CFP last date
20 January 2025
Reseach Article

Risk Management Analysison Administration System using OCTAVE Allegro Framework

by Muh. Sukri, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 17
Year of Publication: 2021
Authors: Muh. Sukri, Imam Riadi
10.5120/ijca2021920981

Muh. Sukri, Imam Riadi . Risk Management Analysison Administration System using OCTAVE Allegro Framework. International Journal of Computer Applications. 174, 17 ( Feb 2021), 5-11. DOI=10.5120/ijca2021920981

@article{ 10.5120/ijca2021920981,
author = { Muh. Sukri, Imam Riadi },
title = { Risk Management Analysison Administration System using OCTAVE Allegro Framework },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2021 },
volume = { 174 },
number = { 17 },
month = { Feb },
year = { 2021 },
issn = { 0975-8887 },
pages = { 5-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number17/31767-2021920981/ },
doi = { 10.5120/ijca2021920981 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:21.274644+05:30
%A Muh. Sukri
%A Imam Riadi
%T Risk Management Analysison Administration System using OCTAVE Allegro Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 17
%P 5-11
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ahmad Dahlan University KKN services have been managed using an information system that can manage KKN services at Ahmad Dahlan University, for example KKN scheduling, determining KKN groups and determining the location and field supervisors for each unit. This system is called SIMKAT UAD (Service and community information system), SIMKAT UAD allows risks that can interfere with information assets and organizational goals. This study uses the OCTAVE Allegro framework. OCTAVE Allegro has eight stages, namely building risk measurement criteria, developing information asset profiles, identifying containers of information assets, identifying areas of concern, identifying threat scenarios, identifying risks, analyzing risks, and choosing a mitigation approach. Organizations have choices, namely accept, defer, or reduce (mitigate) the risks that may occur. Based on the final results of interviews and risk assessments conducted at the Institute for Research and Community Service (LPPM UAD) obtained The result with the mitigate approach is 4, accept number 1, and defer amount to 2. And the highest relative risk value is obtained in the physical container with the number 32, namely the occurrence of a natural disaster which causes the service to stop while the lowest relative value is obtained on the technical container, namely: disruption Services due to crashes on the service system or operating system, Misuse of access rights such as username and password. If known by other parties, other than administrators, security gaps are exploited by other parties. Each of them number 19.

References
  1. E. Handoyo, R. Umar, and I. Riadi, "Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration (CMMI)," Sci. J. Informatics, vol. 6, no. 2, pp. 193–202, 2019.
  2. A. Wiraniagara and F. Wijaya, "Analysis of Information Technology Governance Using the Cobit 5 Domain Deliver Support and Service Framework (Case Study: Eka Tjipta Foundation, Jakarta)," vol. 5, pp. 663–671.
  3. A. Basir, A. Fadlil, and I. Riadi, "Enterprise Architecture Planning for Academic Information Systems with TOGAF ADM," J-SAKTI (Jurnal Sains Komputan. And Inform., Vol. 3, no. 1, p. 1, 2019.
  4. C. Sylvia, h. Handoko, a. Woen, and c. Yang, “Risk Management Analysis of Electronic-Based Learning System,” no. June, 2019.
  5. MB. Dr. Mamduh M. Hanafi,, Risk ManagementYogyakarta: UPP STIM YKPN, 2016.
  6. SRY Ahmad, "Analysis of User Acceptance of the Application of Information Systems Using the Technology Acceptance Model," Thesis, vol. 4, pp. 924–929, 2012.
  7. Analysis Of The Effect Of Corporate Governance And Company Characteristics On The Existence Of The Risk Management Committee (Case Study Of Companies Listing On The Idx For The Period 2008-2010)Yogyakarta: Upp Stim Ykpn, 2009.
  8. H. Darmawi, Risk Management / Herman Darmawi. Jakarta: Bumi Aksara, 2010.
  9. R. a R. a. C. Caralli, JF Stevens, LR Young, and WR Wilson, “Introducing OCTAVE Allegro: Improving the Informa tion Security Risk Assessment Process, ” Young, no. May, pp. 1–113, 2007.
  10. Aristasari, P. (2019) 'Risk Management in a Learning Management System (LMS) Using the OCTAVE Allegro Framework.
  11. Arum, kalkim 2018.Risk Analysis ofAssessment UsingAllegro Octave Framework Case Study of Library Management Information System SMA Muhammadiyah 1 Yogyakarta. Thesis, Information Systems, Ahmad Dahlan University, Yogyakarta
  12. Caralli, RA, Steven, JF, Young, LR, & Wilson, RW 2007. Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process. USA: Carnegie Mellon University Software Engineering Institute.
  13. Chairunis, ED (2019) 'Analysis of Risk Assessment on EPrints Repository Services Using the OCTAVE Framework Allegro
  14. Dewi, NAN and I Gusti Putu Hardi Yudana. 2016. Risk Management Analysis on Academic Systems at STMIK STIKOM Bali. National Seminar on Information and Multimedia Technology 2016 (p. 7-12). Yogyakarta: STMIK AMIKOM Yogyakarta.
  15. Husein, GM and Radiant Victor Imbar. 2015. Analysis of Risk Management for Information Technology Implementation in the Document Management System at PT. West Java Telematics (JATEL). Journal of Informatics Engineering and Information Systems, 1 (2), 75-87..
  16. Jakaria, D., R. Teguh Dirgahayu, and Hendrik. Risk Management of Academic Information Systems in Higher Education Using the OCTAVE Allegro Method. National Seminar on Information Technology Application (SNATI) 2013. Yogyakarta.
  17. Lokobal, A., Marthin DJ Sumajouw, Dan Bonny F. Sompie. 2014. Risk Management in Construction Implementation Service Companies in Papua Province. Scientific Journal of Media Engineering, 4 (2), 109-118.
  18. Mulyawan, Faithful, 2015. Risk Management, Bandung: Pustaka Setia.
  19. Nuryanto, Hery, 2012. History of Information and Communication Technology,Jakarta: Balai Pustaka.
  20. Rosini, Meutia Rachmaniah, and Badollahi Mustafa. Information Vulnerability Risk Assessment Using the OCTAVE Allegro Method. Indonesian Librarian Journal, 14 (1), 14-22.
  21. Saputra, Dwi Fajar. Eprints Application Management Module. Jakarta: Jakarta State University.
  22. Saragih, SP (2018) 'Implementation of Octave-S in the Evaluation of Information System Risk Management at the Batam Health Training Center'.
  23. Supriyanto, Wahyu and Ahmad Muhsin. 2008. Library Information Technology. Yogyakarta: Kanisius.
  24. Suryani and Hendriyadi. 2015. Quantitative Research Methods: Theory and Applications in Islamic Economics and Management Research. Jakarta: Prenada Media.
Index Terms

Computer Science
Information Sciences

Keywords

Risk Management OCTAVE Allegro