Cyber Security Analysis of Academic Services based on Domain Delivery Services and Support using Indonesian E-Government Ratings (PEGI)
Corresponding Author(s) : Imam Riadi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 5, No. 4, November 2020
Abstract
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- R. Umar, I. Riadi, and E. Handoyo, “Analysis of Information Technology Governance Using the COBIT 5 Framework in Domain Delivery, Service, And Support (DSS),” Semin. Nas. Teknol. Inf. dan Komun. - Semant. 2017 Anal., pp. 41–48, 2017.
- L. F. Fathoni et al., “Application Information System Based Health,” vol. 2, no. 1, pp. 37–46, 2016.
- I. Muslimin, S. P. Hadi, and E. Nugroho, “An Evaluation Model Using Perceived User Technology Organization Fit Variable for Evaluating the Success of Information Systems,” vol. 4, no. 2, pp. 86–94, 2017. https://doi.org/10.15294/sji.v4i2.12012
- I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” vol. 5, no. 2, pp. 235–247, 2018. https://doi.org/10.15294/sji.v5i2.16545
- I. Riadi and M. E. Rauli, “Live forensics analysis of line app on proprietary operating system,” vol. 4, no. 4, 2019. https://doi.org/10.22219/kinetik.v4i4.850
- E. Kurniawan, “Security Level Analysis Of Academic Information Systems Based On Standard Iso 27002 : 2013 USING SSE-CMM,” Int. J. Comput. Sci. Inf. Secur., vol. 16, no. January, 2018. https://doi.org/10.29407/intensif.v2i1.11830
- I. Riadi, S. Sunardi, and E. Handoyo, “Security Analysis of Grr Rapid Response Network using COBIT 5 Framework,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 10, no. 1, pp. 29, 2019. https://doi.org/10.24843/LKJITI.2019.v10.i01.p04
- P. O. Rahmanda, R. Arifudin, and M. A. Muslim, “Implementation of Analytic Network Process Method on Decision Support System of Determination of Scholarship Recipient at House of Lazis Charity UNNES,” vol. 4, no. 2, pp. 199–211, 2017. https://doi.org/10.15294/sji.v4i2.11852
- M. Sumagita, I. Riadi, U. A. Dahlan, K. Yogyakarta, and D. I. Yogyakarta, “Analysis of Secure Hash Algorithm ( SHA ) 512 for Encryption Process on Web Based Application,” vol. 7, no. 4, pp. 373–381, 2018.
- E. Hicham, B. Boulafdour, M. Makoudi, and B. Regragui, “Information security, 4TH wave,” J. Theor. Appl. Inf. Technol., vol. 43, no. 1, pp. 1–7, 2012.
- I. Riadi, Y. Iwan, and E. Handoyo, “Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI,” 2020. https://doi.org/10.1088/1757-899X/821/1/012003
- F. Latifi and H. Zarrabi, “A COBIT5 Framework for IoT Risk Management,” Int. J. Comput. Appl., vol. 170, no. 8, pp. 40–43, 2017.
- R. Umar, I. Riadi, and E. Handoyo, “Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration ( CMMI ),” Sci. J. Informatics, vol. 6, no. 2, pp. 193–202, 2019. https://doi.org/10.15294/sji.v6i2.17387
- O. K. Sulaiman, “Network Security System Analysis With Switch Port Security” vol. 1, no. 1, pp. 9–14, 2016. https://doi.org/10.24114/cess.v1i1.4036
- R. Fadhlurrahman, M. C. Saputra, and A. D. Herlambang, “Evaluation of the Implementation of E-government in Batu City Government Using Indonesia's E-government Rating Framework ( PeGI ),” vol. 2, no. 12, pp. 5977–5982, 2018.
- J. F. Andry, “Audit of IT Governance Based on COBIT 5 Assessments : A Case Study,” TEKNOSI, vol. 02, no. May, 2017. https://doi.org/10.25077/TEKNOSI.v2i2.2016.27-34
- A. Yudhana et al., “Designing Information Systems Using Enterprise Architecture Planning ( Studi Kasus Pada Kecamatan di Kota Samarinda ),” khazanah Inform., vol. 4, no. 2, pp. 114–123, 2018. https://doi.org/10.23917/khif.v4i2.7039
- A. Fitriansyah, H. Budiarto, and J. Santoso, “Indonesian E-Government Rating Method (PeGI) for Information Technology Governance Audits,” Semin. Nas. Sist. Inf. Indones., pp. 2–4, 2013.
- P. Rahayu and D. I. Sensuse, “Assessment of e-Government Implementation in the Ministry of Education and Culture PUSTEKOM based on the PEGI method,” J. Sist. Inf. Bisnis, vol. 02, pp. 139–145, 2017. https://doi.org/10.21456/vol7iss2pp139-145
- Rusydi Umar, I. Riadi, and E. Handoyo, “A Analysis of Information Systems Security Based on COBIT 5 Framework Using Capability Maturity Model Integration (CMMI),” J. Sist. Inf. Bisnis, vol. 01, pp. 47–54, 2019. https://doi.org/10.21456/vol9iss1pp47-54
References
R. Umar, I. Riadi, and E. Handoyo, “Analysis of Information Technology Governance Using the COBIT 5 Framework in Domain Delivery, Service, And Support (DSS),” Semin. Nas. Teknol. Inf. dan Komun. - Semant. 2017 Anal., pp. 41–48, 2017.
L. F. Fathoni et al., “Application Information System Based Health,” vol. 2, no. 1, pp. 37–46, 2016.
I. Muslimin, S. P. Hadi, and E. Nugroho, “An Evaluation Model Using Perceived User Technology Organization Fit Variable for Evaluating the Success of Information Systems,” vol. 4, no. 2, pp. 86–94, 2017. https://doi.org/10.15294/sji.v4i2.12012
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” vol. 5, no. 2, pp. 235–247, 2018. https://doi.org/10.15294/sji.v5i2.16545
I. Riadi and M. E. Rauli, “Live forensics analysis of line app on proprietary operating system,” vol. 4, no. 4, 2019. https://doi.org/10.22219/kinetik.v4i4.850
E. Kurniawan, “Security Level Analysis Of Academic Information Systems Based On Standard Iso 27002 : 2013 USING SSE-CMM,” Int. J. Comput. Sci. Inf. Secur., vol. 16, no. January, 2018. https://doi.org/10.29407/intensif.v2i1.11830
I. Riadi, S. Sunardi, and E. Handoyo, “Security Analysis of Grr Rapid Response Network using COBIT 5 Framework,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 10, no. 1, pp. 29, 2019. https://doi.org/10.24843/LKJITI.2019.v10.i01.p04
P. O. Rahmanda, R. Arifudin, and M. A. Muslim, “Implementation of Analytic Network Process Method on Decision Support System of Determination of Scholarship Recipient at House of Lazis Charity UNNES,” vol. 4, no. 2, pp. 199–211, 2017. https://doi.org/10.15294/sji.v4i2.11852
M. Sumagita, I. Riadi, U. A. Dahlan, K. Yogyakarta, and D. I. Yogyakarta, “Analysis of Secure Hash Algorithm ( SHA ) 512 for Encryption Process on Web Based Application,” vol. 7, no. 4, pp. 373–381, 2018.
E. Hicham, B. Boulafdour, M. Makoudi, and B. Regragui, “Information security, 4TH wave,” J. Theor. Appl. Inf. Technol., vol. 43, no. 1, pp. 1–7, 2012.
I. Riadi, Y. Iwan, and E. Handoyo, “Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI,” 2020. https://doi.org/10.1088/1757-899X/821/1/012003
F. Latifi and H. Zarrabi, “A COBIT5 Framework for IoT Risk Management,” Int. J. Comput. Appl., vol. 170, no. 8, pp. 40–43, 2017.
R. Umar, I. Riadi, and E. Handoyo, “Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration ( CMMI ),” Sci. J. Informatics, vol. 6, no. 2, pp. 193–202, 2019. https://doi.org/10.15294/sji.v6i2.17387
O. K. Sulaiman, “Network Security System Analysis With Switch Port Security” vol. 1, no. 1, pp. 9–14, 2016. https://doi.org/10.24114/cess.v1i1.4036
R. Fadhlurrahman, M. C. Saputra, and A. D. Herlambang, “Evaluation of the Implementation of E-government in Batu City Government Using Indonesia's E-government Rating Framework ( PeGI ),” vol. 2, no. 12, pp. 5977–5982, 2018.
J. F. Andry, “Audit of IT Governance Based on COBIT 5 Assessments : A Case Study,” TEKNOSI, vol. 02, no. May, 2017. https://doi.org/10.25077/TEKNOSI.v2i2.2016.27-34
A. Yudhana et al., “Designing Information Systems Using Enterprise Architecture Planning ( Studi Kasus Pada Kecamatan di Kota Samarinda ),” khazanah Inform., vol. 4, no. 2, pp. 114–123, 2018. https://doi.org/10.23917/khif.v4i2.7039
A. Fitriansyah, H. Budiarto, and J. Santoso, “Indonesian E-Government Rating Method (PeGI) for Information Technology Governance Audits,” Semin. Nas. Sist. Inf. Indones., pp. 2–4, 2013.
P. Rahayu and D. I. Sensuse, “Assessment of e-Government Implementation in the Ministry of Education and Culture PUSTEKOM based on the PEGI method,” J. Sist. Inf. Bisnis, vol. 02, pp. 139–145, 2017. https://doi.org/10.21456/vol7iss2pp139-145
Rusydi Umar, I. Riadi, and E. Handoyo, “A Analysis of Information Systems Security Based on COBIT 5 Framework Using Capability Maturity Model Integration (CMMI),” J. Sist. Inf. Bisnis, vol. 01, pp. 47–54, 2019. https://doi.org/10.21456/vol9iss1pp47-54