Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : jurnal teknik informatika dan sistem informasi

Tata Kelola pada Perguruan Tinggi Menggunakan Control Objective for Information & Related Technology (COBIT) 5 asriyanik, asriyanik; Hendayun, Mokhamad
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.665

Abstract

A College needs a good governance in implementation of information technology, especially which related with information security because information is an important asset. Framework which can be used for the preparation of information security governance is COBIT 5 from ISACA. The first  step to start the preparation of the governance using COBIT is mapping between the goal of college with enterprise goals (EG), IT Related Goals and domain process COBIT 5. From 15 colleges that have been accredited in West Java (15 Januari 2015), produced 13 EG related for college accreditation A, B and 10 for college accreditation EG C. For a sample in process capability assessment of information security governance, we used Universitas Muhammadiyah Sukabumi (UMMI) as the research object, which is an accredited college C, and EG focused on optimization of business process functionality associated with the alignment of IT goals of IT and business strategy, and 10 processes, i.e EDM01, EDM01, APO01, APO02, APO03, APO05, APO07, APO08, BAI01, BAI02. From the results obtained capability assessment process UMMI value of 7 is on level 0, ie the value of the attribute <15-50% and 3 process closer to fulfillment level 1, ie the interval> 50-85%. Gap analysis results, it turns out that making such UMMI lack of work products (evidence / result) of activities of governance processes deemed to have been executed. To meet the achievement level, it is recommended to perform compliance on each best practice and work products, and can be initiated by creating a guide to information security.
Manajemen Risiko Keamanan Informasi Menggunakan ISO 27005:2011 pada Sistem Informasi Akademik (SIAK) Universitas Muhammadiyah Sukabumi (UMMI) Asriyanik, Asriyanik; Prajoko, Prajoko
Jurnal Teknik Informatika dan Sistem Informasi Vol 4 No 2 (2018): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (623.804 KB)

Abstract

Information security is an important part of an academic information system, including Muhammadiyah University of Sukabumi (UMMI). Information security is conducted to protect UMMI assets, especially data and information. Data and information have become an important asset in an organization because it relates to the image of the organization. At this time academic information system at UMMI is built online, causing various threats that may occur. Threats can arise inside or outside. If the threat occurs then the information security aspect will be disrupted and enable the disruption of business process on academic information system of UMMI. The likelihood of this threat is called risk. To minimize losses from risks, risk management should be done well. The risk management method used in risk management in the academic information system of UMMI is ISO 27005. The selection of this method to facilitate the development in the next stage of information security management system on UMMI Academic Information System uses ISO 27000 series. Data collection is done by interview and discussion. The risk management process under ISO 27005 includes four main steps: scope determination, risk assessment, risk treatment and risk acceptance. The result of the risk assessment found 73 possible threat scenarios divided into 3 risk levels, which were 2 low risks, 64 medium risks and 7 high risks. Out of 73 threat scenarios, 47 were made to risk treatment planning. Results of the risk treatment plan, 19 modified risks, 1 risk transferred and 27 risks could be avoided. This risk treatment plan is a recommendation for the leadership of UMMI to conduct risk management.
Implementasi Algoritma Apriori Pada Penyusunan Menu Makanan Rumah Makan Prasmanan Kusdinar, Asep Budiman; Riyadi, Daris; Asriyanik, Asriyanik
Jurnal Teknik Informatika dan Sistem Informasi Vol 6 No 2 (2020): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v6i2.2742

Abstract

A buffet restaurant is a restaurant that provides buffet food that is served directly at the dining table so that customers can order more food according to their needs. This study uses the association rule method which is one of the methods of data mining and a priori algorithms. Data mining is the process of discovering patterns or rules in data, in which the process must be automatic or semi-automatic. Association rules are one of the techniques of data mining that is used to look for relationships between items in a dataset. While the apriori algorithm is a very well-known algorithm for finding high-frequency patterns, this a priori algorithm is a type of association rule in data mining. High- frequency patterns are patterns of items in the database that have frequencies or support. This high-frequency pattern is used to develop rules and also some other data mining techniques. The composition of the food menu in the Asgar restaurant is now arranged randomly without being prepared on the food menu between one another. The result of this research is to support the composition of the food menu at the Asgar restaurant so that it is easier to take food menu with one another.