Information Technology Risk Assessment: Octave-S Approach
Journal: Communication and Information Technology Journal (Vol.5, No. 1)Publication Date: 2011-05-29
Authors : Bambang Gunawan; Merry; Nelly;
Page : 1-4
Keywords : IT; Risk Assessment; Octave-S;
Abstract
Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.
Other Latest Articles
- Control Evaluation Information System Savings
- The Development of a Web Based Database Applications of Procurement, Inventory, and Sales at PT. Interjaya Surya MegahThe Development of a Web Based Database Applications of Procurement, Inventory, and Sales at PT. Interjaya Surya Megah
- Application of Malaria Detection of Drawing Blood Cells using Microscopic OpenCV
- Technology Options to Support the Implementation of Knowledge Management
- The Analysis and The Design of E-Marketing Strategy at SMES (A Case Study: The Dare to Dream Indonesia Community)
Last modified: 2015-11-17 11:53:33