16
UIN SUSKA RIAU Mhd Sayuti Nur Nst 11353105716 Kontrol dan Audit Sistem Informasi SISTEM INFORMASI

Cobit 5 - Kontrol dan Audit Sistem informasi

Embed Size (px)

Citation preview

Page 1: Cobit 5 - Kontrol dan Audit Sistem informasi

UIN SUSKA RIAU

Mhd Sayuti Nur Nst11353105716

Kontrol dan Audit Sistem Informasi

SISTEM INFORMASI

Page 2: Cobit 5 - Kontrol dan Audit Sistem informasi

For Information Security

ISACA defines information security as something that:

Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).

UIN SUSKA RIAU SISTEM INFORMASI

Page 3: Cobit 5 - Kontrol dan Audit Sistem informasi

Confidentiality means preserving authorised restrictions on access and disclosure, including means for protecting

privacy and proprietary information.

UIN SUSKA RIAU SISTEM INFORMASI

Page 4: Cobit 5 - Kontrol dan Audit Sistem informasi

Integrity means guarding against improper information

modification or destruction, and includes ensuring

information non-repudiation and authenticity.

UIN SUSKA RIAU SISTEM INFORMASI

Page 5: Cobit 5 - Kontrol dan Audit Sistem informasi

Availability means ensuring timely and reliable access to and use of information

UIN SUSKA RIAU SISTEM INFORMASI

Page 6: Cobit 5 - Kontrol dan Audit Sistem informasi

Count…

Although several other definitions of the term exist, this definition provides the very basics of information security as it covers the confidentiality, integrity and availability (CIA) concept. It is important to note that while the CIA concept is globally accepted, there are broader uses of the term ‘integrity’ in the wider business context. COBIT 5 covers this term in the information enabler as information goals of completeness and accuracy.

COBIT 5 for Information Security is limited to the security view of this term and builds on this definition to describe how information security can be applied in real life, taking into account the COBIT 5 principles.

UIN SUSKA RIAU SISTEM INFORMASI

Page 7: Cobit 5 - Kontrol dan Audit Sistem informasi

Count…

Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying.

UIN SUSKA RIAU SISTEM INFORMASI

Page 8: Cobit 5 - Kontrol dan Audit Sistem informasi

For Risk

Enterprises exist to create value for their stakeholders. Consequently, any enterprise, commercial or not, has value creation as a governance objective. Value creation means realising benefits at an optimal resource cost while optimising risk (figure 4). Benefits can take many forms, e.g., financial for commercial enterprises or public service for government entities.

UIN SUSKA RIAU SISTEM INFORMASI

Page 9: Cobit 5 - Kontrol dan Audit Sistem informasi

Count…

Enterprises have many stakeholders, and ‘creating value’ means different, and sometimes conflicting, things to each stakeholder. Governance is about negotiating and deciding amongst different stakeholder value interests.

UIN SUSKA RIAU SISTEM INFORMASI

Page 10: Cobit 5 - Kontrol dan Audit Sistem informasi

Risk is generally defined as the combination of the probability of an event and its consequence (ISO Guide 73). Consequences are that enterprise objectives are not met. COBIT 5 for Risk defines IT risk as business risk, specifically, the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. IT risk consists of IT-related events that could potentially impact the business. IT risk can occur with both uncertain frequency and impact and creates challenges in meeting strategic goals and objectives.

UIN SUSKA RIAU SISTEM INFORMASI

Page 11: Cobit 5 - Kontrol dan Audit Sistem informasi

IT risk always exists, whether or not it is detected or recognised by an enterprise

UIN SUSKA RIAU SISTEM INFORMASI

Page 12: Cobit 5 - Kontrol dan Audit Sistem informasi

IT risk can be categorised as follows:

IT benefit/value enablement risk - Associated with missed opportunities to use technology to improve efficiency or effectiveness of business processes or as an enabler for new business initiatives.

IT programmer and project delivery risk - Associated with the contribution of IT to new or improved business solutions, usually in the form of projects and programmes as part of investment portfolios

IT operations and service delivery risk - Associated with all aspects of the business as usual performance of IT systems and services, which can bring destruction or reduction of value to the enterprise.

UIN SUSKA RIAU SISTEM INFORMASI

Page 13: Cobit 5 - Kontrol dan Audit Sistem informasi

Figure 5 shows that for all categories of downside IT risk (‘Fail to Gain’ and ‘Lose’ business value) there is an equivalent upside (‘Gain’ and ‘Preserve’ business). For example:

• Service delivery - If service delivery practices are strengthened, the enterprise can benefit, e.g, by being ready to absorb additional transaction volumes or market share.

• Project delivery - Successful project delivery brings new business functionality.

UIN SUSKA RIAU SISTEM INFORMASI

Page 14: Cobit 5 - Kontrol dan Audit Sistem informasi

It is important to keep this upside/downside duality of risk in mind (see figure 6) during all risk-related decisions. For example, decisions should consider:

• The exposure that may result if a risk is not mitigated versus the benefit if the associated loss exposure is reduced to an acceptable level.

• The potential benefit that may accrue if opportunities are taken versus missed benefits if opportunities are foregone.

UIN SUSKA RIAU SISTEM INFORMASI

Page 15: Cobit 5 - Kontrol dan Audit Sistem informasi

Risk is not always to be avoided. Doing business is about taking risk that is consistent with the risk appetite, i.e, many business propositions require IT risk to be taken to achieve the value proposition and realise enterprise goals and objectives, and this risk should be managed but not necessarily avoided.

UIN SUSKA RIAU SISTEM INFORMASI

Page 16: Cobit 5 - Kontrol dan Audit Sistem informasi

UIN SUSKA RIAU SISTEM INFORMASI