Performance Measurement of Security Academic Information System using Maturity Level

04/17/2022
by   Endang Kurniawan, et al.
0

This study aims to information security in academic information systems to provide recommendations for improvements in information security management by the expected maturity level based on ISO/IEC 27002:2013. By using a qualitative descriptive approach, data collection and validation techniques with triangulation techniques are interviews, observation, and documentation. The data were analyzed by using gap analysis and to measure the maturity level determined 15 objective control and 45 security controls scattered in 5 clauses, the result of the research found that the performance of academic information system maturity level at level 2. That is, the current level of maturity is below the expected maturity level, so it needs to be increased to the expected level.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/10/2018

Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM

This research was conducted to find out the level of information securit...
research
06/23/2021

Social engineering: Concepts, Techniques and Security Countermeasures

The purpose of this report is to research the topic called Social Engine...
research
08/02/2023

An Adaptable Approach for Successful SIEM Adoption in Companies

In corporations around the world, the topic of cybersecurity and informa...
research
12/07/2018

How do information security workers use host data? A summary of interviews with security analysts

Modern security operations centers (SOCs) employ a variety of tools for ...
research
08/20/2020

Understanding the Advisor-advisee Relationship via Scholarly Data Analysis

Advisor-advisee relationship is important in academic networks due to it...
research
10/30/2018

The north-south divide in the Italian higher education system

This work examines whether the macroeconomic divide between northern and...
research
06/12/2023

Exploratory analysis of a measurement scale of an information security management system

This research shows the analysis of multiple factors that inhibit the im...

Please sign up or login with your details

Forgot password? Click here to reset