Pentingnya Peranan CIA Triad Dalam Keamanan Informasi dan Data Untuk Pemangku Kepentingan atau Stakholder
DOI:
https://doi.org/10.38035/jmpd.v1i2.34Keywords:
Kerahasiaan (Confidentiality), integritas (Integrity), dan ketersediaan (Availability). Keamanan sistem informasi dan data, CIA Triad.Abstract
In the sustainability of an organization or company it is important to protect assets related to the organization or company being run. Important assets of companies and organizations include things that ensure the sustainability of an organization and the company itself. Information and data related to an organization or company is the most important thing to protect its security. In protecting information and data security, this paper discusses specific indicators of organizational or company security. This security indicator is known as the "CIA Triad" of Confidentiality, Integrity, Availability. In this study discusses CIA TRIAD in protecting information and data security in an applied system. These three factors are interrelated and maintain bonds with each other, in other words if one of these factors is eliminated Information and data security will be very risky. Therefore, the CIA Triad linkage is very important and has influence.
References
Arnomo, I. (2019). Simulasi Backup Dan Restore Database Repository. Jurnal Sistem Informasi, Teknologi Informasi Dan Komputer, 9(2), 92–99.
Betty Yel, M., & M Nasution, M. K. (2022). Keamanan Informasi Data Pribadi Pada Media Sosial. Jurnal Informatika Kaputama (JIK), 6(1), 92–101.
Bitzer, M., Brinz, N., & Ollig, P. (2021). Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance. ECIS 2021 Research Papers, 134(May), 1–18. https://aisel.aisnet.org/ecis2021_rp/134
Coss, D., & Samonas, S. (2014). The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security. Journal of Information System Security, 10(3), 21–45. www.jissec.org
Dani, J. (2008). Pengembangan Kebijakan Keamanan Informasi Pada Perusahaan Jasa Layanan Kurir?: Studi Kasus Pt. Ncs. 6–26.
Dwinanto, I., & Setiyani, H. (2021). Implementasi Keamanan Komputer pada Aspek Confidentiality, Integrity, Availibility (CIA) Menggunakan Tools Lynis Audit System. Jurnal Maklumatika, 8(1), 35–46.
Galih, A. (2019). Experience: Data and information quality challenges in governance, risk, and compliance management. Journal of Data and Information Quality, 11(2). https://doi.org/10.1145/3297721
Hermawan1, A., Hartati2, T., & Wijaya3, Y. A. (2022). Analisa Keamanan Data melalui Website Zahra Software Menggunakan Metode Keamanan Informasi CIA Triad. 7(3), 125–130.
Indrawanti, A. S., Azinar, A. W., & Firdiansyah, M. A. (2018). SECURE E-VOTING MENGGUNAKAN METODE RSA DAN. 4(1), 67–75.
Kaaffah, F. M., Maulana, R., Zulfikar, W. B., Slamet, C., Lukman, N., & Rahman, A. (2022). Integrity Assurance System for Document Security Using Keccak and Quick Algorithm Response Code. Proceeding of 2022 8th International Conference on Wireless and Telematics, ICWT 2022. https://doi.org/10.1109/ICWT55831.2022.9935362
Kamal, A. (2022). Teknologi Informasi dan Skeptisisme Profesional terhadap Fraud Detection Skills Auditor Internal Pemerintah. YUME?: Journal of Management, 5(2), 295–313. https://doi.org/10.2568/yum.v5i2.1639
Kolkowska, E., Hedström, K., & Karlsson, F. (2009). Information Security Goals in a Swedish Hospital Ella Kolkowska, Karin Hedström, Fredrik Karlsson Örebro University, Sweden. Security, Assurance and Privacy: Organisational Challenges. Proceedings of the 8th Annual Security Conference, 1–11.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science, 125(January), 691–697. https://doi.org/10.1016/j.procs.2017.12.089
Lundgren, B., & Möller, N. (2019). Defining Information Security. Science and Engineering Ethics, 25(2), 419–441. https://doi.org/10.1007/s11948-017-9992-1
Pu, H., He, L., Cheng, P., Chen, J., & Sun, Y. (2023). Reference?: To appear in?: Received Date?: Revised Date?: Accepted Date?: Systems Science ? Article CORMAND2?: A Deception Attack Against Industrial Robots. Engineering. https://doi.org/10.1016/j.eng.2023.01.013
Qadir, S., & Quadri, S. M. K. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 07(03), 185–194. https://doi.org/10.4236/jis.2016.73014
Salisbury, W. D., Ferratt, T. W., & Wynn, D. E. (2015). Assessing the Emphasis on Information Security in the Systems Analysis and Design Course.
Sholikhatin, S. A., Setyanto, A., Si, S., Luthfi, E. T., & Kom, M. (n.d.). Analisis Keamanan Sistem Informasi Dengan ISO 27001 ( Studi Kasus?: Sistem Informasi Akademik Universitas Muhammadiyah Purwokerto ). 4(1), 1–9.
Downloads
Published
Issue
Section
License
Hak cipta :
Penulis yang mempublikasikan manuskripnya di jurnal ini menyetujui ketentuan berikut:
- Hak cipta pada setiap artikel adalah milik penulis.
- Penulis mengakui bahwa JMPD berhak menjadi yang pertama menerbitkan dengan lisensi Creative Commons Attribution 4.0 International (Attribution 4.0 International CC BY 4.0) .
- Penulis dapat mengirimkan artikel secara terpisah, mengatur distribusi non-eksklusif manuskrip yang telah diterbitkan dalam jurnal ini ke versi lain (misalnya, dikirim ke repositori institusi penulis, publikasi ke dalam buku, dll.), dengan mengakui bahwa manuskrip telah diterbitkan pertama kali di JMPD.