Information System Security Analysis at PT. TELKOM Using KAMI Index
DOI:
https://doi.org/10.61841/dmpenx28Keywords:
Information Security, KAMI indexAbstract
With the development of information technology, it provides a convenient way for every individual or institution to perform its duties and functions. Information security used by institutions must be maintained, yet they can manage and further avoid failure. Therefore, it is important to assess the relevant institutions to determine the level of maturity and completeness of information security. The assessment carried out was by using the Information Security Index (KAMI) issued by the Ministry of Communication and Information that has fulfilled the requirements and aspects of information security that refer to ISO 27001. Currently, PT Telekomunikasi Indonesia (TELKOM) has implemented information technology. At PT TELKOM, there are well-implemented access controls, including security or supervision of important work locations (server rooms, archive spaces); only employees are given a username and password to access them, and we also have implemented security to detect and prevent network access usage (including network wireless).
Downloads
References
[1] Sulianta, F., Heryono, H., Zulpratita, U.S., Yuliani, S., Rosita, A., Laksana, E.A., Different Kinds of Modern Technique to Develop Various Information Systems, International Journal of Advanced Science and Technology, Vol. 28, No. 6, (2019), pp. 68-75.
[2] http://sam-berbagi.blogspot.com/2013/08/ancaman-dan-kelemahan-keamanan-sistem.html
[3] https://www.academia.edu/9760290/keamanan_sistem_informasi
[4] https://www.academia.edu/13063207/Ancaman_keamanan_sistem_informasi
[6] https://media.neliti.com/media/publications/193043-ID-evaluasi-manajemen-keamanan-informasi-me.pdf
[7] https://drive.google.com/file/d/13-fq8nT1s99mk4DvV7TZFYxh0soT75ql/view
[8] https://drive.google.com/file/d/1XRM74RMKIpxtuvTeJDYlNBlBDxwvpkD_/view
[9] https://www.nesabamedia.com/pengertian-firewall-dan-fungsi-firewall/
[10] http://ejurnal.its.ac.id/index.php/teknik/article/download/8289/2085
[11] Badawi, H., Abass, M., Hamam, O., Diab, M., El Said, M., Ismail, A., Badawy, A., Mostafa, G., Samir, S., ElDabaa, E., Saber, M. Molecular and in-situ hybridization detection of human papillomavirus genotypes among Egyptian patients with bladder cancer (2018), International Journal of Pharmaceutical Research, 10(4), pp. 402-405. https://www.scopus.com/inward/record.uri?eid=2-s2.0-
85062655664&doi=10.31838%2fijpr%2f2018.10.04.056&partnerID=40&md5=671f4d1a022e6ddf8b334a66602038b6
[12] M. S. Neeharika, b. Jeevana jyothi (2015) chronotherapeutics: an optimizing approach to synchronize drug delivery with circadian rhythm. Journal of Critical Reviews, 2 (4), 31-40.
[13] P. K. Lakshmi, B. Kalpana, and D. Prasanthi. "Invasomes: Novel Vesicular Carriers for Enhanced Skin Permeation." Systematic Reviews in Pharmacy 4.1 (2013), 26-30. Print. doi:10.4103/0975-8453.135837
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.