APLIKASI SISTEM MANAJEMEN KEAMANAN INFORMASI BERBASIS ISO 27001 : 2013 MENGUNAKAN FRAMEWORK LARAVEL

The plurality of information, the crucial impact of information dissemination, as well as cybercrimes, are some of the many reasons why each data and information storage unit and system. For its availability, its accuracy and integrity must be maintained, or what is commonly abbreviated as CIA (conf...

Full description

Saved in:
Bibliographic Details
Main Author: Adam Baryadi Pramono, (Author)
Format: Book
Published: 2022-07-27.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_19958
042 |a dc 
100 1 0 |a Adam Baryadi Pramono, .  |e author 
245 0 0 |a APLIKASI SISTEM MANAJEMEN KEAMANAN INFORMASI BERBASIS ISO 27001 : 2013 MENGUNAKAN FRAMEWORK LARAVEL 
260 |c 2022-07-27. 
500 |a http://repository.upnvj.ac.id/19958/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/19958/13/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/19958/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/19958/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/19958/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/19958/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/19958/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/19958/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/19958/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/19958/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/19958/11/HASIL%20PLAGIARISME.pdf 
500 |a http://repository.upnvj.ac.id/19958/12/ARTIKEL%20KI.pdf 
520 |a The plurality of information, the crucial impact of information dissemination, as well as cybercrimes, are some of the many reasons why each data and information storage unit and system. For its availability, its accuracy and integrity must be maintained, or what is commonly abbreviated as CIA (confidentiality, integrity, and availability). To ensure the existence of the CIA in information, especially in a state agency or company in general, it is necessary to have an Information Security Management System (SMKI). This Information Security Standard is called ISO 27001. Researchers start the research by collecting data, including literature studies to identify problems. After that, the author uses the waterfall application development method as the basis for making applications. The results of the study are in the form of an index or score, which will be displayed according to indicators taken from the ISO 27001:2013 standard and are web-based, which will make it easier to modify. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a T Technology (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/19958/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/19958/  |z Link Metadata