Rekayasa keamanan
Memperkuat keamanan sistem melalui rekayasa keamanan yang terarah
Abstract
This article discusses the importance of information security engineering in building secure and reliable systems. Security planning is a systematic process for identifying, evaluating, and mitigating system information security risks. This article describes the stages of security planning, including risk analysis, security planning, security implementation, and security evaluation. In addition, this article also provides practical examples of the use of information security technologies such as data encryption, firewalls and digital signature to enhance system security. With good data security planning, the system can be protected from cyber attacks and sensitive user data can be secured. Therefore, it is important for organizations to lay a solid foundation for system security by implementing good security design practices.
Downloads
References
Bertino, E., & Ferrari, E. (1998). "Data security". Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac ’98) (Cat. No.98CB 36241), 228–237. https://doi.org/10.1109/CMPSAC.1998.716660
Chazar, C. (2015). "Standar manajemen keamanan sistem informasi berbasis ISO/IEC 27001:2005". Jurnal Informasi. Vol. VII, No. 2. https://informasi.stmik-im.ac.id/wp-content/uploads/2016/05/04-Chalifa.pdf
Elahi, G., & Yu, E. (2009). "Modeling and analysis of security trade-offs – A goal oriented approach". Data & Knowledge Engineering, 68(7), 579–598. https://doi.org/10.1016/j.datak.2009.02.004
Febiryani, W., Kusumasari, T. F., & Fauzi, R. (2021). "Analysis and Design of Implementation Guidelines Data Security Management Assessment Techniques Based On DAMA-DMBOKv2". 2021 IEEE 5th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 371–375. https://doi.org/10.1109/ICITISEE53823.2021.9655782
Firesmith, D. (2003). "Analyzing and Specifying Reusable Security Requirements". Journal of Object Technology - JOT.
Limakrisna, N., Noor, Z., & Ali, H. (2016). "Model of employee performance: The empirical study at civil servants in government of West Java Province". IJER, 13 (3), 707–719.
Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). "Faktor-faktor yang mempengaruhi keamanan sistem informasi: Keamanan informasi, teknologi informasi dan network (literature review SIM)". Jurnal Ekonomi Manajemen Sistem Informasi (JEMSI). Vol 3, No. 5.
Onyigwang, O. J., Shestak, Y., & Oksiuk, A. (2016). "Information protection of data processing center against cyber attacks". 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), 397–400. https://doi.org/10.1109/DSMP.2016.7583586
Peltier, T. R. (2005). "Implementing an Information Security Awareness Program." Information Systems Security, 14(2), 37–49. https://doi.org/10.1201/1086/45241.14.2.20050501/88292.6
Pressman, R. S. (2000). Software engineering: A practitioner’s approach (5th ed). McGraw Hill.
Sommerville, I. (2011). Software engineering (9th ed). Pearson.
Stoneburner, G., Goguen, A., & Feringa, A. (2002). "Risk management guide for information technology systems: Recommendations of the National Institute of Standards and Technology (NIST SP 800-30; 0 ed., p. NIST SP 800-30)". National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-30
Von Solms, R. (1999). "Information security management: Why standards are important". Information Management & Computer Security, 7(1), 50–58. https://doi.org/10.1108/09685229910255223
Wilson, J. L., Turban, E., & Zviran, M. (1992). "Information systems security: A managerial perspective". International Journal of Information Management, 12(2), 105–119. https://doi.org/10.1016/0268-4012(92)90017-K
Copyright (c) 2024 Muhammad Naufal Hibatullah

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.



