Information Security Risk Strategy at PT. X Using NIST SP 800-30

I. G. N. M. Putra Eryawan, Gusti Made Arya Sasmita, A. A. K. Agung Cahyawan Wiranatha
{"title":"Information Security Risk Strategy at PT. X Using NIST SP 800-30","authors":"I. G. N. M. Putra Eryawan, Gusti Made Arya Sasmita, A. A. K. Agung Cahyawan Wiranatha","doi":"10.24843/jim.2021.v09.i03.p03","DOIUrl":null,"url":null,"abstract":"Information security is a vital aspect that must be considered in use of information technology devices by active users. PT. X runs a business that applies information technology related to distribution aspects through company resource planning. Information technology formed assets IT infrastructure, information systems, operating procedures, and network infrastructure. This asset has a potential threat that causes disruption resulting losses. This problem arises to cope through the response to the risk strategy. NIST SP 800-30 method has a flexible risk perspective for the organization and federation standards of American security. Research is divided into risk measurement as a risk, risk mitigation as risk planning, and risk evaluation embodied risk reports. Results of the research show the value of risk through the calculation of the likelihood and impact matrix of the highest threat is at a low level is 14, medium at 12, and high of 4 are categorized good enough. \nKeywords: Risk Strategy, Information Security, NIST SP 800-30, Risk","PeriodicalId":32334,"journal":{"name":"Jurnal Ilmiah Merpati Menara Penelitian Akademika Teknologi Informasi","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Ilmiah Merpati Menara Penelitian Akademika Teknologi Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24843/jim.2021.v09.i03.p03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Information security is a vital aspect that must be considered in use of information technology devices by active users. PT. X runs a business that applies information technology related to distribution aspects through company resource planning. Information technology formed assets IT infrastructure, information systems, operating procedures, and network infrastructure. This asset has a potential threat that causes disruption resulting losses. This problem arises to cope through the response to the risk strategy. NIST SP 800-30 method has a flexible risk perspective for the organization and federation standards of American security. Research is divided into risk measurement as a risk, risk mitigation as risk planning, and risk evaluation embodied risk reports. Results of the research show the value of risk through the calculation of the likelihood and impact matrix of the highest threat is at a low level is 14, medium at 12, and high of 4 are categorized good enough. Keywords: Risk Strategy, Information Security, NIST SP 800-30, Risk
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于NIST SP 800-30的PT. X信息安全风险策略
信息安全是活跃用户在使用信息技术设备时必须考虑的一个重要方面。PT.X经营着一家通过公司资源规划应用与分销相关的信息技术的公司。信息技术形成了资产—IT基础设施、信息系统、操作程序和网络基础设施。该资产具有潜在的威胁,会造成中断造成的损失。这个问题的产生是为了通过对风险策略的反应来应对。NIST SP 800-30方法对美国安全的组织和联邦标准具有灵活的风险视角。研究分为作为风险的风险测量、作为风险规划的风险缓解和包含风险评估的风险报告。研究结果表明,通过计算风险值的可能性和影响矩阵,最高威胁级别为低级别为14,中等级别为12,高级别为4。关键词:风险策略,信息安全,NIST SP 800-30,风险
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
24 weeks
期刊最新文献
Helpdesk Ticket Classification for Technician Assignment Routes Using BiLSTM Development of Service-Oriented Architecture-Based Microservices Management as a Data Integration Service (Case Study: Udayana University) Implementation of a Supply chain Management System Blockchain-Based in Red Onion Farming Data Visualization Of House Of Worship Distribution In The IKN Nusantara Region Using Python Implementation Enterprise Resource Planning Sales and Purchase of Goods Using WebERP Fushia Clothing Store Denpasar
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1