Using the Information Security Index to Measure University Information Security Management : Concepts and Strategies
Keywords:
Information Security Index, Concept of Information Security Index, Information Security StrategyAbstract
An information security index is an evaluation tool for analyzing the degree of information security preparedness in government agencies. This evaluation tool is not intended to investigate the feasibility or effectiveness of existing forms of security, but rather as a tool to provide a picture of the readiness condition. This study aims to create a concept and evaluation strategy using information security index. The research method used is literature study and interview to generate a proper concept and strategy that matured. The result of this research is information security index will evaluate an organization based on six area that is: ICT Roles, Information Security Governance, Information Security Risk Management, Information Asset Management and Information Technology and Security. In an evaluation using information security index there are nine steps to be taken the first step is planning, second is literature study and interview then six evaluation steps based on the last area is the result of the evaluation, the Estimated time needed to do the assessment is thirteen weeks.
References
- Shirey, R. (2000). Internet Security Glossary: RFC Editor.
- Infosecurity. (2011). Elsevier Science Publishers B. V.
- Demopoulos, A. (2012 ). Why do many organizations lack adequate security? Retrieved from http://demop.com/articles/lack-adequate-security.html Davis, C., Schiller, M., & Wheeler, K. (2011). IT Auditing: Using Controls to Protect Information Assets (2 ed.). New York: McGraw Hill.
- Sarno, R., & Iffano, I. (2009). Sistem Manajemen Keamanan Informasi. Surabaya: ITS Press.
- ISO/IEC. (2005). Information Technology-Security Techniques-Code of Practice for Information Security Management ISO/IEC 17799 (27002):2005. Switzerland.
- Wiander, T. (2008). Implementing the ISO/IEC 17799 standard in practice: experiences on audit phases. Paper presented at the Proceedings of the sixth Australasian conference on Information security - Volume 81, Wollongong, NSW, Australia.
- Kemenkominfo. (2013). Indeks Keamanan Informasi ( KAMI ). Retrieved from https://kominfo.go.id/index.php/content/detail/3326/Indeks+Keamanan+Informasi+(KAMI)/0/kemanan_informasi
- Isaca. (2012). Cobit 5: ISA.
- Davis, C., Schiller, M., & Wheeler, K. (2011). IT Auditing: Using Controls to Protect Information Assets (2 ed.). New York: McGraw Hill.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.