Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika)

ANALYSIS AND DESIGN OF IT PROCUREMENT COMPANY ENTERPRISE ARCHITECTURE USING TOGAF ARCHITECTURE DEVELOPMENT METHOD (CASE STUDY: PT MITRA TELEMATIKA UTAMA) M Alvie Helmuzar; Rahmat Yasirandi; Rio Guntur Utomo
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 7, No 4 (2022)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v7i4.3247

Abstract

Business processes in the business world require companies to be able to manage information properly and the information needs of each interested party can be met quickly and accurately. The development of EA (Enterprise Architecture) in the company is a complex and challenging job. PT Mitra Telematika Utama has problems with accounting activities and bookkeeping activities. Planning the organizational information system architecture is a complex process, so the planning process must be managed with clear guidelines that aim to align the organization's business technology and public strategy to create maximum results for the organization. Designing an enterprise architecture model requires a framework to manage complex systems and align business with information technology that will be developed within the organization. TOGAF is a framework developed by The Open Group from 1995 to the present. TOGAF provides methods and tools used in planning, creating, designing, and managing the development and implementation of enterprise architecture. TOGAF provides a detailed method on how to build and manage and implement enterprise architecture and information systems called ADM (Architecture Development Method). TOGAF provides methods and tools used in planning, creating, designing, and managing the development and implementation of enterprise architecture. TOGAF provides a detailed method on how to build and manage and implement enterprise architecture and information systems called ADM (Architecture Development Method). TOGAF provides methods and tools used in planning, creating, designing, and managing the development and implementation of enterprise architecture. TOGAF provides a detailed method on how to build and manage and implement enterprise architecture and information systems called ADM (Architecture Development Method). So in planning the enterprise architecture, TOGAF ADM produces application architecture blueprints, business architectures, technology architectures, data architectures, and implementation roadmaps where these blueprints are useful as a reference when developing an enterprise architecture in this case at PT. Mitra Telematika Utama.          
ANALYSIS OF RELIGIOUS COURT INFORMATION SECURITY RISK MANAGEMENT USING THE OCTAVE ALLEGRO METHOD (CASE STUDY OF KEDIRI CITY) Cintya Risquna Risquna; Rahmat Yasirandi; Rio Guntur Utomo
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 7, No 4 (2022)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v7i4.3213

Abstract

Ease of access can be pros and cons for all information system applications, because it increases the possibility of someone hacking the information system. Therefore, a risk assessment or risk assessment of information systems is needed to identify and understand the risks involved in accessing them. One of the risk assessment methods that analyzes the risk profile of information assets using the OCTAVE Allegro method. The purpose of this study was to determine the results of the analysis of security risk management on information systems at the Religious Courts of the City of Kediri. The recommendation process is a follow-up to the risk assessment in the form of controls in ISO/IEC 27002:2013 which focuses on clause 9. Access Control. This research uses a literature study approach . The literature review was carried out by looking for references to information security risk management analysis using the OCTAVE Allegro method, research material books and research journals to assist in the preparation of this research proposal. The theory taken from the reference mainly refers to the OCTAVE Allegro method. Based on the results of the research conducted, the researchers got 10 areas of attention that will be given control recommendations based on ISO/IEC 27002:2013.