Analysis Of Data Security Systems In Business Organizations
Keywords:
Analysis, Data Security, Business OrganizationAbstract
This research aims to find out the data security system at Graha Pena Makassar. Graha Pena Makassar is also called Fajar Building which was built in 2007. Graha Pena Makassar is an office building that is the main choice for investors for business development. This research was conducted by identifying potential security gaps and existing security infrastructure. This research method is observation, literature study and conducting interviews. The results showed that the data security system implemented by Graha Pena Makassar has not implemented technology or special applications for database security systems. The security system implemented is more on a physical security system.
Downloads
References
N. I. Putri, R. Komalasari, and Z. Munawar, “Pentingnya Keamanan Data Dalam Intelijen Bisnis,” Jurnal Sistem Informasi, vol. 1, no. 2, pp. 41–49, 2020.
K. N. Isnaini, W. W. Winarno, and H. Henderi, “Evaluasi Kepatuhan Logical dan Physical Security Terhadap Kebijakan Pengamanan Data,” Jurnal Ilmiah IT CIDA, vol. 4, no. 1, pp. 48–63, 2019, doi: 10.55635/jic.v4i1.79.
S. Nuzuli, A. Budiyono, S. Almaarif, and M. T. Kom, “Analisis Dan Perancangan Keamanan Fisik Data Center Berdasarkan Standar Tia-942 Menggunakan Ppdioo Life-Cycle Approach Di Pemerintahan Kabupaten Bandung Barat,” Jurnal Rekayasa Sistem & Industri, vol. 7, no. 2, pp. 6720–6727, 2020.
D. A. Pratiwi, “Peningkatan keamanan data dengan metode cropping selection pseudorandom,” Jurnal TICom, vol. 4, no. 3, pp. 132–138, 2016, [Online]. Available: https://www.neliti.com/publications/92394/peningkatan-keamanan-data-dengan-metode-cropping-selection-pseudorandom
S. Sidhu, B. J. Mohd, and T. Hayajneh, “Hardware security in IoT devices with emphasis on hardware trojans,” Journal of Sensor and Actuator Networks, vol. 8, no. 3, 2019, doi: 10.3390/jsan8030042.
O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, and A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK: Jurnal Inovasi Vokasional dan Teknologi, vol. 20, no. 1, pp. 27–36, 2020, doi: 10.24036/invotek.v20i1.647.
A. P. Kehista et al., “Analisis Keamanan Data Pribadi pada Pengguna E-Commerce: Ancaman, Risiko, Strategi Kemanan (Literature Review),” Jurnal Ilmu Manajemen Terapan, vol. 4, no. 5, pp. 625–632, 2023, [Online]. Available: https://dinastirev.org/JIMT/article/view/1541
A. Thahara and I. T. Siregar, “Implementasi Kriptografi untuk keamanan Data dan Jaringan menggunakan Algoritma DES,” Jurnal Rekayasa Teknologi Informasi (JURTI), vol. 5, no. 1, p. 31, 2021, doi: 10.30872/jurti.v5i1.5657.
L. Silalahi and A. Sindar, “Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1,” Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI), vol. 3, no. 2, pp. 182–186, 2020, doi: 10.32672/jnkti.v3i2.2413.
A. Anggono and M. Riskiyadi, “Cybercrime dan Cybersecurity pada Fintech: Sebuah Tinjauan Pustaka Sistematis Cybercrime and Cybersecurity at Fintech: A Systematic Literature Review,” Jurnal Manajemen dan Organisasi (JMO), vol. 12, no. 3, pp. 239–251, 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Embedded Systems, Security and Intelligent Systems
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.