arie rahman satria ( 11353100515 )

17

Upload: arie-rahman-satria

Post on 12-Apr-2017

23 views

Category:

Education


4 download

TRANSCRIPT

Page 1: Arie rahman satria ( 11353100515 )
Page 2: Arie rahman satria ( 11353100515 )
Page 3: Arie rahman satria ( 11353100515 )

Kontrol dan Audit Sistem Informasi

Arie Rahman Satria 11353100515

COBIT 5

Page 4: Arie rahman satria ( 11353100515 )

COBIT 5For information

security

Page 5: Arie rahman satria ( 11353100515 )

ISACA defines information security as something that:

Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).

Page 6: Arie rahman satria ( 11353100515 )

• Confidentiality means preserving authorised restrictions on

access and disclosure, including means for protecting privacy

and proprietary information.

• Integrity means guarding against improper information

modification or destruction, and includes ensuring information

non-repudiation and authenticity.

• Availability means ensuring timely and reliable access to and

use of information

Page 7: Arie rahman satria ( 11353100515 )

Although several other definitions of the term exist, this definition provides the very basics of information security as it covers the confidentiality, integrity and availability (CIA) concept. It is important to note that while the CIA concept is globally accepted, there are broader uses of the term ‘integrity’ in the wider business context. COBIT 5 covers this term in the information enabler as information goals of completeness and accuracy.

Page 8: Arie rahman satria ( 11353100515 )

• COBIT 5 for Information Security is limited to the security view of this term and builds on this definition to describe how information security can be applied in real life, taking into account the COBIT 5 principles.

Page 9: Arie rahman satria ( 11353100515 )

• Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying. Increasing regulation within the business landscape adds to the awareness of the board of directors of the criticality of information security for information and IT-related assets.

Page 10: Arie rahman satria ( 11353100515 )

For Risk

Enterprises exist to create value for their stakeholders. Consequently, any enterprise, commercial or not, has value creation as a governance objective. Value creation means realising benefits at an optimal resource cost while optimising risk (figure 4). Benefits can take many forms, e.g., financial for commercial enterprises or public service for government entities.

Page 11: Arie rahman satria ( 11353100515 )

Enterprises have many stakeholders, and ‘creating value’ means different, and sometimes conflicting, things to each stakeholder. Governance is about negotiating and deciding amongst different stakeholder value interests.The risk optimisation component of value creation shows that:

• Risk optimisation is an essential part of any governance system.

• Risk optimisation cannot be seen in isolation, i.e., actions taken as part of risk management will influence benefits realisation and resource optimisation.

Page 12: Arie rahman satria ( 11353100515 )

Risk is generally defined as the combination of the probability of an event and its consequence (ISO Guide 73). Consequences are that enterprise objectives are not met. COBIT 5 for Risk defines IT risk as business risk, specifically, the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. IT risk consists of IT-related events that could potentially impact the business. IT risk can occur with both uncertain frequency and impact and creates challenges in meeting strategic goals and objectives.

Page 13: Arie rahman satria ( 11353100515 )

IT risk always exists, whether or not it is detected or recognised by an enterprise

Page 14: Arie rahman satria ( 11353100515 )

IT risk can be categorised as follows:

● IT benefit/value enablement risk - Associated with missed opportunities to use technology to improve efficiency or effectiveness of business processes or as an enabler for new business initiatives. ● IT programme and project delivery risk - Associated with the contribution of IT to new or improved business solutions, usually in the form of projects and programmes as part of investment portfolios ● IT operations and service delivery risk - Associated with all aspects of the business as usual performance of IT systems and services, which can bring destruction or reduction of value to the enterprise

Page 15: Arie rahman satria ( 11353100515 )

Figure 5 shows that for all categories of downside IT risk (‘Fail to Gain’ and ‘Lose’ business value) there is an equivalent upside (‘Gain’ and ‘Preserve’ business). For example: • Service delivery—If service delivery practices are strengthened, the enterprise can benefit, e.g., by being ready to absorb additional transaction volumes or market share. • Project delivery—Successful project delivery brings new business functionality.

Page 16: Arie rahman satria ( 11353100515 )

• It is important to keep this upside/downside duality of risk in mind (see figure 6) during all risk-related decisions. For example, decisions should consider:

• The exposure that may result if a risk is not mitigated versus the benefit if the associated loss exposure is reduced to an acceptable level.

• The potential benefit that may accrue if opportunities are taken versus missed benefits if opportunities are foregone.

Page 17: Arie rahman satria ( 11353100515 )

Risk is not always to be avoided. Doing business is about taking risk that is consistent with the risk appetite, i.e., many business propositions require IT risk to be taken to achieve the value proposition and realise enterprise goals and objectives, and this risk should be managed but not necessarily avoided.