KAJIAN KEAMANAN SISTEM INFORMASI Dl BANK BTN

Pudjiantoro, Wibowo (2004) KAJIAN KEAMANAN SISTEM INFORMASI Dl BANK BTN. Masters thesis, Institut Pertanian Bogor.

[img]
Preview
PDF
12e-01-wibowo-cover.pdf - Published Version

Download (57kB)
[img]
Preview
PDF
12e-02-wibowo-abstrack.pdf - Published Version

Download (83kB)
[img]
Preview
PDF
12e-03-wibowo-ringkasaneksekutif.pdf - Published Version

Download (176kB)
[img]
Preview
PDF
12e-04-wibowo-daftarisi.pdf - Published Version

Download (96kB)
[img]
Preview
PDF
12e-05-wibowo-bab1pendahuluan.pdf - Published Version

Download (198kB)
Official URL: http://elibrary.mb.ipb.ac.id

Abstract

The goal of this research is to find the description about maximal' on of security information system in Bank XYZ with doing analysis security system (input, output, process and storage), analysis of facility security and procedure security. The research uses prime and second data, which prime data is found from the answer of respondents from the users of branches and head office, the total respondents is 46 sample of 170 population, include second data from the literature internal Bank XYZ and external. The result research is analyzed with the method analysis frequency statistic descriptive and cross tabulation with the software SPSS for windows release 11.5.0 and Microsoft excel. Base on the result, condition of security information system in Bank BTN in a few parts of security information system which is not maximal. The parts which is not optimal are(1) System Control (l.l) input Control(a)Repairing of using key words by user and system(b)Facility automatic logout @)Alert system for operational users(d)The recovery data facility (1.2)Process Control(a)Process customers information file (b)Management of utilization processor capacity arid memory (1.3) Output control (a) Distribution Reports (b)Management Reports(2)Facility Control (2.1)Network Security (a) Encryption (2.2) Physic Facility Security(a) CCTV(2.3) Failure computer Security(a)Supporting tools(b)Data communication monitoring(c)Rescue or Start up Disk (3) Procedure Control (a)Standard Operational Procedure is(b) Authorization Procedure(c)Disaster Recovery Procedure (d) User Control Procedure Base on the result of this research, there are a few suggestions for management :(I) Do to Maximal security information system about password :(a) Have to repair system parameter about access level and password which this repairing base on password security that key in password must be more than 6 characters, so we cannot find the computer users key in the password less than 6 characters. (Because password as the key into the application, so easily password have to be ignored by computer users. (2)We have to repair using computer management which is operated by system administrator(3)We have to concern to with alert system facility for internal and external interest as money laundering transaction, because the effect is so wide not only in domestic law include the international rule(4)Recovery Data is presented in all operation systems as ASl400, windows 2000. windows 2003 and Unix, the collaboration between application system and operation system can be used and grown for maximal this facility(5)Customer information file can be done by investigate for CIF system parameter(6)Monitoring of utilization memory, processor. computer, and supporting tool include communication data maintenance and have to be concern to maximal NMS function (Network Management System) which issued to monitor that condition. An8 also have to upgrade the capacity and more efficient in capacity.(7)Socialization standard operations procedure to all employee

Item Type: Thesis (Masters)
Uncontrolled Keywords: Keamanan sistem informasi, kajian keamanan sistem, kajian keamanan fasilitas, kajian keamanan prosedur, maksimal
Subjects: Manajemen Sistem Informasi
Depositing User: Staff-3 Perpustakaan
Date Deposited: 02 Jan 2012 12:16
Last Modified: 02 Jan 2012 12:16
URI: http://repository.sb.ipb.ac.id/id/eprint/801

Actions (login required)

View Item View Item