Claim Missing Document
Check
Articles

Found 2 Documents
Search

Manajemen Keamanan Kilang LNG (Liquefied Natural Gas) Tangguh Bintuni Papua Susanto, Edy; Antira, Lady; Kevin, Kevin; Stanzah, Edo; Majid , Assyeh Annasrul
Journal of Engineering Environtmental Energy and Science Vol. 3 No. 1 (2024): January 2024
Publisher : LPPMP Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/t8h3cq97

Abstract

Pengamanan rencana pengamanan sistem informasi data perusahaan terdiri dari strategi dan pembagian tanggung jawab yang tujuan utamanya adalah untuk mengurangi risiko yang berpotensi menjadi ancaman bagi operasional perusahaan. British Petroleum di Indonesia adalah Operator O&G Lepas Pantai Terbesar, sekaligus distributor utama untuk kebutuhan gas alam dalam negeri. Rumusannya adalah Information Security Management System (ISMS) merupakan kesatuan sistem yang disusun berdasarkan pendekatan risiko untuk pengembangan, implementasi, pengoperasian, pengawasan, pemeliharaan dan peningkatan keamanan informasi perusahaan. Metodologi penelitian mengkaji studi literatur yang meliputi manajemen keamanan BP Tangguh. Dalam implementasinya, proteksi keamanan perusahaan menggunakan PDCA. British Petroleum (BP) memastikan bahwa aspek keselamatan dan identifikasi yang bersifat bahaya dan risiko tinggi telah dilakukan secara langsung, penilaian keamanan adalah serangkaian tindakan yang ditujukan untuk menjaga keamanan, integritas dan kerahasiaan proses evaluasi atau penilaian. Hasil sistem manajemen keamanan di BP Tangguh, disimpulkan pelaksanaan dan penerapan sistem manajemen keamanan di BP Tangguh sudah optimal karena memiliki sistem manajemen keamanan yang sangat efisien, terorganisir dan memiliki landasan hukum yang jelas.
MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL Susanto, Edy; Antira, Lady; Kevin, Kevin; Stanzah, Edo; Majid, Assyeh Annasrul
Journal of Business And Entrepreneurship Vol. 11 No. 1 (2023): JOURNAL OF BUSINESS AND ENTREPRENEURSHIP (May 2023 Edition)
Publisher : APPS Publications

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46273/jobe.v11i1.365

Abstract

In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.