Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9042 dokumen yang sesuai dengan query
cover
Alsmadi, Izzat
"This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
"
Switzerland: Springer Nature, 2019
e20509570
eBooks  Universitas Indonesia Library
cover
Nainggolan, Dicky R.M.
"Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data."
Bogor: Universitas Pertahanan Indonesia, 2017
345 JPUPI 7:2 (2017)
Artikel Jurnal  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Hershey : Business Science Reference, 2017
658.05 BUS
Buku Teks  Universitas Indonesia Library
cover
Rizky Hendra Kurniawan
"Framework manajemen insiden merupakan sebuah tools yang dapat digunakan sebagai early warning system dalam mengatasi permasalahan penerapan teknologi informasi di ranah siber. Framework ini juga dapat menjadi sumber informasi intelijen yang bersifat terbuka dan dapat digunakan untuk mengukur sejauh mana tingkat kematangan manajemen insiden yang telah dilakukan oleh institusi/perusahaan di Indonesia. Dalam lingkup  nasional, framework ini juga dapat digunakan untuk melihat sejauhmana kemampuan Indonesia dalam menghadapi terjadinya insiden siber. Hal ini sangat penting mengingat framework manajemen insiden belum diterapkan secara masif oleh institusi/perusahaan di Indonesia, sehingga masih banyak terdapat celah-celah kerawanan yang dapat dimanfaatkan oleh penyerang dalam melakukan cipta kondisi terhadap insiden keamanan siber. Oleh karena itu, penulis melakukan penelitian terkait penerapan framework manajemen insiden ini. Metode penelitian yang digunakan berupa mix-method, dimana merupakan perpaduan dari metode kualitatif dan kuantitatif. Selain itu, teknik analisis data yang digunakan berupa comparative analysis dan content analysis. Hasil dari penelitian ini diantaranya: (1) Nilai koefisien potensi ancaman terhadap pengelolaan intelijen keamanan siber adalah 15.86. Nilai tersebut termasuk dalam kategori tinggi (high); (2) Kerangka kerja (framework) manajemen insiden yang dihasilkan terdiri dari 354 aktifitas manajemen insiden, yang dapat diimplementasikan oleh institusi/perusahaan, dan terbagi dalam 50 kategori pada framework manajemen insiden. Selain itu, distribusi aktifitas dalam framework terdiri dari 12.4% berasal  dari SIM3 Model, 42.1% berasal dari Joao Model, dan 70% berasal dari CREST Model.

.The incident management framework is a tools that can be used as an early warning system to overcome problems in the implementation of information technology. This Framework also used for measuring the maturity level of incident management that has been carried out by institutions in Indonesia. We can used it as an open intelligence of information source. Within national scope, this framework used for knowing Indonesia's ability to deal with cyber incidents. This is very important thing considering that the incident management framework has not been implemented massively by institution in Indonesia. This causes many vulnerabilities than can be exploited by an attacker for creating new conditions in cybersecurity incident. Therefore, author employed mix-methode research, which is the combination between qualitative and quantitative research. The data analysis techniques used were comparative analysis and content analysis. The result of this research are: (1) coefficient value of potential threat to cybersecurity intelligence management is 15.86. This value is included in high category; (2) This research produces a incident management framework that consisting of 354 incident management activity, which are divided into 50 incident management category. Furthermore, the distribution of incident management activity are consist of 12.4% SIM3 Model, 42.1% Joao Model, and 70% CREST Model."
Depok: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Andro Harjanto
"Manajemen Layanan TI (ITSM) memainkan peran penting dalam mengelola lingkungan yang berkelanjutan dengan menyediakan pendekatan terstruktur untuk mengelola layanan TI, menyelarasinya dengan tujuan bisnis, dan memastikan keamanan siber yang kuat. Horangi, sebuah startup perangkat lunak keamanan siber yang didirikan pada tahun 2016, menyadari pentingnya ITSM dan telah menginisiasi rencana untuk menerapkan kerangka kerja guna membentuk pedoman dan dasar yang kokoh, terutama karena tim TI baru saja dibentuk pada tahun 2021. Penelitian ini berfokus pada pengelolaan alur kerja Incident dan Service Request karena merupakan tugas yang paling dasar dan penting. ITIL 4, versi terbaru dari kerangka kerja ITIL, dianggap cocok karena pengakuan dan penggunaannya yang luas, selaras dengan tren manajemen TI saat ini seperti Agile dan DevOps. Model Continual Service Improvement dan Service Value Chain akan digunakan untuk menciptakan pedoman dan rekomendasi, dengan tujuan mengidentifikasi kelemahan dan meningkatkan proses yang ada. Model-model ini dipilih karena kemampuannya dalam menyediakan standardisasi, konsistensi, dan pendekatan holistik terhadap kepatuhan peraturan, sambil juga memungkinkan perbaikan berkelanjutan untuk beradaptasi dengan lanskap TI yang selalu berubah. Pengumpulan data dengan wawancara, dokumentasi perusahaan, studi literatur dari penelitian sebelumnya serta buku pedoman membantu dalam melakukan kajian kondisi layanan saat ini dan mencari peningkatan. Hasil dari penelitian ini berupa rekomendasi dan fondasi dalam pembentukan panduan serta alur kerja pada area Incident and Service Request Management. Keterbatasan dari penelitian ini adalah tidak bisa dilakukan sampai implementasi rekomendasi sehingga disarankan pada penelitian terkait adalah bisa sampai dengan proses implementasi agar dapat mendapatkan hasil evaluasi yang lebih optimal.

IT Service Management (ITSM) plays a crucial role in managing a sustainable environment by providing a structured approach to managing IT services, aligning them with business objectives, and ensuring robust cybersecurity. Horangi, a cybersecurity software startup founded in 2016, recognizes the importance of ITSM and has initiated plans to implement a framework to establish solid guidelines and foundations, especially since the IT team was recently formed in 2021. This research focuses on the management of Incident and Service Request workflows as they are among the most fundamental and critical tasks. ITIL 4, the latest version of the ITIL framework, is considered suitable due to its widespread recognition and usage, aligning with current IT management trends such as Agile and DevOps. The models of Continual Service Improvement and Service Value Chain will be utilized to create guidelines and recommendations, aiming to identify weaknesses and enhance the current processes. These models are chosen for their ability to provide standardization, consistency, and a holistic approach to regulatory compliance, while also enabling continuous improvement to adapt to the ever-changing IT landscape. Data collection through interviews, company documentation, literature review from previous research, and guidebooks will assist in assessing the current service conditions and seeking improvements. The outcomes of this research will provide recommendations and a foundation for developing guidelines and workflows in Incident and Service Request Management. The limitation of this research is that it could not be carried out until the implementation of recommendations, therefore it is suggested that future related research should include the implementation process to obtain more optimal evaluation results."
Jakarta: Fakultas Ilmu Komputer Universitas Indonesia, 2023
TA-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Bishop, Matt
Boston: Addison-Wesley, 2003
005.8 BIS c
Buku Teks  Universitas Indonesia Library
cover
Dony Ariyus
Yogyakarta: Andi, 2006
005.8 DON c
Buku Teks  Universitas Indonesia Library
cover
Bishop, Matt
Boston: Addison-Wesley, 2003
005.8 BIS c
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>