Analysis Of Data Security Systems In Business Organizations

Authors

  • Veronika Asri Tandirerung Universitas Negeri Makassar
  • Fauziah Universitas Negeri Makassar
  • Sul Fitriana Universitas Negeri Makassar
  • Putri Rahayu Universitas Negeri Makassar
  • Dzaky Raihan Muharram Universitas Negeri Makassar

Keywords:

Analysis, Data Security, Business Organization

Abstract

This research aims to find out the data security system at Graha Pena Makassar. Graha Pena Makassar is also called Fajar Building which was built in 2007. Graha Pena Makassar is an office building that is the main choice for investors for business development.  This research was conducted by identifying potential security gaps and existing security infrastructure. This research method is observation, literature study and conducting interviews. The results showed that the data security system implemented by Graha Pena Makassar has not implemented technology or special applications for database security systems. The security system implemented is more on a physical security system.

Downloads

Download data is not yet available.

References

N. I. Putri, R. Komalasari, and Z. Munawar, “Pentingnya Keamanan Data Dalam Intelijen Bisnis,” Jurnal Sistem Informasi, vol. 1, no. 2, pp. 41–49, 2020.

K. N. Isnaini, W. W. Winarno, and H. Henderi, “Evaluasi Kepatuhan Logical dan Physical Security Terhadap Kebijakan Pengamanan Data,” Jurnal Ilmiah IT CIDA, vol. 4, no. 1, pp. 48–63, 2019, doi: 10.55635/jic.v4i1.79.

S. Nuzuli, A. Budiyono, S. Almaarif, and M. T. Kom, “Analisis Dan Perancangan Keamanan Fisik Data Center Berdasarkan Standar Tia-942 Menggunakan Ppdioo Life-Cycle Approach Di Pemerintahan Kabupaten Bandung Barat,” Jurnal Rekayasa Sistem & Industri, vol. 7, no. 2, pp. 6720–6727, 2020.

D. A. Pratiwi, “Peningkatan keamanan data dengan metode cropping selection pseudorandom,” Jurnal TICom, vol. 4, no. 3, pp. 132–138, 2016, [Online]. Available: https://www.neliti.com/publications/92394/peningkatan-keamanan-data-dengan-metode-cropping-selection-pseudorandom

S. Sidhu, B. J. Mohd, and T. Hayajneh, “Hardware security in IoT devices with emphasis on hardware trojans,” Journal of Sensor and Actuator Networks, vol. 8, no. 3, 2019, doi: 10.3390/jsan8030042.

O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, and A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK: Jurnal Inovasi Vokasional dan Teknologi, vol. 20, no. 1, pp. 27–36, 2020, doi: 10.24036/invotek.v20i1.647.

A. P. Kehista et al., “Analisis Keamanan Data Pribadi pada Pengguna E-Commerce: Ancaman, Risiko, Strategi Kemanan (Literature Review),” Jurnal Ilmu Manajemen Terapan, vol. 4, no. 5, pp. 625–632, 2023, [Online]. Available: https://dinastirev.org/JIMT/article/view/1541

A. Thahara and I. T. Siregar, “Implementasi Kriptografi untuk keamanan Data dan Jaringan menggunakan Algoritma DES,” Jurnal Rekayasa Teknologi Informasi (JURTI), vol. 5, no. 1, p. 31, 2021, doi: 10.30872/jurti.v5i1.5657.

L. Silalahi and A. Sindar, “Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1,” Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI), vol. 3, no. 2, pp. 182–186, 2020, doi: 10.32672/jnkti.v3i2.2413.

A. Anggono and M. Riskiyadi, “Cybercrime dan Cybersecurity pada Fintech: Sebuah Tinjauan Pustaka Sistematis Cybercrime and Cybersecurity at Fintech: A Systematic Literature Review,” Jurnal Manajemen dan Organisasi (JMO), vol. 12, no. 3, pp. 239–251, 2021.

Downloads

Published

2023-11-30

How to Cite

Tandirerung, V. A., Fauziah, Sul Fitriana, Putri Rahayu, & Dzaky Raihan Muharram. (2023). Analysis Of Data Security Systems In Business Organizations. Journal of Embedded Systems, Security and Intelligent Systems, 4(2), 201–205. Retrieved from https://journal.unm.ac.id/index.php/JESSI/article/view/1124