Information Technology Risk Measurement: Octave-S Method
Abstract: The purpose of this
research are to identify the risk of IT in the company and make some
recommendation to solve any risk happened in the company, and also to give the
reference in measure the risk of IT in the company. Research Method used are
book studies, field studies, and analysis techniques. Book studies by
collecting the information from books and journal. Then, for field studies, it
done by interview, and observation to the company. Analysis techniques done by
qualitative approach and using the Octave-S (Operational Threat Asset and
Vulnerability Evaluation) – S as the method to measure the risk of IT in the
company. The result of this research will be a description of Information
Technology in the company and give any risk happened in IT and mitigation
activity through the risk in the company. Conclusion of the research are
looking for three critical areas, such the awareness and security training,
security strategy, security management, and disaster recovery.
Author: Rudy M Harahap
Journal Code: jptinformatikagg110013

Artikel Terkait :
Jp Teknik Informatika gg 2011
- TECHNOLOGY OPTIONS TO SUPPORT THE IMPLEMENTATION OF KNOWLEDGE MANAGEMENT
- APPLICATION OF MALARIA DETECTION OF DRAWING BLOOD CELLS USING MICROSCOPIC OpenCV
- THE DEVELOPMENT OF A WEB BASED DATABASE APPLICATIONS OF PROCUREMENT, INVENTORY, AND SALES AT PT. INTERJAYA SURYA MEGAH
- A DESIGN OF SALES INFORMATION SYSTEM ON PAPER CUTTING MACHINE DISTRIBUTOR
- THE STRATEGIC PLANNING OF IS/IT AT PT. LINTAS GROUP
- THE ANALYSIS AND THE DESIGN OF E-MARKETING STRATEGY AT SME’S (A CASE STUDY: THE DARE TO DREAM INDONESIA COMMUNITY)
- Design and Analysis: Payroll of Accounting Information System
- Auditing Information System : Delivery Product Service
- Analysis and Design: Accounting Information System in Purchasing and Supplying
- Design Simulation Program of Runway Capacity Using Genetic Algorithm At Soekarno-Hatta Airport
- Information Technology Investment Strategy Planning: Balance Scorecard Approach
- Control Evaluation Information System Savings
- Information Technology Risk Assessment: Octave-S Approach
- Utilizing Soft Computing for Determining Protein Deficiency
- THE IMPLEMENTATION OF ASSOCIATION RULES IN ANALYZING THE SALES OF AMIGO GROUP
- TEXT DOCUMENT INFORMATION RETRIEVAL BASED ON CONCEPTS
- New Edge Detection Method for Indonesian Batik
- Music Mood Player Implementation Applied In Daycare Using Self Organizing Map Method