MEMBUAT, MENGELOLA RESIKO DAN KRIMINALITAS SISTEM INFORMASI Pertemuan-10 Mata Kuliah: CSS-113, Konsep Sistem Informasi Tahun Akademik: 2012/2013 Sasaran.

Slides:



Advertisements
Presentasi serupa
Tahapan information engineering
Advertisements

Be thankful that you don’t already have everything you desire If you did, what would there be to look forward to ? Bersyukurlah karena engkau tidak memiliki.
Be thankful that you don’t already have everything you desire If you did, what would there be to look forward to ? Bersyukurlah karena engkau tidak memiliki.
Managing Software Requirements (manajemen kebutuhan perangkat lunak)
RESOLUTION DECISIONS.. “Do I STAY? Or should I GO?” “Is He (or She) the RIGHT one for me?” “Should I BUY this? Or SELL that?” “Should I INVEST in.
Agile Software Development
RENCANA PENGEMBANGAN PERANGKAT LUNAK (RPPL)
Oleh : Saripudin,MT.  After studying this chapter, you will be able to:  Recognize the difficulties in managing information resources.  Understand.
BAHAN AJAR SPEAKING CLASS XII / IPA,IPS
Control Objectives for Information and related Technology
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and.
Dasar-dasar Audit Sistem Informasi
Testing Implementasi Sistem Oleh :Rifiana Arief, SKom, MMSI
Menulis Kolom  Kolom adalah opini atau artikel. Tidak seperti editorial, kolom memiliki byline.  Kolom Biasanya ditulis reguler. Biasanya mingguan atau.
Oleh Agus Prihanto, ST, M.Kom
1 Pertemuan 12 Pengkodean & Implementasi Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
The Bug Tracking Database (1) Pertemuan 6
1 Pertemuan 8 Manusia dan hambatannya dalam penggunaan teknologi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
Manajemen Pembiayaan Bank Syariah
Psikologi Konsumen. Perilaku konsumen Adalah studi tentang konsumen, mengenai mempertukarkan sesuatu yang bernilai dengan produk atau jasa yang memuaskan.
Kualitas Perangkat Lunak (lanjutan) Pertemuan 3
MANUSIA DAN HAMBATANNYA DALAM PENGGUNAAN TEKNOLOGI Pertemuan-8 Mata Kuliah: CSS=113, Konsep Sistem Informasi Tahun Akademik: 2012/2013 Sasaran Pembelajaran.
Perencanaan Pengujian (Test Plan) Pertemuan 4
1 Pertemuan 6 Hubungan WCA dan Sistem Informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
Computer Fraud Pertemuan XV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Tujuan : Mahasiswa dapat Mengidentifikasi pengertian dasar pengembangan sistem melalui SDLC.
Mata Kuliah: CSS-113, Konsep Sistem Informasi Tahun Akademik: 2012 / 2013 PEMILIHAN STRATEGI SISTEM INFORMASI YANG MENDUKUNG PERKEMBANGAN BISNIS Pertemuan-13.
1 INTRODUCTION Pertemuan 1 s.d 2 Matakuliah: A0554/Analisa dan Perancangan Sistem Informasi Akuntansi Tahun: 2006.
The following short quiz consists of 4 questions and tells whether you are qualified to be a "professional". The questions are not that difficult, so.
PERFORMANCE-BASED ASSESMENT DEFINITION CHARACTERISTIC S DESIGNING PERFORMANCE ASSESSMENT END TERM OF PERFORMANCE ASSESSMENT.
SMART GRID Group 26: Trang Trieu Grace Truong Nicki Tran Lisa Trinh.
Management Information Systems, 10/e
Software Engineering Process
Chapter 6 Foundations of Business Intelligence: Databases and Information Management.
Pert. 16. Menyimak lingkungan IS/IT saat ini
Support System IT Putri Taqwa Prasetyaningrum,S.T.,M.T.
IT AUDITS IT audits: pemeriksaan terhadap proses atau data yang melekat dengan teknologi informasi. Berkaitan dengan internal, external, dan fraud audits.
brings you a great solution
PENDIDIKAN KARAKTER DALAM MATA PELAJARAN FISIKA SMA
Perancangan Basis Data
Software Engineering Rekayasa Perangkat Lunak
Bug Tracking Database (2) Pertemuan 7
HUBUNGAN WCA DAN SISTEM INFORMASI
Kuis 1 April 2017 Pilih Suatu Proyek IT
Manajemen Resiko TI dan Sistem Informasi
SYSTEMS INVESTIGATION Pertemuan 3 s.d 6
Upaya Mengatasi Kecemasan dalam Menghadapi Masa Depan
Manajemen Pembiayaan Bank Syariah
Dasar-Dasar Sistem Informasi
Rekayasa Perangkat Lunak Part-5
BAHASA INGGRIS Expressing Sympathy Expressing Compliment
CYBER CRIME Fahrobby adnan S.KOM., MMSI
4 plan.
Welcome 8clicks Pte Ltd. About us  8CLICKS PTE LTD is best web Development Company in Singapore. It is famous for their web designing services. 8CLICKS.
How You Can Make Your Fleet Insurance London Claims Letter.
How Can I Be A Driver of The Month as I Am Working for Uber?
How the Challenges Make You A Perfect Event Organiser.
Things You Need to Know Before Running on the Beach.
How to Pitch an Event
Don’t Forget to Avail the Timely Offers with Uber
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
INTERROGATIVE ADJECTIVE. DEFINITION FUNCTION EXAMPLE QUESTION.
Right, indonesia is a wonderful country who rich in power energy not only in term of number but also diversity. Energy needs in indonesia are increasingly.
Website: Website Technologies.
A SHORT ESSAY OF CIVIL ENGINEERING BY : ALFATIHATU RAHMI CIVIL ENGINEERING ENGINEERING FACULTY ANDALAS UNIVERSITY PADANG.
Draw a picture that shows where the knife, fork, spoon, and napkin are placed in a table setting.
2. Discussion TASK 1. WORK IN PAIRS Ask your partner. Then, in turn your friend asks you A. what kinds of product are there? B. why do people want to.
WINTER Template COLOUR CARD 01 Template. PowerPoint chart object 02.
Wednesday/ September,  There are lots of problems with trade ◦ There may be some ways that some governments can make things better by intervening.
Transcript presentasi:

MEMBUAT, MENGELOLA RESIKO DAN KRIMINALITAS SISTEM INFORMASI Pertemuan-10 Mata Kuliah: CSS-113, Konsep Sistem Informasi Tahun Akademik: 2012/2013 Sasaran Pembelajaran Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Menjelaskan sistem keamanan dan kontrol pada Teknologi Informasi 10-1

Materi Pokok Ancaman terhadap kegagalan project Ancaman terhadap tidak berfungsinya sistem Ancaman terhadap kriminalitas komputer Information System Security and Control Threat of Project Failure Threat of Accidents and Malfunctions Threat of Computer Crime Factors That Increase the Risks Methods for Minimizing Risks 10-2

Introductory Case: London Ambulance Service Wow, what a mess! What did they do wrong? Did they do anything right? Was this a system that should have even been attempted? 10-3

Threat of Project Failure When can projects fail? INITIATION The reasons for building the system have too little support. The system seems too expensive. DEVELOPMENT It is too difficult to define the requirements. The system is not technically feasible. The project is too difficult is too difficult for technical staff assigned. IMPLEMENTATION The system requires too great a change from existing work practices. Potential users dislike the system or resist using it. Too little effort is put into the implementation. OPERATION AND MAINTENANCE System controls are insufficient. Too little effort goes into supporting effective use. The system is not updated as business needs change. 10-4

Threat of Project Failure Remember this? What do you think the curve would look like for cost of failure? 10-5

Threat of Accidents and Malfunctions Operator error Hardware malfunction – Intel Pentium bug – Was like the embedded chip issue for Y2K Software bugs Data errors Damage to physical facilities – We’ll talk more about this for disaster recovery Inadequate system performance – London ambulance case 10-6

Threat of Computer Crime Theft – Physical (esp. laptops) Case of a laptop taken from the Pentagon in a conference room… Recently heard about Silicon Valley exec who lost laptop CCI insurance – Logical Unauthorized use Fraudulent data entry Unauthorized use/modification of data Sabotage and Vandalism – Trap door, Trojan Horse, Virus 10-7

Factors that Increase Risk Nature of Complex Systems Human Limitations Pressures in the Business Environment 10-8

Methods for Minimizing Risks Controlling System Development and Modifications Providing Security Training Maintaining Physical Security Controlling Access to Data, Computers, and Networks Controlling Transaction Processing Motivating Efficient and Effective Operation Auditing the Information System Preparing for Disasters 10-9

Minimize Risks… 10-10

Build the system correctly… Software change control 10-11

Train the users about security… Maintain physical security… 10-12

Prevent unauthorized access to hardware and software… Manual data handling Access privileges Access control – What you know – What you have – Where you are – Who you are 10-13

Prevent unauthorized access to hardware and software… Be aware of network issues – Encrypt if necessary 10-14

Perform transactions correctly… Segregation of duties Data validation Error correction Backup & recovery 10-15

Innovate for efficiency… Monitor systems Look for opportunities Look for incentives Look for disincentives 10-16

Audit your system… Trust but verify… 10-17

Prepare for disasters… Remember Murphy's Law 10-18

Closing Ancaman terhadap kegagalan project Ancaman terhadap tidak berfungsinya sistem Ancaman terhadap kriminalitas komputer 10-19

Diskusikan bersama kelompoknya dan Jawablah sendiri-sendiri 1.Jelaskanlah trend gangguan yang mengancam keamanan sistem komputer saat ini! 2.Jelaskanlah solusi yang dapat digunakan untuk mengatasi ancaman terhadap kegagalan project disetiap tahapnya! 3.Jelaskanlah siapakah yang bertanggung jawab terhadap keamanan sistem dalam perusahaan! ========== thanks 4 your attention ========== 10-20