2019 ◽  
Vol 12 (1) ◽  
pp. 51-55
Author(s):  
Nurhafifah Matondang ◽  
Bayu Hananto ◽  
Catur Nugrahaeni

The University has a number of data relating to Academic and Higher Education Governance. The large amount of data that requires security, especially in terms of readiness to secure information systems. Maintaining information system security in the university environment aims to maintain confidentiality, fulfill the availability of the system for those who have authority for those who use it and the integrity of the system. The University of National Development "Veteran" Jakarta has work units such as the Faculty, UPT and Bureau where each has the task and function to manage data. The problem is the need to measure the level of information system security to see the maturity of an information system at UPN Veteran Jakarta. OUR Index stands for Information Security Index which is used as a tool to analyze and measure and evaluate the maturity level of information security with the application of SNI ISO / IEC 27001: 2009 standards that can be applied within government agencies. As for the KAMi index version used, namely version 3.1. The method used to solve the problems in OUR index is through six stages, namely the first stage of electronic systems, both information security governance, third information security risk management, the four information security management frameworks, the five asset information management and the six information security technologies. The results obtained after taking measurements using the US Index need improvement in system security in managing information security risks and governance.


2014 ◽  
Vol 1079-1080 ◽  
pp. 668-671
Author(s):  
Li Zhou

With the rapid development of computer networktechnology, and also can be used as well as the increasing number of users ofcomputer network, how to effectively guarantee the network information securitybecomes a key technology of computer network. This paper through the literatureinvestigation method to build the information system security risk evaluationindex system, and combining the expert evaluation process could not get all theinformation in the information system security, a method of information systemsecurity risk assessment is put forward. Was carried out on the key technologyof information system based on big data discussion and analysis, and brieflyintroduces its development prospects. Secondly illustrates the necessity ofintrusion detection, and the concept of intrusion detection and the model isgiven. Finally summarizes many kinds of intrusion detection method and thesystem structure, discusses the existing problems of this field and theresearch direction in the future.


Sign in / Sign up

Export Citation Format

Share Document