PENERAPAN MANAJEMENLAYANAN TEKNOLOGI INFORMASI MENGGUNAKAN FRAMEWORK INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY V.3 (studi kasus STMIK Mardira Indonesia)

Jajat Sudrajat, Yucki Prihadi, Agus Iim Suryana

Abstract


In the implementation of governance, information security factor is a very important aspect to be noticed, considering the performance of governance will be disrupted if the information as one of the main objects of governance experience information security issues concerning confidentiality, integrity, and availability. Because of this, it is necessary to have operational standard procedures to minimize the level of vulnerability. So we need an adequate information security management for system users to become safer and more comfortable.The operational standards are based on the information technology infrastructure library version 3 sub-service domain design service service catalog management and information security management to support adequate IT management and management.The result of this design is Standard Operating Procedure (SOP) for IT services. We expect this research can help STMIK Mardira Indonesia to improve its service capability and improve its security and role.

Keywords: IT Services, ITIL V3, Service Design, Standard Operating Procedure


DOI : http://doi.org/10.5281/zenodo.3625315


Full Text:

PDF

References


Tim Direktorat Keamanan Informasi, Panduan Penerapan Tata Kelola Keamanan Informasi Bagi Penyelenggara Pelayanan Publik, Jakarta: Kominfo, 2011

James.A.F. Stoner dan Freeman. 2000. “ Manajemen ”. prenhalindo, Jakarta

Arikunto, S. 2002. Prosedur Penelitian Suatu Pendekatan. Jakarta : Rineka Cipta

Sugiono, 2012. Metode Penelitian Kuantitatif, Kualitatif dan R & D. Bandung : ALFABETA 2012

Hayati, Mardhiya & Muhammad Rudyato A. January 2013. Risk Assessment dan Business Impact Analysis Sebagai Dasar Penyusunan Disaster Plan (Studi Kasus Di STMIK AMIKOM Yogyakarta). Paper. Januari 2013.

Suwirno, 2012. Tata Kelola Sistem/ Teknologi Informasi. http://dinus.ac.id/repository/docs/ajar/sesi_1_tatakelola_TI_1.ppt. Diakses 07 Juni 2017 Pukul 10.30 WIB

Tim Direktorat Kemanan Informasi. 2011. Tata Kelola Keamanan Informasi Bagi Penyelenggara Pelayanan Publik. Direktorat Keamanan Infromasi. Direktorat Jendral Aplikasi Informatika Kementerian Komunikasi dan Informatika Republik Indonesia.

Rastogi, R & Von Solms, R. 2006. Information Security Governance a Re-definition. IFIP International Federatiian for Information Processing, Volume 193/2006, Springer Boston.

Musda, 2017. An Introductory Overview Of ITIL V3(Terjemahan ITIL V3).

siti_r.staff.gunadarma.ac.id/Downloads/files/.../Buku IT Service Management.pdf

Moekijat, 2008. Administrasi Perkantoran , Bandung, Mandar Maju

Susanto,Tony,D,Manajemen Layanan Teknologi Informasi, Asosiasi Sistem Informasi Indonesia 2016

http://sdamzavas.net/1-1156.html 5-6-2017

https://www.tutorialspoint.com/itil/service_continuity_management.htm 5/6/2017

Harris, S. 2006. Infromation Security Governance Guide. Diakses dari http://searchsecurity.techtarget.com/tutorial/Information-Security-Governance-Guide. Pada tanggal 15 September 2017 Pukul 19:32 WIB

Undang -undang No. 12 Tahun 2012 Tentang Pendidikan Tinggi

https://www.ucisa.ac.uk//.../servicedesign/service%20design. [diakses Mei 2017]

http://ejournal.unp.ac.id/index.php/iipk/article/viewFile/8161/6244[diakases Mei 2017]

https://www.jurnal.id/id/blog/2017-mengenal-manfaat-cara-pembuatan-dan-contoh-sop/ [diakses Mei 2017]

Richardus Eko Indrajit , Konsep Dasar Tata Kelola Teknologi Informasi. Diakses dari https://www.academia.edu/30100457/Tata_Kelola_Teknologi_Informasi[diakses juni 2017]

Richardus Eko Indrajit, Memastikan Keamanan Sistem. Diakses dari https://www.academia.edu/14369134/Memastikan_Keamanan_Sistem [juni 2017]

Richardus Eko Indrajit, Kebijakan Keamanan Informasi. Diakses dari https://www.academia.edu/14326531/Kebijakan_Keamanan_Informasi [Juni 2017]

Richardus Eko Indrajit, Empat Domain Kerawanan Sistem. Diakses dari https://docplayer.info/74674-Empat-domain-kerawanan-sistem-prof-richardus-eko-indrajit.html [juni 2017]

Ayodya Dewangga Kerangka untuk Tata Kelola Keamanan Informasi diSektorPublik.Diaksesdarihttps://www.academia.edu/30899922/Kerangka_untuk_Tata_Kelola_Keamanan_Informasi_di_Sektor_publik [juni 2017]

Julia H. Allen at All, Software Security Engineering, Aguide for Project Manager. Addison – Wesley April 2008


Refbacks

  • There are currently no refbacks.


Copyright (c) 2019

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.