The Fourth Assignment
ž Apa tujuan dari informasi perlu diamankan ? Jelaskan dan berikan contoh jawaban anda
ž Apa yang dilakukan oleh manager apabila informasi akurat, tidak aman dan relevan ?
ž Bagaimana tahapan2 dalam mengamankan informasi ? Jelaskan
Answer
1. Objectives of Information Security
Information security is intended to achieve three main objectives: confidentiality,
availability, and integrity.
Confidentiality. The company strives to protect its information from the data
disclosure to the people - people who are not authorized.
Availability. The purpose of the Infrastructure company information is to provide data and information
available to the parties - parties that have authority untukmenggunakannya.
Integrity. All information systems must provide an accurate representation
physical system be represented
2. if the manager doesn't have a relevant, accurate, and secure information all the information will be missed, and the information will be unsecure because the information they have is already know by the competitor.
3. Step to secure an information
Security Policy
is necessary given the many problems encountered technical one-use passwords by more than one person. This is indicates the absence of compliance in implementing security systems information. must an inventory company data. Further regulations made which include all departments so that regulations made acceptable to all parties. After that the draft regulation was submitted to the board of directors. after all the divisions are agree these rules can be applied.
Access Control System(Access control system), control / restrict user access to the information set its authority, including the mobile-computing control or tele-networking.
Communications and Operations Management(Communications and operations management), provides protection against information systems infrastructure through regular maintenance and inspection, as well as ensuring the availability of guidelines which is a documentation system and communicated in order to avoid operational errors.
Physical and Environmental Security(Physical security and the environment), in terms of physical and network environment, to prevent loss / damage caused by the environmental data, including natural disasters and hacker in storage media or other information facilities.
Compliance(Adjustment), ensuring the implementation of the secure policy conform to the edicts and regulations, including contractual qualified through regular system audits.
Personnel Security(Personal security), set about reducing risk from misuse or authorized use of function due to human error (human error), so as to reduce human error and manipulation of data in the operating system and application by the user, through about security awareness training so that each user is able to maintain security information and data on their respective work.
Security Organization(Security organization), set about global security of an organization or agency, set up and maintain the integrity of the internal information system to the needs of external parties, including control over the information processing conducted by third parties (outsourcing).
Asset Classification and Control(Classification and control of assets), providing protection against corporate assets and information assets are determined based on the level.
Business Continuity Management(Business continuity management), ready to face the risk that will be encountered in activities that could result in a business environment "major failure"Or the risk of major failure or"disaster"Or unexpected adverse events, so that the necessary arrangements for the management and business continuity processes