ANALISIS JAMINAN KUALITAS SISTEM KEAMANAN SIBER PADA SISTEM INFORMASI : SEBUAH STUDI LITERATUR
DOI:
https://doi.org/10.5281/zenodo.14715042Keywords:
Analisis, Jaminan , Kualitas, Keamanan, SiberAbstract
Perkembangan teknologi informasi saat ini yang semakin pesat, diiringi dengan serangan siber yang semakin marak terjadi pada sektor publik atau pemerintahan. Serangan tersebut mengakibatkan sejumlah kerugian materi maupun kerusakan infrastruktur atau informasi suatu organisasi, untuk mencegah ancaman siber tersebut, dibutuhkan penjaminan kualitas untuk melindungi informasi dengan melakukan penjagaan terhadap data agar tidak mudah diakses oleh orang yang tidak berkepentingan atau informasi yang disimpan masih terjaga keaslian dan kerahasiaannya. Penjagaan serangan siber dilakukan dengan menggunakan arsitektur TISA (Trust Information Security Architecture) yang terdiri dari tahapan perlindungan data, aturan keamanan informasi, dan prosedur keamanan. Penerapan arsitektur tersebut diselaraskan dengan kriteria kualitas pada sistem untuk menjamin keamanan yang baik berdasarkan framework penjaminan keamanan yang disesuaikan dengan permasalahan keamanan yang terjadi.
Downloads
References
Al-Kasasbeh, B. (2022). Model of the information security protection subsystem operation and
method of optimization of its composition. Egyptian Informatics Journal, 23(3), 511–516.
https://doi.org/10.1016/j.eij.2022.05.003
Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multiagent
systems. Artificial
Intelligence Review, 42(4), 607–636.
https://doi.org/10.1007/s10462-012-9343-1
Cherdantseva, Y., & Hilton, J. (2013). Information security and information assurance:
Discussion about the meaning, scope, and goals. In Organizational, Legal, and
Technological Dimensions of Information System Administration (pp. 167–198). IGI
Global. https://doi.org/10.4018/978-1-4666-4526-4.ch010
Choi, W., & Yoo, D. (2009). Software assurance towards better IT service. Journal of Service
Science, 1(1), 31–56. https://doi.org/10.1007/s12927-009-0003-1 Conrad, E., Misenar, S., & Feldman, J. (2023). Chapter 8 - Domain 7: Security Operations. In E.Conrad, S. Misenar, & J. Feldman (Eds.), CISSP® Study Guide (Fourth Edition) (FourtEdition, pp. 361–457). Syngress. https://doi.org/https://doi.org/10.1016/B978-0-44318734-6.00006-4
de Oliveira Albuquerque, R., García Villalba, L. J., Sandoval Orozco, A. L., Buiati, F., & KimT. H. (2014). A layered trust information security architecture. Sensors (Switzerland)14(12), 22754–22772. https://doi.org/10.3390/s141222754
Ganji, D., Kalloniatis, C., Mouratidis, H., & Gheytassi, S. M. (2019). Approaches to Develop anImplement ISO/IEC 27001 Standard-Information Security Management Systems: Systematic Literature Review. www.iaria.org
Guide for conducting risk assessments. (2012). https://doi.org/10.6028/NIST.SP.800-30r1
Guo, K. H. (2013). Security-related behavior in using information systems in the workplace: Areview and synthesis. In Computers and Security (Vol. 32, pp. 242–251). Elsevier Ltd.https://doi.org/10.1016/j.cose.2012.10.003
Ioannidis, C., Pym, D., & Williams, J. (2012). Information security trade-offs and optimapatching policies. European Journal of Operational Research, 216(2), 434–444https://doi.org/10.1016/j.ejor.2011.05.050
ISACA. (2012). COBIT 5 For Information Security. ISACA.
Jung, C., Rudolph, M., & Schwarz, R. (2011). Security evaluation of service-oriented systemwith an extensible knowledge base. Proceedings of the 2011 6th International Conferencon Availability, Reliability and Security, ARES 2011, 698–703https://doi.org/10.1109/ARES.2011.109
Kalaimannan, E., & Gupta, J. N. D. (2017). The Security Development Lifecycle in the Contexof Accreditation Policies and Standards. In IEEE Security and Privacy (Vol. 15, Issue 1, pp.52–57).
Institute of Electrical and Electronics Engineers
Inc
https://doi.org/10.1109/MSP.2017.14
Klapkiv, L., & Klapkiv, Y. (2018). METHODS FOR THE IDENTIFICATION OF CYBERRISKS: AN ANALYSIS BASED ON PATENT DATA. CBU International ConferencProceedings, 6, 241–246. https://doi.org/10.12955/cbup.v6.1163
Lee, M.-C. (2014). Software Quality Factors and Software Quality Metrics to Enhance SoftwarQuality Assurance. In Original Research Article British Journal of Applied Science &Technology (Vol. 4, Issue 21). www.sciencedomain.org
Marianne Swanson, & Barbara Guttman. (1996). Generally Accepted Principles and Practicesfor Securing Information Technology Systems (14th ed.). U.S. GOVERNMENT PRINTINGOFFICE .
Md Haris Uddin Sharif, & Mehmood Ali Mohammed. (2022). A literature review of financialosses statistics for cyber security and future trend. World Journal of Advanced Researcand Reviews, 15(1), 138–156. https://doi.org/10.30574/wjarr.2022.15.1.0573
Nieles, M., Dempsey, K., & Pillitteri, V. Y. (2017). An introduction to information securityhttps://doi.org/10.6028/NIST.SP.800-12r1
NIST. (2012). Guide for Conducting Risk Assessments. National Institute of Standards andTechnology.
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800
30r1.pdf NIST. (2020). Security and Privacy Controls for Information Systems and Organizations.
National
Institute
of
Standards
and
Technology.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
NIST. (2022, July 13). NIST Risk Management Framework RMF. July 13.
https://csrc.nist.gov/Projects/risk-management
NIST PRIVACY FRAMEWORK: (2020). https://doi.org/10.6028/NIST.CSWP.01162020
Nivedita James. (2023, May 2). 160 Cybersecurity Statistics 2023 [Updated]. Security Audit.
https://www.getastra.com/blog/security-audit/cyber-security-statistics/
Ouedraogo, M., Khadraoui, D., De Remont, B., Dubois, E., & Mouratidis, H. (2008). Deployment
of a Security Assurance Monitoring Framework for Telecommunication Service
Infrastructures on a VoIP Service. 2008 New Technologies, Mobility and Security, 1–5.
https://doi.org/10.1109/NTMS.2008.ECP.38
Paul, P. K., Aithal, S., Profile, S., Bhuimali, A., & Rajamony, R. (n.d.). Cyber Security to
Information Assurance : An Overview Ideal Systems View project Image Analysis View
project. www.jrrset.com
Qadir, S., & Quadri, S. M. K. (2016). Information Availability: An Insight into the Most Important
Attribute of Information Security. Journal of Information Security, 07(03), 185–194.
https://doi.org/10.4236/jis.2016.73014
Radicic, D., & Petković, S. (2023). Impact of digitalization on technological innovations in small
and medium-sized enterprises (SMEs). Technological Forecasting and Social Change, 191,
122474. https://doi.org/https://doi.org/10.1016/j.techfore.2023.122474
Sakthivel, R. K., Nagasubramanian, G., Al-Turjman, F., & Sankayya, M. (2022). Core-level
cybersecurity assurance using cloud-based adaptive machine learning techniques for
manufacturing industry. Transactions on Emerging Telecommunications Technologies,
33(4). https://doi.org/10.1002/ett.3947
Savola, R. M. (2009). Software security assurance of telecommunication systems. 2009
International Conference on Multimedia Computing and Systems, 138–143.
https://doi.org/10.1109/MMCS.2009.5256713
Schultz, E. E., Proctor, R. W., Lien, M.-C., & Salvendy, G. (2001). Usability and Security An
Appraisal of Usability Issues in Information Security Methods. In Computers & Security
(Vol. 20, Issue 7).
Shukla, A., Katt, B., Nweke, L. O., Yeng, P. K., & Weldehawaryat, G. K. (2022). System security
assurance: A systematic literature review. In Computer Science Review (Vol. 45). Elsevier
Ireland Ltd. https://doi.org/10.1016/j.cosrev.2022.100496
Somarakis, I., Smyrlis, M., & Fysarakis, K. (2022). Model-driven Cyber Range Training: A Cyber
Security Assurance Perspective Multi-scale Balance Hypermodel towards early diagnostic
Evaluation and efficient Management plan formulation (EMBalance) (EU F7, 1/12/201331/1/2017)
View
project
Holobalance
View
project
Model-driven
Cyber
Range
Training:
A
Cyber
Security
Assurance
Perspective.
Taherdoost, H. (2022). Understanding Cybersecurity Frameworks and Information Security
Standards—A Review and Comprehensive Overview. In Electronics (Switzerland) (Vol. 11,
Issue 14). MDPI. https://doi.org/10.3390/electronics11142181 U.S General Services Administration. (2023). NIST Cybersecurity Framework (CSF). U.S
GEneral Services Administration. https://www.gsa.gov/technology/technology-productsservices/it-security/nist-cybersecurity-framework-csf
Wawrowski, Ł., Michalak, M., Białas, A., Kurianowicz, R., Sikora, M., Uchroński, M., & Kajzer,
A. (2021). Detecting anomalies and attacks in network traffic monitoring with classification
methods and XAI-based explainability. Procedia Computer Science, 192, 2259–2268.
https://doi.org/https://doi.org/10.1016/j.procs.2021.08.239
Xu, C., & Lin, J. (2009). An object-oriented information system security evaluation method based
on security level distinguishing model. 2009 International Conference on Web Information
Systems and Mining, WISM 2009, 497–500. https://doi.org/10.1109/WISM.2009.106
Yang Guo Ramaswamy Chandramouli, Antwan Clark, Aron Warren, Catherine Hinton,
Purushotham Bangalore, Lowell Wofford, Andrew Prout Albert Reuther, Erik Deumens,
Rickey Gregg Gary Key, Ryan Adamson, & Csilla Farkas. (2023). High-Performance
Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture (Gina M.
Raimondo, Ed.; 223rd ed.). U.S. Department of Commerce .
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Nenden Eva, Rahma Karina, Septiya Mutiara, RD. Rohmat Saedudin (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Share
Most read articles by the same author(s)
- Nenden Eva Meilani Herlina, Sayyid Taufiq Abdulhafizh, Ihfan Aditya Ghafur, RD. Rohmat Saedudin, EVALUATING AND IMPLEMENTING BUSINESS MODEL BASED ON BPEL STRUCTURE: ASYSTEMATIC LITERATURE REVIEW , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 1 (2024): January
- Nicolaus Advendea Prakoso Indaryono, RD. Rohmat Saedudin, Faqih Hamami, COMPARISON ANALYSIS OF RANDOM FOREST AND NAÏVE BAYES ALGORITHMS FORRAINFALL CLASSIFICATION BASED ON CLIMATE IN INDONESIA , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 2 (2024): July
- Muhammad Fauzan Nasrullah, RD. Rohmat Saedudin, Faqih Hamami, COMPARISON ACCURACY OF C4.5 ALGORITHM AND K-NEAREST NEIGHBORS FOR RAINFALL CLASSIFICATION , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 2 (2024): July
Similar Articles
- Samuel Mahesa Sinulingga, Jesen Candra, Johta Sansanda Suntana, Gifaren Permana, Farrel Reyhan Putra, Dewi Setiowati, Studi Pengaruh Kesadaran Keamanan Siber Terhadap Kepercayaan Pengguna dalam Menggunakan SIAKAD Esa Unggul dengan Metode Analisis Deskriptif Kuantitatif , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 4 (2025): October
- Fima Yardhaka Kabira, Bagus Saputro, Dewi Setiowati, Peran Mahasiswa IT dalam Meningkatkan Kesadaran Privasi di Media Sosial pada Era Digital , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 4 (2025): October
- Fannzy Bayu Askar Prajaya, Riko Reky Londong, Syifa Nuurunnisa Wijaksana, ANALISIS PERBANDINGAN SIX SIGMA DAN LEAN MANAGEMENT UNTUK PENINGKATAN KUALITAS OPERASIONAL PADA BIDANG USAHA BERBASIS LAYANAN : A LITERATUR REVIEW , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 1 No. 1 (2024): January
- Muharman Lubis, Rafian Ramadhani, Mochamad Yudha Febrianta, Identifikasi Masalah dan Tantangan dalam Sistem Manajemen Pembelajaran (LMS) Berbasis Mobile di Pendidikan Tinggi , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 1 (2025): January
- Putry Wahyu Setyaningsih, Putri Taqwa Prasetyaningrum, Implementasi Business Intelligence Untuk Menganalisis Jumlah Mahasiswa Baru Tahun 2024 di Universitas Mercu Buana Yogyakarta , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 1 (2025): January
- Cindy Muhdiantini, Mega Fitri Yani, Ilham Auliya Rahman, Ati Maryati, Data Mining Clustering and Correlation Analysis of Marine Potential Insights from Capture Fisheries Coral Reef Quantity and Plankton Abundance , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 1 (2025): January
- Muhammad Dwi Hary Sandy, Pengembangan Aplikasi Laundry Berbasis Android di Wilayah Kota Pekanbaru , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 1 (2025): January
- Ika Putri Puspitsari, Perencanaan Strategi PT. Paragon Technology and Innovation di Era Society 5.0 , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
- Muhammad Arif Zikir Risky Arif, Perancangan Sistem Pemesanan pada Usaha Mikro, Kecil, dan Menengah (UMKM) LA Group Kabupaten Jombang Berbasis Website , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
- Annisa Humairo, Akbar Habib Buana Wibawa Putra, Laily Indaryani, Muharman Lubis, Strategi Terbaik Transfer Pengetahuan dalam K3: Integrasi Teknologi dan Manajemen Pengetahuan , SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan: Vol. 2 No. 3 (2025): July
You may also start an advanced similarity search for this article.