Edi Surya Negara Harahap
Bina Darma, Faculty of Computer, Faculty Member
ABSTRACT Information is one of a very valuable asset owned by a company or organization. Sufficient resources and adequate, should be allocated to protect information assets through the implementation of information systems security... more
ABSTRACT Information is one of a very valuable asset owned by a company or organization. Sufficient resources and adequate, should be allocated to protect information assets through the implementation of information systems security policies measured in accordance with existing standards. Bina Darma University is one of the university in South Sumatra that carry out education system by using information technology. Therefore we need an information security policy in accordance with the standards of information security. Information security policies are able to developed based on standard Information Security Management System (ISMS) or better known as the Information Security Management System (ISMS) ISO / IEC 27001. Information security management system provides a systemic approach to the form control objective in managing sensitive information with the aim of securing information. The approach taken to achieve this is to use the model of Plan-Do-Check-Act (PDCA). PDCA is a recurring activity to solve a problem of quality control.
ABSTRACT Information technology architecture based cloud computing become one of the architectural model for the university's information technology development. cloud computing security on the network and system architecture has... more
ABSTRACT Information technology architecture based cloud computing become one of the architectural model for the university's information technology development. cloud computing security on the network and system architecture has become an important issue recently due to the increasing dependence of organizations and the people in the system. So with the standardization of information security technologies will have a signi�cant impact in improving the safe use of the system. A review of the security framework of information technology will be presented in this paper. This paper will review some of the recommended framework for the security of information technology development based on cloud computing such as: European Network and Information Security Agency (ENISA), Cloud Security Alliance (CSA), National Institute of Standards and Technology (NIST).