Rekayasa keamanan

Memperkuat keamanan sistem melalui rekayasa keamanan yang terarah

  • Muhammad Naufal Hibatullah Program Studi Teknik Informatika, Universitas Islam Negeri Maulana Malik Ibrahim Malang
Keywords: Security Engineering, System Information, System Security

Abstract

This article discusses the importance of information security engineering in building secure and reliable systems. Security planning is a systematic process for identifying, evaluating, and mitigating system information security risks. This article describes the stages of security planning, including risk analysis, security planning, security implementation, and security evaluation. In addition, this article also provides practical examples of the use of information security technologies such as data encryption, firewalls and digital signature to enhance system security. With good data security planning, the system can be protected from cyber attacks and sensitive user data can be secured. Therefore, it is important for organizations to lay a solid foundation for system security by implementing good security design practices.

Downloads

Download data is not yet available.

References

Bertino, E., & Ferrari, E. (1998). "Data security". Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac ’98) (Cat. No.98CB 36241), 228–237. https://doi.org/10.1109/CMPSAC.1998.716660

Chazar, C. (2015). "Standar manajemen keamanan sistem informasi berbasis ISO/IEC 27001:2005". Jurnal Informasi. Vol. VII, No. 2. https://informasi.stmik-im.ac.id/wp-content/uploads/2016/05/04-Chalifa.pdf

Elahi, G., & Yu, E. (2009). "Modeling and analysis of security trade-offs – A goal oriented approach". Data & Knowledge Engineering, 68(7), 579–598. https://doi.org/10.1016/j.datak.2009.02.004

Febiryani, W., Kusumasari, T. F., & Fauzi, R. (2021). "Analysis and Design of Implementation Guidelines Data Security Management Assessment Techniques Based On DAMA-DMBOKv2". 2021 IEEE 5th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 371–375. https://doi.org/10.1109/ICITISEE53823.2021.9655782

Firesmith, D. (2003). "Analyzing and Specifying Reusable Security Requirements". Journal of Object Technology - JOT.

Limakrisna, N., Noor, Z., & Ali, H. (2016). "Model of employee performance: The empirical study at civil servants in government of West Java Province". IJER, 13 (3), 707–719.

Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). "Faktor-faktor yang mempengaruhi keamanan sistem informasi: Keamanan informasi, teknologi informasi dan network (literature review SIM)". Jurnal Ekonomi Manajemen Sistem Informasi (JEMSI). Vol 3, No. 5.

Onyigwang, O. J., Shestak, Y., & Oksiuk, A. (2016). "Information protection of data processing center against cyber attacks". 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), 397–400. https://doi.org/10.1109/DSMP.2016.7583586

Peltier, T. R. (2005). "Implementing an Information Security Awareness Program." Information Systems Security, 14(2), 37–49. https://doi.org/10.1201/1086/45241.14.2.20050501/88292.6

Pressman, R. S. (2000). Software engineering: A practitioner’s approach (5th ed). McGraw Hill.

Sommerville, I. (2011). Software engineering (9th ed). Pearson.

Stoneburner, G., Goguen, A., & Feringa, A. (2002). "Risk management guide for information technology systems: Recommendations of the National Institute of Standards and Technology (NIST SP 800-30; 0 ed., p. NIST SP 800-30)". National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-30

Von Solms, R. (1999). "Information security management: Why standards are important". Information Management & Computer Security, 7(1), 50–58. https://doi.org/10.1108/09685229910255223

Wilson, J. L., Turban, E., & Zviran, M. (1992). "Information systems security: A managerial perspective". International Journal of Information Management, 12(2), 105–119. https://doi.org/10.1016/0268-4012(92)90017-K

PlumX Metrics

Published
2023-12-31
How to Cite
Hibatullah, M. (2023). Rekayasa keamanan. Maliki Interdisciplinary Journal, 1(6), 529-540. Retrieved from https://urj.uin-malang.ac.id/index.php/mij/article/view/4794
Section
Articles