Information Security Evaluation of Data Centre Architecture Using COBIT 5
DOI:
10.33395/sinkron.v9i1.13224Keywords:
APO13, COBIT 5, Data Center, DSS05, EDMAbstract
Pusat Teknologi Informasi dan Pangkalan Data (Pustipanda) UIN Jakarta is an institution in charge of managing all information systems and data management for UIN Jakarta. However, security issues are still one of the problems faced by Pustipanda today, such as data leaks, and websites that are often problematic. This research aims to assess the level of information security at the UIN Jakarta Pustipanda data centre using the COBIT 5 framework. Information security is very important in supporting organizational operations, especially facing cyber threats in the data centre environment. The research approach included document analysis, observation, and interviews with stakeholders at Pustipanda UIN Jakarta. Identification of information security weaknesses, assessment of compliance with security standards, and design of appropriate solutions are the subject of the research. It is hoped that the results will provide a comprehensive picture of information security in the data centre as well as concrete recommendations for improvement. The results of the research include an understanding of the status of information security at Pustipanda UIN Jakarta, as well as guidelines for improving information security in accordance with COBIT 5 principles. These efforts aim to reduce risk and protect the integrity, confidentiality, and availability of data in the data centre environment
Downloads
References
Andry, J.F, & Christianto, K. 2018. Audit Menggunakan COBIT 4.1 dan COBIT 5 Dengan Case Study. Yogyakarta: Teknosian
Aritonang, i. J. (2018). Audit keamanan sistem informasi menggunakan framework COBIT 5 (apo13). Information technology engineering journals, 3(2), 5.
Ciptaningrum, d., nugroho, e., & adhipta, d.(2015). Audit keamanan sistem informasi pada kantor pemerintah kota yogyakarta menggunakan cobit, 5, 10
CNSS. (2010). National Information Assurance (IA) glossary. The National Security Systems Instruction, (4009), 103
Creswell, JW (2014). Desain Penelitian: Pendekatan Metode Kualitatif, Kuantitatif dan Campuran (edisi ke-4). Thousand Oaks, CA: Sage.
Greene, F & CISSP (2015). Selected COBIT 5 Processes for Essential Enterprise Security. ISACA.
ISACA. (2012). "COBIT 5: A Business Framework for the Governance and Management of Enterprise IT." USA: ISACA.
ISACA 2012 COBIT 5.0 Enabling Process ISACA
J. W. Creswell, “Research Design: Qualitative, Quantitative, and Mixed Methods Approaches,” 4 th ed. Thousand Oaks, CA: Sage, 2014.
Matin, i. M. M., arini, a., & wardhani, l. K. (2018). Analisis keamanan informasi data center menggunakan cobit 5. Jurnal teknik informatika, 10(2), 119–128. Https://doi.org/10.15408/jti.v10i2.7026
Menkominfo. Peraturan Menteri Komunikasi dan Informatika Republik Indonesia: Pedoman Teknis Pusat Data (2013).
NIST. (2013). Glossary of Key Information Security Terms Glossary of Key Information Security Terms. Nist, NISTIR 729(Revision 2).
Santana, G. A. A. (2013). Data center virtualization fundamentals.
Tristiyanto. Octaria, C. (2019). IT Governance Audit at Lampung University Using COBIT 5 Framework Focus on EDM Domain. Journal of Physics: Conference Series.
Zulhuda, S. (2010). Information Security from an Islamic Perspective. International Journal of Innovation in the Digital Economy, 1(4), 1-14.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2023 Nurbojatmiko, Muhammad Shidqa Irahman, Ainun Nashikha, Raihan Lail Ramadhan
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.