INFORMATION SECURITY IN PERSONNEL MANAGEMENT INFORMATION SYSTEM APPLICATIONS WITH DEFENSE IN DEPTH

  • Enggar Novianto(1*)
    Universitas Teknologi Yogyakarta
  • Erik Iman Heri Ujianto(2)
    Universitas Teknologi Yogyakarta
  • Rianto Rianto(3)
    Universitas Teknologi Yogyakarta
  • (*) Corresponding Author
Keywords: Information Security, SIMPEG, Defense in Depth, Information System

Abstract

The rapid development of Information Technology (IT) has made IT the most important aspect to meet organizational needs. The existence of IT is believed to be able to provide solutions related to the organization's business processes, so that many organizations offer their resources to increase efficiency by relying on information technology support. Information system security is an internal organizational subsystem tasked with managing the risks associated with computerized information systems. Information system security is the application of international control principles, which are specifically used to trigger problems in information systems. Important information leads to protected information structures, more information is now available from the internet, so information management now includes computer and network technology. The goal of information security is to strengthen business operations and protect against falling business prices by minimizing the risks associated with internal security. The purpose of this study is to understand information security in the implementation of the Personnel Management Information System (SIMPEG) at Sebelas Maret University. The research method used is the application of Defense In Depth to analyze information security, including many layers of security to ensure information security. The results of the descriptive analysis explain that the design and development of SIMPEG pays attention to the principles and aspects of data and information security. However, information security vulnerabilities can occur at the server protection layer, network protection layer, and physical protection layer.

Downloads

Download data is not yet available.

References

L. M. M. Matin, A. Arini, and L. K. Wardhani, “Analisis Keamanan Informasi Data Center Menggunakan COBIT 5,” Jurnal Teknik Informatika, vol. 10, no. 2, pp. 119-128, 2017, doi : https://doi.org/10.15408/jti.v10i2.7026.

M. Hayati, and D. Fata, “Analisis Keamanan Informasi Pengguna Media Sosial Menggunakan Setoolkit Melalui Teknik Phising,” Djtechno : Journal of Information Technology Research, vol. 2, no. 1, pp. 21-28, 2021, doi : https://doi.org/10.46576/djtechno.v2i1.1252.

I. A. Dianta, and E. Zusrony, “Analisis Pengaruh Sistem Keamanan Informasi Perbankan pada Nasabah Pengguna Internet Banking,” INTENSIF : Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, vol. 3, no. 1, pp. 1-9, 2019, doi : https://doi.org/10.29407/intensif.v3i1.12125.

E. M. Safitri, A. S. Larasati, and S. R. Hari, “Analisis Keamanan Sistem Informasi E-Banking Di Era Industri 4.0 : Studi Literatur,” JIFTI - Jurnal Ilmiah Teknologi Informasi dan Robotika, vol. 2, no. 1, pp. 12-16, 2020, doi : https://doi.org/10.33005/jifti.v2i1.25.

A. Elanda, and R. L. Buana, “Analisis Keamanan Sistem Informasi Berbasis Website Dengan Metode Open Web Application Security Project (OWASP) Versi 4 : Systematic Review,” CSS (Journal of Computer Engineering System and Science), vol. 5, no. 2, pp. 185-191, 2020, doi : https://doi.org/10.24114/cess.v5i2.17149.

Zulkarnain, “Analisis Implementasi Keamanan Sistem Informasi Pada Perusahaan Perakitan Elektronik,” Journal of Information System and Technology, vol. 1, no. 1, pp. 1-4, 2020 .

A. P. Galih, “Keamanan Informasi (Information Security) Pada Aplikasi Perpustaakn iPUSNAS,” Al Maktabah Jurnal Kajian Ilmu dan Perpustakaan, vol. 5, no. 1, pp. 9-17, 2020, doi : http://dx.doi.org/10.29300/mkt.v5i1.3086.

T. E. Wijatmoko, “Evaluasi Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Pada Kantor Wilayah Kementerian Hukum Dan HAM DIY,” CyberSecurity dan Forensik Digital, vol. 3, no. 1, pp. 1-6, 2020, doi : https://doi.org/10.14421/csecurity.2020.3.1.1951.

M. B. Yel, and M. K. Nasution, “Keamanan Informasi Data Pribadi Pada Media Sosial,” Jurnal Informatika Kaputama (JIK), vol. 6, no. 1, pp. 92-101, 2022, doi : https://doi.org/10.1234/jik.v6i1.768.

F. Novianto, “Evaluasi Keamanan Informasi E-Government Menggunakan Model Defense In Depth,” CyberSecurity dan Forensik Digital, vol. 3, no. 1, pp. 14-19, 2020, doi : https://doi.org/10.14421/csecurity.2020.3.1.1962.

PlumX Metrics

Published
2023-03-29
How to Cite
[1]
E. Novianto, E. Heri Ujianto, and R. Rianto, “INFORMATION SECURITY IN PERSONNEL MANAGEMENT INFORMATION SYSTEM APPLICATIONS WITH DEFENSE IN DEPTH”, jicon, vol. 11, no. 1, pp. 1-6, Mar. 2023.
Section
Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.