Future of Information and Communication Conference (FICC) 2025
28-29 April 2025
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 6 Issue 2, 2015.
Abstract: One of control domain of Cobit describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity of the information assets of IT where this all requires a security management process. One of the process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. Because Cobit is not explained technically so it needs a method to utilizes data that has been standardized. One of the standardized database for vulnerability is CVE (Common Vulnerabilites and Exposures).This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research is to create tool for vulnerability assessment and tool to calculate maturity model.
Andrey Ferriyan and Jazi Eko Istiyanto, “Data Center Governance Information Security Compliance Assessment Based on the Cobit Framewok” International Journal of Advanced Computer Science and Applications(IJACSA), 6(2), 2015. http://dx.doi.org/10.14569/IJACSA.2015.060205
@article{Ferriyan2015,
title = {Data Center Governance Information Security Compliance Assessment Based on the Cobit Framewok},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2015.060205},
url = {http://dx.doi.org/10.14569/IJACSA.2015.060205},
year = {2015},
publisher = {The Science and Information Organization},
volume = {6},
number = {2},
author = {Andrey Ferriyan and Jazi Eko Istiyanto}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.