Pentingnya Peranan CIA Triad Dalam Keamanan Informasi dan Data Untuk Pemangku Kepentingan atau Stakholder

Authors

  • Abdul Halim Harahap Harahap a:1:{s:5:"en_US";s:36:"Universitas Bhayangkara Jakarta Raya";}
  • Claresta Difa Andani Universitas Bhayangkara Jakarta Raya
  • Angelia Christie
  • Divtyajeng Nurhaliza
  • Ahmad Fauzi Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.38035/jmpd.v1i2.34

Keywords:

Kerahasiaan (Confidentiality), integritas (Integrity), dan ketersediaan (Availability). Keamanan sistem informasi dan data, CIA Triad.

Abstract

In the sustainability of an organization or company it is important to protect assets related to the organization or company being run. Important assets of companies and organizations include things that ensure the sustainability of an organization and the company itself. Information and data related to an organization or company is the most important thing to protect its security. In protecting information and data security, this paper discusses specific indicators of organizational or company security. This security indicator is known as the "CIA Triad" of Confidentiality, Integrity, Availability. In this study discusses CIA TRIAD in protecting information and data security in an applied system. These three factors are interrelated and maintain bonds with each other, in other words if one of these factors is eliminated Information and data security will be very risky. Therefore, the CIA Triad linkage is very important and has influence.

References

Agustina, D., Pramadista, F., & Regyna, T. (2011). Manajemen keamanan informasi. 1, 1–19. https://doi.org/12.01.123
Arnomo, I. (2019). Simulasi Backup Dan Restore Database Repository. Jurnal Sistem Informasi, Teknologi Informasi Dan Komputer, 9(2), 92–99.
Betty Yel, M., & M Nasution, M. K. (2022). Keamanan Informasi Data Pribadi Pada Media Sosial. Jurnal Informatika Kaputama (JIK), 6(1), 92–101.
Bitzer, M., Brinz, N., & Ollig, P. (2021). Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance. ECIS 2021 Research Papers, 134(May), 1–18. https://aisel.aisnet.org/ecis2021_rp/134
Coss, D., & Samonas, S. (2014). The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security. Journal of Information System Security, 10(3), 21–45. www.jissec.org
Dani, J. (2008). Pengembangan Kebijakan Keamanan Informasi Pada Perusahaan Jasa Layanan Kurir?: Studi Kasus Pt. Ncs. 6–26.
Dwinanto, I., & Setiyani, H. (2021). Implementasi Keamanan Komputer pada Aspek Confidentiality, Integrity, Availibility (CIA) Menggunakan Tools Lynis Audit System. Jurnal Maklumatika, 8(1), 35–46.
Galih, A. (2019). Experience: Data and information quality challenges in governance, risk, and compliance management. Journal of Data and Information Quality, 11(2). https://doi.org/10.1145/3297721
Hermawan1, A., Hartati2, T., & Wijaya3, Y. A. (2022). Analisa Keamanan Data melalui Website Zahra Software Menggunakan Metode Keamanan Informasi CIA Triad. 7(3), 125–130.
Indrawanti, A. S., Azinar, A. W., & Firdiansyah, M. A. (2018). SECURE E-VOTING MENGGUNAKAN METODE RSA DAN. 4(1), 67–75.
Kaaffah, F. M., Maulana, R., Zulfikar, W. B., Slamet, C., Lukman, N., & Rahman, A. (2022). Integrity Assurance System for Document Security Using Keccak and Quick Algorithm Response Code. Proceeding of 2022 8th International Conference on Wireless and Telematics, ICWT 2022. https://doi.org/10.1109/ICWT55831.2022.9935362
Kamal, A. (2022). Teknologi Informasi dan Skeptisisme Profesional terhadap Fraud Detection Skills Auditor Internal Pemerintah. YUME?: Journal of Management, 5(2), 295–313. https://doi.org/10.2568/yum.v5i2.1639
Kolkowska, E., Hedström, K., & Karlsson, F. (2009). Information Security Goals in a Swedish Hospital Ella Kolkowska, Karin Hedström, Fredrik Karlsson Örebro University, Sweden. Security, Assurance and Privacy: Organisational Challenges. Proceedings of the 8th Annual Security Conference, 1–11.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science, 125(January), 691–697. https://doi.org/10.1016/j.procs.2017.12.089
Lundgren, B., & Möller, N. (2019). Defining Information Security. Science and Engineering Ethics, 25(2), 419–441. https://doi.org/10.1007/s11948-017-9992-1
Pu, H., He, L., Cheng, P., Chen, J., & Sun, Y. (2023). Reference?: To appear in?: Received Date?: Revised Date?: Accepted Date?: Systems Science ? Article CORMAND2?: A Deception Attack Against Industrial Robots. Engineering. https://doi.org/10.1016/j.eng.2023.01.013
Qadir, S., & Quadri, S. M. K. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 07(03), 185–194. https://doi.org/10.4236/jis.2016.73014
Salisbury, W. D., Ferratt, T. W., & Wynn, D. E. (2015). Assessing the Emphasis on Information Security in the Systems Analysis and Design Course.
Sholikhatin, S. A., Setyanto, A., Si, S., Luthfi, E. T., & Kom, M. (n.d.). Analisis Keamanan Sistem Informasi Dengan ISO 27001 ( Studi Kasus?: Sistem Informasi Akademik Universitas Muhammadiyah Purwokerto ). 4(1), 1–9.

Published

2023-04-29