Information Technology Risk Assessment: Octave-S Approach

Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and o...

Full description

Bibliographic Details
Main Authors: Bambang Gunawan, Merry Merry, Nelly Nelly
Format: Article
Language:English
Published: Bina Nusantara University 2011-05-01
Series:CommIT Journal
Online Access:https://journal.binus.ac.id/index.php/commit/article/view/549
_version_ 1797708225586397184
author Bambang Gunawan
Merry Merry
Nelly Nelly
author_facet Bambang Gunawan
Merry Merry
Nelly Nelly
author_sort Bambang Gunawan
collection DOAJ
description Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company. Index Terms - IT, Risk Assessment, Octave-S
first_indexed 2024-03-12T06:19:15Z
format Article
id doaj.art-ec0c30d847b149a8805808dfe16ea75a
institution Directory Open Access Journal
issn 1979-2484
2460-7010
language English
last_indexed 2024-03-12T06:19:15Z
publishDate 2011-05-01
publisher Bina Nusantara University
record_format Article
series CommIT Journal
spelling doaj.art-ec0c30d847b149a8805808dfe16ea75a2023-09-03T02:23:21ZengBina Nusantara UniversityCommIT Journal1979-24842460-70102011-05-01511410.21512/commit.v5i1.549537Information Technology Risk Assessment: Octave-S ApproachBambang Gunawan0Merry Merry1Nelly Nelly2Binus UniversityBinus UniversityBinus UniversityPurpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company. Index Terms - IT, Risk Assessment, Octave-Shttps://journal.binus.ac.id/index.php/commit/article/view/549
spellingShingle Bambang Gunawan
Merry Merry
Nelly Nelly
Information Technology Risk Assessment: Octave-S Approach
CommIT Journal
title Information Technology Risk Assessment: Octave-S Approach
title_full Information Technology Risk Assessment: Octave-S Approach
title_fullStr Information Technology Risk Assessment: Octave-S Approach
title_full_unstemmed Information Technology Risk Assessment: Octave-S Approach
title_short Information Technology Risk Assessment: Octave-S Approach
title_sort information technology risk assessment octave s approach
url https://journal.binus.ac.id/index.php/commit/article/view/549
work_keys_str_mv AT bambanggunawan informationtechnologyriskassessmentoctavesapproach
AT merrymerry informationtechnologyriskassessmentoctavesapproach
AT nellynelly informationtechnologyriskassessmentoctavesapproach