2019
DOI: 10.24843/lkjiti.2019.v10.i01.p04
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Grr Rapid Response Network using COBIT 5 Framework

Abstract: Connection from the Internet is required to always be maintained under any conditions, but not always connectivity will run smoothly, lots of crowds or problems that require connections do not run smoothly. Application of security systems to overcome all problems and difficulties, both technical and non-technical which can affect system performance. GRR Rapid Response is the answer to internet network security. GRR asks for a client-server model, agents installed on the machine (client) to be able to communica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0
4

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 10 publications
0
3
0
4
Order By: Relevance
“…Hasil dari penelitian ini mendapatkan domain proses DSS01, DSS02, dan BAI09 berada pada level 2, domain proses DSS06 serta BAI08 ada pada level 1 [11]. Pada tahun 2019 juga terdapat penelitian menggunakan COBIT 5 untuk menganalisis keamanan jaringan respos cepat GRR [12].…”
Section: Pendahuluanunclassified
“…Hasil dari penelitian ini mendapatkan domain proses DSS01, DSS02, dan BAI09 berada pada level 2, domain proses DSS06 serta BAI08 ada pada level 1 [11]. Pada tahun 2019 juga terdapat penelitian menggunakan COBIT 5 untuk menganalisis keamanan jaringan respos cepat GRR [12].…”
Section: Pendahuluanunclassified
“…The application of security systems aims to overcome all problems and constraints, both technically and nontechnically which can affect the performance of the system such as availability, confidentiality and integrity factors so that the level of security [5]. Penetration testing is an emerging method to test the vulnerabilities in the system, identification of poor and improper system configuration, hardware & software flaws and operational weaknesses in the process or technical countermeasures [6].…”
Section: Penetration Testingmentioning
confidence: 99%
“…The main purpose of penetration testing is to identify system security weaknesses. In addition, it can also be used to test organizational security policies, awareness of organizational employees on security requirements, and the ability of organizations to identify and respond to security incidents [4,5]. Penetration testing process consists of information gathering, identifying penetration points, and reporting the results of testing [9].…”
Section: Penetration Testingmentioning
confidence: 99%
“…Penelitian terdahulu terkait dengan audit sudah pernah dilakukan dengan implementasi audit pada database [4] dan audit menggunakan framework Cobit 5 sudah pernah dilakukan sebelumnya, tujuan penelitian terdahulu yaitu untuk mengukur tata kelola keamanan informasi [5] dan analisis keamanan jaringan [6]. Penelitian ini dibandingkan penelitian-penelitian sebelumnya berbeda pada dinas yang dijadikan studi kasus yaitu Dinas Kebudayaan, Dinas Pariwisata, dan Dinas Sosial Kabupaten X dan dengan menggunakan pengukuran indikator kerja tahun 2022-2027.…”
Section: Introductionunclassified