ANALISIS JAMINAN KUALITAS SISTEM KEAMANAN SIBER PADA SISTEM INFORMASI : SEBUAH STUDI LITERATUR

Authors

  • Nenden Eva Telkom University, Indonesia Author
  • Rahma Karina Telkom University, Indonesia Author
  • Septiya Mutiara Telkom University, Indonesia Author
  • RD. Rohmat Saedudin Telkom University, Indonesia Author

DOI:

https://doi.org/10.5281/zenodo.14715042

Keywords:

Analisis, Jaminan , Kualitas, Keamanan, Siber

Abstract

Perkembangan teknologi informasi saat ini yang semakin pesat, diiringi dengan serangan siber yang semakin marak terjadi pada sektor publik atau pemerintahan. Serangan tersebut mengakibatkan sejumlah kerugian materi maupun kerusakan infrastruktur atau informasi suatu organisasi, untuk mencegah ancaman siber tersebut, dibutuhkan penjaminan kualitas untuk melindungi informasi dengan melakukan penjagaan terhadap data agar tidak mudah diakses oleh orang yang tidak berkepentingan atau informasi yang disimpan masih terjaga keaslian dan kerahasiaannya. Penjagaan serangan siber dilakukan dengan menggunakan arsitektur TISA (Trust Information Security Architecture) yang terdiri dari tahapan perlindungan data, aturan keamanan informasi, dan prosedur keamanan. Penerapan arsitektur tersebut diselaraskan dengan kriteria kualitas pada sistem untuk menjamin keamanan yang baik berdasarkan framework penjaminan keamanan yang disesuaikan dengan permasalahan keamanan yang terjadi.

Downloads

Download data is not yet available.

References

Al-Kasasbeh, B. (2022). Model of the information security protection subsystem operation and

method of optimization of its composition. Egyptian Informatics Journal, 23(3), 511–516.

https://doi.org/10.1016/j.eij.2022.05.003

Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multiagent

systems. Artificial

Intelligence Review, 42(4), 607–636.

https://doi.org/10.1007/s10462-012-9343-1

Cherdantseva, Y., & Hilton, J. (2013). Information security and information assurance:

Discussion about the meaning, scope, and goals. In Organizational, Legal, and

Technological Dimensions of Information System Administration (pp. 167–198). IGI

Global. https://doi.org/10.4018/978-1-4666-4526-4.ch010

Choi, W., & Yoo, D. (2009). Software assurance towards better IT service. Journal of Service

Science, 1(1), 31–56. https://doi.org/10.1007/s12927-009-0003-1 Conrad, E., Misenar, S., & Feldman, J. (2023). Chapter 8 - Domain 7: Security Operations. In E.Conrad, S. Misenar, & J. Feldman (Eds.), CISSP® Study Guide (Fourth Edition) (FourtEdition, pp. 361–457). Syngress. https://doi.org/https://doi.org/10.1016/B978-0-44318734-6.00006-4

de Oliveira Albuquerque, R., García Villalba, L. J., Sandoval Orozco, A. L., Buiati, F., & KimT. H. (2014). A layered trust information security architecture. Sensors (Switzerland)14(12), 22754–22772. https://doi.org/10.3390/s141222754

Ganji, D., Kalloniatis, C., Mouratidis, H., & Gheytassi, S. M. (2019). Approaches to Develop anImplement ISO/IEC 27001 Standard-Information Security Management Systems: Systematic Literature Review. www.iaria.org

Guide for conducting risk assessments. (2012). https://doi.org/10.6028/NIST.SP.800-30r1

Guo, K. H. (2013). Security-related behavior in using information systems in the workplace: Areview and synthesis. In Computers and Security (Vol. 32, pp. 242–251). Elsevier Ltd.https://doi.org/10.1016/j.cose.2012.10.003

Ioannidis, C., Pym, D., & Williams, J. (2012). Information security trade-offs and optimapatching policies. European Journal of Operational Research, 216(2), 434–444https://doi.org/10.1016/j.ejor.2011.05.050

ISACA. (2012). COBIT 5 For Information Security. ISACA.

Jung, C., Rudolph, M., & Schwarz, R. (2011). Security evaluation of service-oriented systemwith an extensible knowledge base. Proceedings of the 2011 6th International Conferencon Availability, Reliability and Security, ARES 2011, 698–703https://doi.org/10.1109/ARES.2011.109

Kalaimannan, E., & Gupta, J. N. D. (2017). The Security Development Lifecycle in the Contexof Accreditation Policies and Standards. In IEEE Security and Privacy (Vol. 15, Issue 1, pp.52–57).

Institute of Electrical and Electronics Engineers

Inc

https://doi.org/10.1109/MSP.2017.14

Klapkiv, L., & Klapkiv, Y. (2018). METHODS FOR THE IDENTIFICATION OF CYBERRISKS: AN ANALYSIS BASED ON PATENT DATA. CBU International ConferencProceedings, 6, 241–246. https://doi.org/10.12955/cbup.v6.1163

Lee, M.-C. (2014). Software Quality Factors and Software Quality Metrics to Enhance SoftwarQuality Assurance. In Original Research Article British Journal of Applied Science &Technology (Vol. 4, Issue 21). www.sciencedomain.org

Marianne Swanson, & Barbara Guttman. (1996). Generally Accepted Principles and Practicesfor Securing Information Technology Systems (14th ed.). U.S. GOVERNMENT PRINTINGOFFICE .

Md Haris Uddin Sharif, & Mehmood Ali Mohammed. (2022). A literature review of financialosses statistics for cyber security and future trend. World Journal of Advanced Researcand Reviews, 15(1), 138–156. https://doi.org/10.30574/wjarr.2022.15.1.0573

Nieles, M., Dempsey, K., & Pillitteri, V. Y. (2017). An introduction to information securityhttps://doi.org/10.6028/NIST.SP.800-12r1

NIST. (2012). Guide for Conducting Risk Assessments. National Institute of Standards andTechnology.

https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800

30r1.pdf NIST. (2020). Security and Privacy Controls for Information Systems and Organizations.

National

Institute

of

Standards

and

Technology.

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

NIST. (2022, July 13). NIST Risk Management Framework RMF. July 13.

https://csrc.nist.gov/Projects/risk-management

NIST PRIVACY FRAMEWORK: (2020). https://doi.org/10.6028/NIST.CSWP.01162020

Nivedita James. (2023, May 2). 160 Cybersecurity Statistics 2023 [Updated]. Security Audit.

https://www.getastra.com/blog/security-audit/cyber-security-statistics/

Ouedraogo, M., Khadraoui, D., De Remont, B., Dubois, E., & Mouratidis, H. (2008). Deployment

of a Security Assurance Monitoring Framework for Telecommunication Service

Infrastructures on a VoIP Service. 2008 New Technologies, Mobility and Security, 1–5.

https://doi.org/10.1109/NTMS.2008.ECP.38

Paul, P. K., Aithal, S., Profile, S., Bhuimali, A., & Rajamony, R. (n.d.). Cyber Security to

Information Assurance : An Overview Ideal Systems View project Image Analysis View

project. www.jrrset.com

Qadir, S., & Quadri, S. M. K. (2016). Information Availability: An Insight into the Most Important

Attribute of Information Security. Journal of Information Security, 07(03), 185–194.

https://doi.org/10.4236/jis.2016.73014

Radicic, D., & Petković, S. (2023). Impact of digitalization on technological innovations in small

and medium-sized enterprises (SMEs). Technological Forecasting and Social Change, 191,

122474. https://doi.org/https://doi.org/10.1016/j.techfore.2023.122474

Sakthivel, R. K., Nagasubramanian, G., Al-Turjman, F., & Sankayya, M. (2022). Core-level

cybersecurity assurance using cloud-based adaptive machine learning techniques for

manufacturing industry. Transactions on Emerging Telecommunications Technologies,

33(4). https://doi.org/10.1002/ett.3947

Savola, R. M. (2009). Software security assurance of telecommunication systems. 2009

International Conference on Multimedia Computing and Systems, 138–143.

https://doi.org/10.1109/MMCS.2009.5256713

Schultz, E. E., Proctor, R. W., Lien, M.-C., & Salvendy, G. (2001). Usability and Security An

Appraisal of Usability Issues in Information Security Methods. In Computers & Security

(Vol. 20, Issue 7).

Shukla, A., Katt, B., Nweke, L. O., Yeng, P. K., & Weldehawaryat, G. K. (2022). System security

assurance: A systematic literature review. In Computer Science Review (Vol. 45). Elsevier

Ireland Ltd. https://doi.org/10.1016/j.cosrev.2022.100496

Somarakis, I., Smyrlis, M., & Fysarakis, K. (2022). Model-driven Cyber Range Training: A Cyber

Security Assurance Perspective Multi-scale Balance Hypermodel towards early diagnostic

Evaluation and efficient Management plan formulation (EMBalance) (EU F7, 1/12/201331/1/2017)

View

project

Holobalance

View

project

Model-driven

Cyber

Range

Training:

A

Cyber

Security

Assurance

Perspective.

http://www.sphynx.ch

Taherdoost, H. (2022). Understanding Cybersecurity Frameworks and Information Security

Standards—A Review and Comprehensive Overview. In Electronics (Switzerland) (Vol. 11,

Issue 14). MDPI. https://doi.org/10.3390/electronics11142181 U.S General Services Administration. (2023). NIST Cybersecurity Framework (CSF). U.S

GEneral Services Administration. https://www.gsa.gov/technology/technology-productsservices/it-security/nist-cybersecurity-framework-csf

Wawrowski, Ł., Michalak, M., Białas, A., Kurianowicz, R., Sikora, M., Uchroński, M., & Kajzer,

A. (2021). Detecting anomalies and attacks in network traffic monitoring with classification

methods and XAI-based explainability. Procedia Computer Science, 192, 2259–2268.

https://doi.org/https://doi.org/10.1016/j.procs.2021.08.239

Xu, C., & Lin, J. (2009). An object-oriented information system security evaluation method based

on security level distinguishing model. 2009 International Conference on Web Information

Systems and Mining, WISM 2009, 497–500. https://doi.org/10.1109/WISM.2009.106

Yang Guo Ramaswamy Chandramouli, Antwan Clark, Aron Warren, Catherine Hinton,

Purushotham Bangalore, Lowell Wofford, Andrew Prout Albert Reuther, Erik Deumens,

Rickey Gregg Gary Key, Ryan Adamson, & Csilla Farkas. (2023). High-Performance

Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture (Gina M.

Raimondo, Ed.; 223rd ed.). U.S. Department of Commerce .

Downloads

Published

05-02-2025

Issue

Section

Articles

How to Cite

ANALISIS JAMINAN KUALITAS SISTEM KEAMANAN SIBER PADA SISTEM INFORMASI : SEBUAH STUDI LITERATUR. (2025). SITEKNIK: Sistem Informasi, Teknik Dan Teknologi Terapan, 1(2), 76-89. https://doi.org/10.5281/zenodo.14715042

Share

Similar Articles

1-10 of 12

You may also start an advanced similarity search for this article.