I. G. N. M. Putra Eryawan, Gusti Made Arya Sasmita, A. A. K. Agung Cahyawan Wiranatha
{"title":"Information Security Risk Strategy at PT. X Using NIST SP 800-30","authors":"I. G. N. M. Putra Eryawan, Gusti Made Arya Sasmita, A. A. K. Agung Cahyawan Wiranatha","doi":"10.24843/jim.2021.v09.i03.p03","DOIUrl":null,"url":null,"abstract":"Information security is a vital aspect that must be considered in use of information technology devices by active users. PT. X runs a business that applies information technology related to distribution aspects through company resource planning. Information technology formed assets IT infrastructure, information systems, operating procedures, and network infrastructure. This asset has a potential threat that causes disruption resulting losses. This problem arises to cope through the response to the risk strategy. NIST SP 800-30 method has a flexible risk perspective for the organization and federation standards of American security. Research is divided into risk measurement as a risk, risk mitigation as risk planning, and risk evaluation embodied risk reports. Results of the research show the value of risk through the calculation of the likelihood and impact matrix of the highest threat is at a low level is 14, medium at 12, and high of 4 are categorized good enough. \nKeywords: Risk Strategy, Information Security, NIST SP 800-30, Risk","PeriodicalId":32334,"journal":{"name":"Jurnal Ilmiah Merpati Menara Penelitian Akademika Teknologi Informasi","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Ilmiah Merpati Menara Penelitian Akademika Teknologi Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24843/jim.2021.v09.i03.p03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Information security is a vital aspect that must be considered in use of information technology devices by active users. PT. X runs a business that applies information technology related to distribution aspects through company resource planning. Information technology formed assets IT infrastructure, information systems, operating procedures, and network infrastructure. This asset has a potential threat that causes disruption resulting losses. This problem arises to cope through the response to the risk strategy. NIST SP 800-30 method has a flexible risk perspective for the organization and federation standards of American security. Research is divided into risk measurement as a risk, risk mitigation as risk planning, and risk evaluation embodied risk reports. Results of the research show the value of risk through the calculation of the likelihood and impact matrix of the highest threat is at a low level is 14, medium at 12, and high of 4 are categorized good enough.
Keywords: Risk Strategy, Information Security, NIST SP 800-30, Risk