Kajian Keamanan Sistem Informasi Akademik Menggunakan Framework COBIT 5
DOI:
https://doi.org/10.30989/teknomatika.v17i1.1330Keywords:
Keamanan, Sistem Informasi, COBIT 5, Evaluasi, Tingkat KematanganAbstract
This study examines the security of academic information systems using the COBIT 5 Framework. Key issues are uncertainty in protecting student and staff data, the potential for cyberattack vulnerabilities, and non-compliance with international security standards. The goal is to evaluate the security level of the system and suggest improvement recommendations according to COBIT 5 principles. Research methods include Renstar IT policy analysis, system audits, and interviews with IT personnel and related academic communities. Data is analyzed quantitatively to identify weaknesses and opportunities for improvement. The COBIT 5 framework is used as a security assessment framework. The results highlight the need for improvement, including access management, activity monitoring, and continuous improvement plans. Using COBIT 5, substantial measures such as strengthening access controls and developing disaster recovery plans can be identified. The research emphasizes the importance of a structured approach in improving the security of academic information systems, with COBIT 5 as a useful tool. With the right measures, system security can be enhanced to protect the integrity, confidentiality, and availability of critical data for educational institutions. In conclusion, these measures demonstrate how important COBIT 5 implementation is in addressing information security challenges in academic environments.
References
R. Diesch, M. Pfaff, and H. Krcmar, “A comprehensive model of information security factors for decision-makers,” Comput. Secur., vol. 92, p. 101747, May 2020, doi: 10.1016/j.cose.2020.101747.
G. Morris William Tangka, A. Tanny Liem, and J. Yuan Mambu, “Information Technology Governance Audit Using the COBIT 5 Framework at XYZ University,” in 2020 2nd International Conference on Cybernetics and Intelligent System (ICORIS), Manado, Indonesia: IEEE, Oct. 2020, pp. 1–5. doi: 10.1109/ICORIS50180.2020.9320803.
B. Widjajanto, D. Agustini Santoso, and N. Riiati, “Alignment Model of Quality Assurance System of Higher Education And Performance Measurement Based on on Framework CobiT 5,” in 2018 International Seminar on Application for Technology of Information and Communication, Semarang: IEEE, Sep. 2018, pp. 207–213. doi: 10.1109/ISEMANTIC.2018.8549728.
S. Hartono, R. Tjahyadi, and C. Cassandra, “Analysis of Trouble Ticket System Using COBIT 5 Framework (A Case Study Approach),” in 2019 International Conference on Information Management and Technology (ICIMTech), Jakarta/Bali, Indonesia: IEEE, Aug. 2019, pp. 420–425. doi: 10.1109/ICIMTech.2019.8843709.
U. Noor and A. Ghazanfar, “A survey revealing path towards service life cycle management in COBIT 5,” in 2016 Eleventh International Conference on Digital Information Management (ICDIM), Porto, Portugal: IEEE, Sep. 2016, pp. 68–73. doi: 10.1109/ICDIM.2016.7829754.
Fitroh, S. P. Nur Amalia, and S. Ratnawati, “Assessment of The Effectiveness of Internal Controls in an Organization Based on COBIT 5 Framework Case Study: State-Owned Enterprises,” in 2019 7th International Conference on Cyber and IT Service Management (CITSM), Jakarta, Indonesia: IEEE, Nov. 2019, pp. 1–5. doi: 10.1109/CITSM47753.2019.8965409.
N. F. Saragih, C. Sagala, I. S. Dumayanti, I. K. Jaya, E. Rajagukguk, and A. Gea, “Evaluation of Employee Attendance System Using COBIT 5 Framework,” in 2019 International Conference of Computer Science and Information Technology (ICoSNIKOM), Medan, Indonesia: IEEE, Nov. 2019, pp. 1–4. doi: 10.1109/ICoSNIKOM48755.2019.9111589.
B. Bugin, “Metodologi penelitian kualitatif.” [Online]. Available: https://scholar.google.com/scholar?cluster=10451811250019784556&hl=en&as_sdt=2005&sciodt=2007
Y. A. Susanto, W. W. Winarno, and E. Pramono, “Perancangan Tata Kelola Keamanan Jaringan Dengan Framework Cobit Dan Iso 27001:2005”.
H. Nugroho and K. Surendro, “Main and support enablers of vocational higher education governance,” in 2014 2nd International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia: IEEE, May 2014, pp. 276–281. doi: 10.1109/ICoICT.2014.6914079.
P. Kusumah, S. Sutikno, and Y. Rosmansyah, “Model design of information security governance assessment with collaborative integration of COBIT 5 and ITIL (case study: INTRAC),” Proc. - 2014 Int. Conf. ICT Smart Soc. Smart Syst. Platf. Dev. City Soc. GoeSmart 2014 ICISS 2014, pp. 1–6, 2014, doi: 10.1109/ICTSS.2014.7013193.
Isaca, P. Copy, and R. R. Sabilillah, “COBIT Self-assessment Guide: Using COBIT 5,” 2013.