Ditemukan 13652 dokumen yang sesuai dengan query
McCarthy, N.K.
New York: McGraw-Hill, 2012
005.8 MCC c
Buku Teks Universitas Indonesia Library
Johnson III, Leighton R.
"Computer incident response and forensics team management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components."
Waltham, MA: Syngress, 2014
e20426926
eBooks Universitas Indonesia Library
Fajar Hariyanto
"Dalam era digital yang berkembang pesat, ancaman insiden keamanan siber menjadi isu di tingkat global maupun Indonesia. Insiden keamanan siber seperti serangan phishing, ransomware, dan malware telah menyebabkan kerugian finansial serta menurunkan reputasi. Computer Security Incident Response Team (CSIRT) memegang peran penting dalam mendeteksi, merespon, dan menanggulangi insiden keamanan siber. Namun, terdapat permasalahan yang dihadapi yaitu kurangnya tingkat kepercayaan antar CSIRT terhadap mekanisme berbagi informasi keamanan siber yang aman dan efektif. Penelitian ini bertujuan untuk merancang dan mengevaluasi mekanisme berbagi informasi keamanan siber antar CSIRT di Indonesia. Mekanisme tersebut memanfaatkan teknologi blockchain yaitu Hyperledger Composer yang diintegrasikan dengan Interplanetary File System (IPFS) dan Traffic Light Protocol (TLP). Metode penelitian mencakup desain mekanisme berbagi informasi, simulasi implementasi, dan evaluasi performa. Pengujian performa menunjukkan bahwa latency rata-rata untuk proses unggah adalah 120 ms dan untuk unduh adalah 150 ms, dengan throughput rata-rata masing-masing 500 KB/s dan 480 KB/s. Penerapan standar TLP juga berkontribusi dalam mengatur dan mengendalikan aliran informasi serta batasan distribusinya. Penelitian ini memiliki peran dalam memberikan solusi inovatif berbagi informasi keamanan siber antar CSIRT di Indonesia yang belum banyak dieksplorasi. Selain itu, penelitian ini juga memberikan referensi mengenai pemanfaatan teknologi blockchain untuk meningkatkan keamanan siber.
In the rapidly evolving digital era, the threat of cyber security incidents has become a significant issue both globally and in Indonesia. Cyber security incidents such as phishing attacks, ransomware, and malware have caused financial losses and damaged reputations. The Computer Security Incident Response Team (CSIRT) plays a crucial role in detecting, responding to, and mitigating cyber security incidents. However, a key challenge faced is the lack of trust among CSIRTs regarding a secure and effective mechanism for sharing cyber security information. This research aims to design and evaluate a mechanism for sharing cyber security information among CSIRTs in Indonesia. The mechanism utilizes blockchain technology, specifically Hyperledger Composer, integrated with the Interplanetary File System (IPFS) and the Traffic Light Protocol (TLP). The research methodology includes designing the information-sharing mechanism, implementing simulations, and evaluating performance. Performance testing showed that the average latency for the upload process is 120 ms and for the download process is 150 ms, with average throughputs of 500 KB/s and 480 KB/s, respectively. The implementation of the TLP standard also contributes to regulating and controlling the flow of information and its distribution boundaries. This research provides an innovative solution for sharing cyber security information among CSIRTs in Indonesia, an area that has not been extensively explored. Additionally, this study offers a reference on the utilization of blockchain technology to enhance cyber security."
Jakarta: Fakultas Teknik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership Universitas Indonesia Library
Artikel Jurnal Universitas Indonesia Library
Ahmad Budi Setiawan
"Seiring dengan masifnya penggunaan TIK dikalangan instansi Pemerintah, terdapat pula masalah yang muncul di bidang keamanan informasi dalam bentuk insiden keamanan informasi. Untuk menghadapi serangan terhadap keamanan sistem informasi tersebut, Pemerintah perlu membentuk organisasi Pusat Penanganan Insiden Keamanan Informasi Pemerintah. Dalam pembentukan oragnisasi tersebut, Pemerintah memerlukan perencanaan dan arahan strategis agar dapat memenuhi tujuan yang diharapkan. Penelitian ini mengusulkan sebuah rencana strategis pembentukan Pusat Penanganan Insiden Keamanan Informasi Pemerintah. Perencanaan strategis Pusat Penanganan Insiden Keamanan Informasi Pemerintah ini menggunakan metodologi yang dikembangkan oleh Carnegie Mellon University dengan menyesuaikan pada karakteristik organisasi. Pada metodologi tersebut, metodologi yang digunakan dipadu dengan metodologi Perencanaan Strategis Sistem Informasi versi Anita Cassidy dalam tahapan perencanaan infrastruktur SI/TI organisasi dengan mengkombinasikan beberapa alat analisis seperti Critical Success Factor, Value Chain Analysi, dan SWOT Analysis agar dapat memberikan arahan pengembangan system informasi yang sifatnya teknis maupun non teknis berupa kebijakan atau kegiatan manajerial. Hasil dari penelitian ini adalah masukan atau landasan dalam pengembangan Pusat Penanganan Insiden Keamanan Informasi Pemerintah agar dapat mewujudkan pemanfaatan TIK pada Pemerintah yang aman dan nyaman.
Along with the rapidly use of ICT among government agencies, there are also problems that arise in the field of information security in the form of information security incidents. To deal with security attacks on information systems, the Government needs to establish their Government Information Security Incident Response Center. In these organizations of the establishment, the Government requires planning and strategic direction to meet the desired objectives. This research proposes a strategic plan for the establishment of the Government Information Security Incident Response Center. Strategic Planning for Government Information Security Incident Response Center use the methodology that developed by Carnegie Mellon University which is adjusted with the characteristics of the organization. This methodology combined with the Information Systems Strategic Planning methodology of Anita Cassidy version in the planning stages of infrastructure / IT organization by combining several analysis tools such as Critical Success Factor, Value Chain analysis, and a SWOT Analysis in order to provide guidance information system development technical or non-technical nature in the form of policy or managerial activities. The results of this research is used as input or foundation in the development of the Government Information Security Incident Response Center to realize the use of ICT in government that is safe and comfortable."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir Universitas Indonesia Library
Doenges, Marilynn E.
Philadelphia: F.A. Davis, 1989
610.73 DOE n
Buku Teks SO Universitas Indonesia Library
Jones, Harry, 1911-
Cambridge, Mass.: Gower Press , 1974
658.114 5 JON p
Buku Teks Universitas Indonesia Library
Benton, William K.
California : Addison-Wesley, 1971
658.4 BEN u
Buku Teks Universitas Indonesia Library
Teicholz, Eric
Englewood Cliffs: Prentice-Hall, 1983
006.66 TEI c
Buku Teks SO Universitas Indonesia Library
Kahn, Miriam B.
"Disasters come in all shapes and sizes. Bad things can happen to good digital resources?from floods and fires to hackers and computer crashes. Both library staff and customers are dependent on costly hardware, software, and electronic collections. Electronic information may be more susceptible to problems than print. Storage issues and long-term accessibility for digital materials requiring dated or obsolete hardware often can be overlooked. Without a plan for containment and recovery, a collection or library may have to close, either temporarily or permanently."
Chicago: [American Library association;American Library association, American Library association], 2004
e20436098
eBooks Universitas Indonesia Library