2020 Fifth International Conference on Informatics and Computing (ICIC) 2020
DOI: 10.1109/icic50835.2020.9288593
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Risk Management Planning of Digital Certificate Management Case Study: Balai Sertifikasi Elektronik

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…In the fourth stage, the interview results that had been conducted were processed into data that was a risks and findings identification of problems occurring in the SIASAT. The risk was measured based on the generated impact or influence on the likelihood of risk [14]. Thus, based on the findings, recommendations for improvement can be given, and the conclusions from the study results can also be drawn.…”
Section: B Research Stagesmentioning
confidence: 99%
“…In the fourth stage, the interview results that had been conducted were processed into data that was a risks and findings identification of problems occurring in the SIASAT. The risk was measured based on the generated impact or influence on the likelihood of risk [14]. Thus, based on the findings, recommendations for improvement can be given, and the conclusions from the study results can also be drawn.…”
Section: B Research Stagesmentioning
confidence: 99%
“…The National Cyber and Crypto Agency through the ECO manages this task to provide e-certification services in Indonesia. Previous studies on e-certification have focused more on the management and business aspects such as information security risk management planning of digital certificate management (Hermawan, 2019;Sensuse et al, 2020), e-commerce (Setiawan, 2015), and the preparation of Certificate Policy documents and Certification Practice Statements as basic standards in building Indonesia National Public Key Infrastructure (Gandhi et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…The organization ensures that repeated information security risk assessments will provide consistent, valid and comparable results. ISO 27001 regulates the information security risk management process which includes four stages: Plan, Do, Check, and Act (ISO/IEC 27001 2013) (ISO/IEC 27005 2018).The information security risk management process is based on ISO 27001 and Plan-Do-Check-Act (PDCA) model (Sensuse et al 2020). The following is alignment between information security risk management processes and management systems; (1) The Plan activity process is in line with the context establishment, risk assessment, develop a risk management plan, risk acceptance stages.…”
Section: Introductionmentioning
confidence: 99%