EVALUASI KEAMANAN INFORMASI PADA SMAN 1TANGGAMUS MENGGUNAKAN INDEKS KAMI VERSI 4.2

  • Muhammad said hasibuan Institute Informatics and Business Darmajaya
  • Rizky Yulizar Rahman Institut Bisnis dan Informatika Darmajaya Lampung
Keywords: KAMI Index Versi 4.2, Security, Information Technology, Evaluation, information

Abstract

 

The importance of the process of evaluating information system security for a company, organization, or government agency whose goal is to carry out early detection of information leaks and even disruption of information systems. In this research conducted at SMAN 1 XYZ. The research being conducted was to determine the level of readiness and governance of information security based on ISO/IEC 27001:2013 standardization by using tools, namely the KAMI Information Security Index Version 4.2. In this research the method used to carry out the data collection process is to make direct observations on the objects used as research and questions and answers with the IT department that handles related information systems. Based on the research conducted, it was found that the maturity level of information security is that at the level of need for electronic devices, a score of 20 points is in line with the high KAMI index and is still Level I to Level II. Even though the result of the readiness assessment has a value of 245, this is a safety level of 1 which applies to SMAN 1 XYZ. To achieve a qualification level in accordance with the ISO/IEC 27001: 2013 standard, SMAN 1 XYZ must improve information security internally and externally, in this case external parties, and carry out security assessments on an ongoing and continuous basis.

Downloads

Download data is not yet available.

References

[1] S. Paramita, S. A. Siregar, R. A. Damanik, and ..., “Analisis Manejemen Resiko Keamanan Data Sistem Informasi Berdasarkan Indeks Keamanan Informasi (KAMI) ISO 27001: 2013,” Bull. Inf. …, vol. 3, no. 4, pp. 374–379, 2022, [Online]. Available: https://journal.fkpt.org/index.php/BIT/article/view/421%0Ahttps://journal.fkpt.org/index.php/BIT/article/download/421/263.
[2] I. W. Wulandari and H. Hwihanus, “Peran Sistem Informasi Akuntansi Dalam Pengaplikasian Enkripsi Terhadap Peningkatan Keamanan Perusahaan,” J. Kaji. dan Penal. …, vol. 1, no. 1, 2023, [Online]. Available: https://jurnal.aksaraglobal.co.id/index.php/jkpim/article/view/46%0Ahttps://jurnal.aksaraglobal.co.id/index.php/jkpim/article/download/46/34.
[3] S. Nurul, S. Anggrainy, and S. Aprelyani, “Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi : Keamanan Informasi , Teknologi Informasi Dan Network ( Literature Review Sim ),” J. Ekon. Manaj. Sist. Inf., vol. Vol. 3, no. No. 5, pp. 564–573, 2022.
[4] D. Darwis, N. Y. Solehah, and Dartono, “Penerapan Framework COBIT 5 untuk audit tata kelola keamanan informasi pada Kantor Wilayah Kementerian Agama Provinsi Lampung,” TELEFORTECH J. Telemat. Inf. Technol., vol. 1, no. 2, pp. 38–45, 2021.
[5] T. T. Wulansari and D. Novandi, “Evaluation of Information Security Management Using the KAMI Index Framework,” 2022 Int. Conf. Sci. Inf. Technol. Smart Adm. ICSINTESA 2022, vol. 11, no. 1, pp. 173–177, 2022, doi: 10.1109/ICSINTESA56431.2022.10041714.
[6] R. Adi, P. Pratama, R. Sengkey, and C. Punusingon, “Analisis Keamanan Informasi Pemerintah Kabupaten Minahasa Tenggara Menggunakan Indeks KAMI,” vol. 15, no. 3, pp. 189–198, 2020.
[7] D. D. Prasetyowati, I. Gamayanto, S. Wibowo, and S. Suharnawi, “Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Berdasarkan ISO/IEC 27001:2013 pada Politeknik Ilmu Pelayaran Semarang,” JOINS (Journal Inf. Syst., vol. 4, no. 1, pp. 65–75, 2019, doi: 10.33633/joins.v4i1.2429.
[8] R. C. Annisyah, A. Budiono, and R. Fauzi, “ANALISIS DAN PERANCANGAN MANAJEMEN KEAMANAN INFORMASI DIREKTORAT SISTEM INFORMASI UNIVERSITAS TELKOM DENGAN MENGGUNAKAN INDEKS KEAMANAN INFORMASI (KAMI) PADA AREA PENGELOLAAN ASET INFORMASI, TEKNOLOGI DAN KEAMANAN INFORMASI,” vol. 8, no. 2, pp. 2663–2677, 2021.
[9] F. Nasher, “Perancangan Sistem Manajemen Keamanan Informasi Layanan Pengadaan Barang/Jasa Secara Elektronik (Lpse) Di Dinas Komunikasi Dan Informatika Kabupaten Cianjur Dengan Menggunakan Sni Iso/Iec 27001:2013,” Media J. Inform., vol. 10, no. 1, pp. 1–16, 2020, doi: 10.35194/mji.v10i1.465.
[10] A. R. Riswaya, A. Sasongko, and A. Maulana, “EVALUASI TATA KELOLA KEAMANAN TEKNOLOGI INFORMASI MENGGUNAKAN INDEKS KAMI UNTUK PERSIAPAN STANDAR SNI ISO/IEC 27001 (STUDI KASUS: STMIK MARDIRA INDONESIA),” J. Comput. Bisnis, vol. 14, no. 1, pp. 10–18, 2020.
[11] N. D. Ramadhani, W. H. N. Putra, and A. D. Herlambang, “Evaluasi Keamanan Informasi pada Dinas Komunikasi dan Informatika Kabupaten Malang menggunakan Indeks KAMI (Keamanan Informasi),” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 5, pp. 1490–1498, 2020, [Online]. Available: https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/7259.
[12] R. Dewantara and B. Sugiantoro, “Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta),” J. Teknol. Inf. dan Ilmu Komput., vol. 8, no. 6, p. 1137, 2021, doi: 10.25126/jtiik.2021863123.
[13] D. I. Khamil, “Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Kami 4.2 dan ISO/IEC 27001:2013 (Studi Kasus : Diskominfo Kabupaten Gianyar),” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 9, no. 3, pp. 1948–1960, 2022, doi: 10.35957/jatisi.v9i3.2310.
[14] “BSSN,” Indeks KAMI Versi 4.2. 2023, [Online]. Available: https://bssn.go.id/indeks-kami/.
[15] F. A. Basyarahil, H. M. Astuti, and B. C. Hidayanto, “Evaluasi Manajemen Keamanan Informasi pada DPTSI ITS Surabaya,” J. Tek. Its, vol. 6, no. 1, pp. 122–128, 2017, [Online]. Available: https://www.neliti.com/publications/193043/evaluasi-manajemen-keamanan-informasi-menggunakan-indeks-keamanan-informasi-kami.
Published
2023-08-18
Abstract views: 228 , Pdf downloads: 209