the seismicity and its spatial temporal distribution so that early detection and warning systems in the East Java run optimally. All estimated parameters were analyzed based on an earthquake catalogue during 1980-2020 by applying The Maximum Curvature (MaxC) method. The MaxC method enumerate the highest value of the first subordinate of the cumulative Frequency Magnitude Distribution (FMD) graph. The value of the magnitude of completeness, which was estimated on this study as result Mc 3,4 – 4,8; a-value 5,560 - 8,244; and b-value (0,73 – 0,82 ± 0.13). The lower b-value (0,73 ± 0.13) was obtained for the southern part of the East Java. This area is indicated to have high seismic moment release and rock stress level accumulation. Understanding and clarifying the relation between seismicity parameters and structure of tectonic framework can guidance us to estimate seismic risk for earthquake hazard mitigation in the East Java.
Sistem Pendukung Pengambil Keputusan Penerima Beasiswa LAZISMU dengan Metode MAUT M. Hildan Bahruddin; Bagus Dwi Saputra; Eko Handoyo
Jurnal Informatika Polinema Vol. 10 No. 1 (2023): Vol 10 No 1 (2023)
Publisher : UPT P2M State Polytechnic of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jip.v10i1.1543

Abstract

Sistem pendukung pengambil keputusan untuk seleksi penerima beasiswa di Universitas Muhammadiyah Lamongan, melalui LAZISMU (Lembaga Amil Zakat, Infaq, dan Sadaqah Muhammadiyah), menggunakan metode Multi-Attribute Utility Theory (MAUT). Metode MAUT mempertimbangkan preferensi subjektif dan bobot atribut dalam pengambilan keputusan multi-kriteria. Sistem ini menghitung skor utilitas total untuk setiap calon penerima beasiswa dengan menggunakan bobot atribut dan nilai atribut yang diberikan. Penelitian ini mengambil sampel data dari 18 mahasiswa dan menggunakan lima kriteria pilihan. Lima kriteria tersebut meliputi nilai tes (bobot 0,15), jenis beasiswa (bobot 0,4), nilai IPK (bobot 0,2), kontribusi lembaga Muhammadiyah (bobot 0,15), dan organisasi (bobot 0,1). Hasil perhitungan menggunakan metode MAUT menunjukkan bahwa sistem ini berhasil memberikan nilai utilitas tertinggi sebesar 0,9667 dan terendah sebesar 0,2333. Sistem ini membantu LAZISMU dalam menyeleksi calon penerima beasiswa secara efisien dan objektif, sehingga calon penerima beasiswa dengan skor utilitas tertinggi dapat direkomendasikan sebagai penerima beasiswa.
Penilaian risiko keamanan siber kampus menggunakan framework cybersecurity NIST 1.1 : Cyber campus safety risk assessment using NIST cybersecurity framework 1.1 Handoyo, Eko; Izza Eka Nigrum
Computer Science and Information Technology Vol 4 No 3 (2023): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v4i3.5628

Abstract

The Industrial Revolution 4.0 forced institutions and companies to start improving the implementation of information technology to be able to compete well.The campus is one of the most massive sectors in the development and implementation of information technology.Because there are so many services and business processes that exist in the campus system.Campus business systems that are complex and have a lot of data in the information certainly pose a threat in the information technology security sector.Technological security must of course guarantee its confidentiality, integrity and availability. Countermeasures related to cybersecurity threats can be carried out by conducting a cyber security risk assessment.Standards for conducting cyber security assessments include COBIT 5, NIST, and ISO 20071. Each standard has audit modules that aim to make the institution a good government.NIST Cybersecurity Framework 1.1 is a standard used to direct organizations to cybersecurity activities and consider cybersecurity risks as part of their management process. The purpose of this study is to produce an assessment of campus cybersecurity risks using the NIST cybersecurity framework 1.1 as a standard reference.The overall result of the research, which is to produce, is the ranking of campus cyber risk assessments.The assessment of campus cyber security risks resulted in a value of 1.20, placing the campus institution in a "Partially Implemented" cybersecurity condition.Where campuses only carry out control on the framework as necessary and have not been documented, and so it needs to be improved regarding proper control and documentation to improve better cyber security.