[PDF][PDF] Causes of Ineffective Implementation of It Governance in Risk Management: a Systematic Literature Review
AES Setyadji, ARR Putrananda… - … (Jurnal Informatika dan …, 2023 - academia.edu
Abstract Information Technology Governance is currently widely implemented in companies.
One of the domains that can be of concern is risk management. The application of TKTI in …
One of the domains that can be of concern is risk management. The application of TKTI in …
[PDF][PDF] Analisis Kualitas Keamanan Sistem Informasi E-Office Berbasis Website Pada STMIK Rosma Dengan Menggunakan OWASP Top 10
Y Yudiana, A Elanda, RL Buana - CESS (Journal of Computer …, 2021 - academia.edu
STMIK ROSMA Karawang telah menerapkan pengarsipan dokumen surat di kampus, yang
mana kesemuanya diatur secara daring (online) menggunakan sistem informasi e-office …
mana kesemuanya diatur secara daring (online) menggunakan sistem informasi e-office …
Remanajemen Jaringan Menggunakan Framework NIST Pada Perpustakaan Daerah Provinsi Sumatera Selatan
CR Simanjuntak, SA Pratama… - Jurnal Teknologi Sistem …, 2023 - jurnal.mdp.ac.id
NIST singkatan dari National Institute of Standards and Technology, yaitu lembaga
pemerintah federal Amerika Serikat yang bertanggung jawab untuk mengembangkan …
pemerintah federal Amerika Serikat yang bertanggung jawab untuk mengembangkan …
[PDF][PDF] Analisis manajemen risiko keamanan jaringan menggunakan framework nist
F Panjaitan, A Aprilo - Jurnal Ilmiah MATRIK, 2022 - academia.edu
Keamanan suatu jaringan komputer sangat penting bagi suatu jaringan komputer, karena
jika terjadi sesuatu maka dapat dimanfaatkan serangan atau penyusupan ke dalam jaringan …
jika terjadi sesuatu maka dapat dimanfaatkan serangan atau penyusupan ke dalam jaringan …
Information Security Evaluation at Hospital Using Index KAMI 5.0 and Recommendations Based on ISO/IEC 27001: 2022
INAA Wibawa, AANH Susila… - Journal of Information …, 2024 - journal-isi.org
Abstract Bali Mandara Regional Hospital integrates information technology into its
healthcare services, but ransomware attacks pose significant risks to data security. In …
healthcare services, but ransomware attacks pose significant risks to data security. In …
Information Security Evaluation Using Case Study Information Security Index on Licensing Portal Applications
There's a lot of cyber attacks going on right now, so the Ministry of Public Works and
People's Housing (PUPR) has to get serious about preventing them. One of the information …
People's Housing (PUPR) has to get serious about preventing them. One of the information …
Penilaian risiko keamanan siber kampus menggunakan framework cybersecurity NIST 1.1
E Handoyo, IE Nigrum - Jurnal CoSciTech (Computer Science and …, 2023 - ejurnal.umri.ac.id
Abstract The Industrial Revolution 4.0 forced institutions and companies to start improving
the implementation of information technology to be able to compete well. The campus is one …
the implementation of information technology to be able to compete well. The campus is one …
TINJAUAN IMPLEMENTASI NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) DALAM MENINGKATKAN KEAMANAN JARINGAN DENGAN …
R Windari, S Sriyanto - JURNAL ILMU KOMPUTER, SISTEM …, 2024 - jurnal.akommedia.net
Penelitian ini menyelidiki penerapan Kerangka Kerja Keamanan Siber (CSF) dari National
Institute of Standards and Technology (NIST) untuk meningkatkan keamanan jaringan di …
Institute of Standards and Technology (NIST) untuk meningkatkan keamanan jaringan di …
[CITAAT][C] Comparative Analysis of Cybersecurity Maturity Frameworks: NIST-CSF and C2M2
FW Zakiy, ND Angresti - JOISTECH: Journal of Information System and …, 2024