Risk Assessment on Information Asset an academic Application Using ISO 27001

被引:0
作者
Angraini [1 ]
Megawati [1 ]
Haris, Lukman [1 ]
机构
[1] Islamic State Univ Sultan Syarif Kasim, Dept Informat Syst, Pekanbaru, Riau, Indonesia
来源
2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM) | 2018年
关键词
Risk assessment; Information Asset; risk analysis; Business impact; ISO; 27001; SECURITY; MANAGEMENT; STANDARDS; THREATS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research an assessment of the risk correlated with information security related to assets within an academic application at a university. Universities should value data as a critical asset that influences information security. The aim of this research is to determine risk in information assets and business impact to a university. This research identifies the risk associated with assets categories; then, calculates assets value conforming to criteria confidentiality, integrity, and availability developed by ISO 27001; and finally, creates risk analysis by evaluating the risk levels. This research obtains data using depth interview with executive committee members and questionnaire for staff. The findings from this study suggest that information assets (data user and password) correlate with high-risk levels. They have a problem in information security risk is Poor management, in particular in association with the absence of a systematic process for backup data, no network logging or reporting documentation for an incident and no clear standard operating procedure. This research contribution is that universities can use this knowledge develop better security systems to protect valuable assets.
引用
收藏
页码:568 / 571
页数:4
相关论文
共 21 条
  • [1] Alshitri K. I., 2014, INT C INF SCI APPL I, P1
  • [2] B. S. Institution, 2011, BSI STAND PUBL INF T, pp14
  • [3] Integrating risk management in IT settings from ISO standards and management systems perspectives
    Barafort, Beatrix
    Mesquida, Antoni-Lluis
    Mas, Antonia
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 54 : 176 - 185
  • [4] A formalized approach to the effective selection and evaluation of information security controls
    Barnard, L
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2000, 19 (02) : 185 - 194
  • [5] Behnia A., 2012, SMART COMPUT REV, V2
  • [6] Blokdijk G., IT RISK MANAGEMENT G
  • [7] Human System Interaction with Confident Computing. The Mega Trend
    Chang, Elizabeth
    Dillon, Tharain
    Calder, David
    [J]. 2008 CONFERENCE ON HUMAN SYSTEM INTERACTIONS, VOLS 1 AND 2, 2008, : 1 - 11
  • [8] Farooq A, 2015, INT CONF INTERNET, P280, DOI 10.1109/ICITST.2015.7412106
  • [9] Fenz Stefan, 2014, Information Management & Computer Security, V22, P410, DOI 10.1108/IMCS-07-2013-0053
  • [10] Garnaeva M., 2016, KASPERSKY SECURITY B