Information Technology Risk Assessment: Octave-S Approach
Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and o...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Bina Nusantara University
2011-05-01
|
Series: | CommIT Journal |
Online Access: | https://journal.binus.ac.id/index.php/commit/article/view/549 |
_version_ | 1797708225586397184 |
---|---|
author | Bambang Gunawan Merry Merry Nelly Nelly |
author_facet | Bambang Gunawan Merry Merry Nelly Nelly |
author_sort | Bambang Gunawan |
collection | DOAJ |
description | Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.
Index Terms - IT, Risk Assessment, Octave-S |
first_indexed | 2024-03-12T06:19:15Z |
format | Article |
id | doaj.art-ec0c30d847b149a8805808dfe16ea75a |
institution | Directory Open Access Journal |
issn | 1979-2484 2460-7010 |
language | English |
last_indexed | 2024-03-12T06:19:15Z |
publishDate | 2011-05-01 |
publisher | Bina Nusantara University |
record_format | Article |
series | CommIT Journal |
spelling | doaj.art-ec0c30d847b149a8805808dfe16ea75a2023-09-03T02:23:21ZengBina Nusantara UniversityCommIT Journal1979-24842460-70102011-05-01511410.21512/commit.v5i1.549537Information Technology Risk Assessment: Octave-S ApproachBambang Gunawan0Merry Merry1Nelly Nelly2Binus UniversityBinus UniversityBinus UniversityPurpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company. Index Terms - IT, Risk Assessment, Octave-Shttps://journal.binus.ac.id/index.php/commit/article/view/549 |
spellingShingle | Bambang Gunawan Merry Merry Nelly Nelly Information Technology Risk Assessment: Octave-S Approach CommIT Journal |
title | Information Technology Risk Assessment: Octave-S Approach |
title_full | Information Technology Risk Assessment: Octave-S Approach |
title_fullStr | Information Technology Risk Assessment: Octave-S Approach |
title_full_unstemmed | Information Technology Risk Assessment: Octave-S Approach |
title_short | Information Technology Risk Assessment: Octave-S Approach |
title_sort | information technology risk assessment octave s approach |
url | https://journal.binus.ac.id/index.php/commit/article/view/549 |
work_keys_str_mv | AT bambanggunawan informationtechnologyriskassessmentoctavesapproach AT merrymerry informationtechnologyriskassessmentoctavesapproach AT nellynelly informationtechnologyriskassessmentoctavesapproach |