Information Technology Risk Assessment: Octave-S Approach
Abstract: Purpose of the
research is to identify the risk of IT in the company, to assess all the risk,
and take security actions to solve the problem. Research methods used are data
collection method and analysis method. Data collection is conducted with
literature review and field studies by interview and observation. Analysis is
conducted using Operationally Critical Threat, Asset, and Vulnerability
(OCTAVE)-S method. The expected result is the risk identification in IT of the
company.
Penulis: Bambang Gunawan,
Merry, Nelly
Journal Code: jptinformatikagg110006

Artikel Terkait :
Jp Teknik Informatika gg 2011
- TECHNOLOGY OPTIONS TO SUPPORT THE IMPLEMENTATION OF KNOWLEDGE MANAGEMENT
- APPLICATION OF MALARIA DETECTION OF DRAWING BLOOD CELLS USING MICROSCOPIC OpenCV
- THE DEVELOPMENT OF A WEB BASED DATABASE APPLICATIONS OF PROCUREMENT, INVENTORY, AND SALES AT PT. INTERJAYA SURYA MEGAH
- A DESIGN OF SALES INFORMATION SYSTEM ON PAPER CUTTING MACHINE DISTRIBUTOR
- THE STRATEGIC PLANNING OF IS/IT AT PT. LINTAS GROUP
- THE ANALYSIS AND THE DESIGN OF E-MARKETING STRATEGY AT SME’S (A CASE STUDY: THE DARE TO DREAM INDONESIA COMMUNITY)
- Information Technology Risk Measurement: Octave-S Method
- Design and Analysis: Payroll of Accounting Information System
- Auditing Information System : Delivery Product Service
- Analysis and Design: Accounting Information System in Purchasing and Supplying
- Design Simulation Program of Runway Capacity Using Genetic Algorithm At Soekarno-Hatta Airport
- Information Technology Investment Strategy Planning: Balance Scorecard Approach
- Control Evaluation Information System Savings
- Utilizing Soft Computing for Determining Protein Deficiency
- THE IMPLEMENTATION OF ASSOCIATION RULES IN ANALYZING THE SALES OF AMIGO GROUP
- TEXT DOCUMENT INFORMATION RETRIEVAL BASED ON CONCEPTS
- New Edge Detection Method for Indonesian Batik
- Music Mood Player Implementation Applied In Daycare Using Self Organizing Map Method