Information System Security Analysis at PT. TELKOM Using KAMI Index

Authors

  • Yuliani SY. University of Widyatama, Bandung, Indonesia Author
  • Heri Heryono University of Widyatama, Bandung, Indonesia Author
  • Ai Rosita University of Widyatama, Bandung, Indonesia Author
  • Ulil Surtia Zulpratita University of Widyatama, Bandung, Indonesia Author
  • Eka Angga Laksana University of Widyatama, Bandung, Indonesia Author
  • Feri Sulianta University of Widyatama, Bandung, Indonesia Author

DOI:

https://doi.org/10.61841/dmpenx28

Keywords:

Information Security, KAMI index

Abstract

With the development of information technology, it provides a convenient way for every individual or institution to perform its duties and functions. Information security used by institutions must be maintained, yet they can manage and further avoid failure. Therefore, it is important to assess the relevant institutions to determine the level of maturity and completeness of information security. The assessment carried out was by using the Information Security Index (KAMI) issued by the Ministry of Communication and Information that has fulfilled the requirements and aspects of information security that refer to ISO 27001. Currently, PT Telekomunikasi Indonesia (TELKOM) has implemented information technology. At PT TELKOM, there are well-implemented access controls, including security or supervision of important work locations (server rooms, archive spaces); only employees are given a username and password to access them, and we also have implemented security to detect and prevent network access usage (including network wireless). 

Downloads

Download data is not yet available.

References

[1] Sulianta, F., Heryono, H., Zulpratita, U.S., Yuliani, S., Rosita, A., Laksana, E.A., Different Kinds of Modern Technique to Develop Various Information Systems, International Journal of Advanced Science and Technology, Vol. 28, No. 6, (2019), pp. 68-75.

[2] http://sam-berbagi.blogspot.com/2013/08/ancaman-dan-kelemahan-keamanan-sistem.html

[3] https://www.academia.edu/9760290/keamanan_sistem_informasi

[4] https://www.academia.edu/13063207/Ancaman_keamanan_sistem_informasi

[5] https://kominfo.go.id/index.php/content/detail/3326/Indeks+Keamanan+Informasi+(KAMI)/0/kemanan_informasi

[6] https://media.neliti.com/media/publications/193043-ID-evaluasi-manajemen-keamanan-informasi-me.pdf

[7] https://drive.google.com/file/d/13-fq8nT1s99mk4DvV7TZFYxh0soT75ql/view

[8] https://drive.google.com/file/d/1XRM74RMKIpxtuvTeJDYlNBlBDxwvpkD_/view

[9] https://www.nesabamedia.com/pengertian-firewall-dan-fungsi-firewall/

[10] http://ejurnal.its.ac.id/index.php/teknik/article/download/8289/2085

[11] Badawi, H., Abass, M., Hamam, O., Diab, M., El Said, M., Ismail, A., Badawy, A., Mostafa, G., Samir, S., ElDabaa, E., Saber, M. Molecular and in-situ hybridization detection of human papillomavirus genotypes among Egyptian patients with bladder cancer (2018), International Journal of Pharmaceutical Research, 10(4), pp. 402-405. https://www.scopus.com/inward/record.uri?eid=2-s2.0-

85062655664&doi=10.31838%2fijpr%2f2018.10.04.056&partnerID=40&md5=671f4d1a022e6ddf8b334a66602038b6

[12] M. S. Neeharika, b. Jeevana jyothi (2015) chronotherapeutics: an optimizing approach to synchronize drug delivery with circadian rhythm. Journal of Critical Reviews, 2 (4), 31-40.

[13] P. K. Lakshmi, B. Kalpana, and D. Prasanthi. "Invasomes: Novel Vesicular Carriers for Enhanced Skin Permeation." Systematic Reviews in Pharmacy 4.1 (2013), 26-30. Print. doi:10.4103/0975-8453.135837

Downloads

Published

30.04.2020

How to Cite

SY., Y., Heryono, H., Rosita, A., Surtia Zulpratita, U., Angga Laksana, E., & Sulianta, F. (2020). Information System Security Analysis at PT. TELKOM Using KAMI Index. International Journal of Psychosocial Rehabilitation, 24(2), 3121-3126. https://doi.org/10.61841/dmpenx28