UI - Tesis (Membership) :: Kembali

UI - Tesis (Membership) :: Kembali

Perencanaan kebijakan keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus: Bank XYZ

Aries Fajar Kurnia; Arrianto Mukti Wibowo, supervisor (Fakultas Ilmu Komputer Universitas Indonesia, 2006)
 Abstrak
In this era of digital age where considerable business activities are powered by digital and telecommunication technologies, deriving customer loyalty and satisfaction through delivering high quality services, driven by complex and sophisticated Information Technology (IT) systems, is one of the main services objectives of the Bank towards its customers. From customer services perspective, "availability" is a degree of how closed the Bank is to its customers so that they can "consume" the Bank"s services easily and in preference to its competitors. "Reliability" is the degree of how adequate and responsive the Bank is in meeting its customers" needs. "Confidentiality" is the trust the customers have in the Bank in that their confidential information will not fall into the wrong hands.
Information Technology is one of the means that Bank uses to achieve quality service objectives. Reliance on IT requires an understanding of the importance of IT Security within the IT environments. As business advantages are derived from the use of IT to deliver quality services, critical IT security issues related to the use of IT should be understood and addressed. Safeguarding and protecting security Information systems and assets are prominent issues that all responsible IT users must address. Information is the most valuable assets of the Bank. Adequate resources must be allocated to carry out the safeguarding of Bank"s information assets through enforcing a defined IT Security Policies, Standards and Procedures.
Compliance with international and national standards designed to facilitate the Interchange of data between Banks should be considered by the Bank"s management as part of the strategy for IT Security which helps to enforce and strengthen IT security within an organization.
 File Digital: 8
Shelf
 PA-87-Perencanaan kebijakan-Bibliografi.pdf ::
 PA-87-Perencanaan kebijakan-Metodologi.pdf ::
 PA-87-Perencanaan kebijakan-HA.pdf ::
 PA-87-Perencanaan kebijakan-Literatur.pdf ::
 PA-87-Perencanaan kebijakan-Lampiran.pdf ::
 PA-87-Perencanaan kebijakan-Abstrak.pdf ::
 PA-87-Perencanaan kebijakan-Pendahuluan.pdf ::
 PA-87-Perencanaan kebijakan-Kesimpulan.pdf ::

Catatan : Menu Anggota

 Metadata
No. Panggil : T-Pdf
Nama orang :
Nama orang tambahan :
Nama badan tambahan :
Subjek :
Penerbitan : Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2006
Sumber Pengatalogan :
Tipe Konten :
Tipe Media :
Tipe Carrier :
Deskripsi Fisik : vii, 28 lembar : il. ; lamp. ; 29 cm.
Catatan Bibliografi :
Lembaga Pemilik : Universitas Indonesia
Lokasi : Perpustakaan FASILKOM UI
  • Ketersediaan
  • Ulasan
  • Sampul
No. Panggil No. Barkod Ketersediaan
T-Pdf 15-20-556044415 TERSEDIA
Ulasan:
Tidak ada ulasan pada koleksi ini: 125250