Tata Kelola Keamanan Teknologi Informasi Menggunakan Framework COBIT 5 Fokus Proses DSS05 (Studi Pada RS Bhayangkara Jambi)

Authors

  • Ari Andrianti Universitas Dinamika Bangsa Jambi
  • Lola Yorita Astri Universitas Dinamika Bangsa Jambi

DOI:

https://doi.org/10.33022/ijcs.v9i2.297

Keywords:

governance, security, framework COBIT 5

Abstract

Bhayangkara Jambi Hospital is a hospital that provides health services to the extended POLRI family and the general public. As a hospital that already uses an information system, information security must be maintained. One approach that can minimize attacks on information security is to implement information security governance. The aim of the research is to governance information technology security using COBIT 5. The method of analysis in this study uses the COBIT 5 framework using the DSS05 sub domain and uses the COBIT capability level (level 0-5) method of evaluation results. This study produces recommendations for improvements in information technology security in accordance with the level of capability achieved. The conclusion drawn from this study is the improvement in the level of capability and information security governance recommendations.

References

S. De Haes, W. Van Grembergen, J. Anant, and T. Huygh, Enterprise Governance of Information Technology, Achieving Alignment and Value in Digital Organizations, Third Edition. 2020.

A. Jason, The Basics of Information Security Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd ed. Syngress, 2014.

Y. D. Imany, W. Hayuhardhika, N. Putra, and A. D. Herlambang, “Evaluasi Tata Kelola Keamanan Informasi menggunakan COBIT 5 pada Domain APO13 dan DSS05 ( Studi pada PT Gagas Energi Indonesia ),” vol. 3, no. 6, pp. 5926–5935, 2019.

I. M. M. Matin, A. Arini, and L. K. Wardhani, “Analisis Keamanan Informasi Data Center Menggunakan Cobit 5,” J. Tek. Inform., vol. 10, no. 2, pp. 119–128, 2018, doi: 10.15408/jti.v10i2.7026.

M. Lenawati, W. W. Winarno, and A. Amborowati, “Tata Kelola Keamanan Informasi pada PDAM Menggunakan ISO/IEC 27001:2013 Dan COBIT 5,” Sentra Penelit. Eng. dan Edukasi, vol. 9, no. 1, pp. 44–49, 2017, doi: 10.1007/978-981-10-2618-8_18.

B. Sutomo and M. A. Saputra, “Perancangan tata kelola teknologi informasi pada perguruan tinggi dengan menggunakan framework cobit 5 studi kasus : stmik dharma wacana metro,” J. Sist. Inf. dan Tek. Inform., vol. 1, pp. 28–43, 2017.

ISACA, Enabling Processes. 2012.

ISACA, COBIT 5 For Information Security. 2012.

COBIT 5, “COBIT 5 : Process Reference Guide (Exposure Draft),” USA IT Gov. Inst., p. 224, 2011.

ISACA, COBIT ® Process Assessment Model (PAM): Using COBIT ® 5. 2013.

Downloads

Published

2020-10-29

How to Cite

Andrianti, A., & Astri, L. Y. (2020). Tata Kelola Keamanan Teknologi Informasi Menggunakan Framework COBIT 5 Fokus Proses DSS05 (Studi Pada RS Bhayangkara Jambi). Indonesian Journal of Computer Science, 9(2), 86-95. https://doi.org/10.33022/ijcs.v9i2.297