Evaluation for improving security management of service oriented architecture at meraki digital Indonesia

0Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Meraki Digital Indonesia wants to evaluate security management on Service Oriented Architecture that has been implemented in this company whether it is in accordance with the standards or not, using the COBIT 5 method. It is expected that the suitability of the maturity level can be carried out in accordance with the security management domain needed to ensure the fulfillment of the basic requirements of organizational information resources, namely the availability of integrity and availability of data or information. As well as using the Analytical Hierarchy Process algorithm to provide recommendations using decision-making in solving problems with explicit logical analysis, there are three principles that underlie AHP thinking, which is compiling hierarchies, the principle of setting priorities, and the principle of logical consistency. Then the evaluation results using COBIT 5, there are 6 security management criteria that are used as a basis for evaluating, among others, strategies & policies, organizations, people, processes, technology and facilities and domains that are used are Plan and Organizes (PO), Acquire and Implement (AI), Deliver and Support (DS), and Monitor and Evaluate (ME). Whereas for recommendations needed by using analytical hierarchy processes, there are three things that need to be improved according to the wishes of stakeholders, namely the need to improve the criteria of technology with a value of 0.132, facilities with a value of 0.137, and people with a value of 0.161 according to the lowest ranking on the tested criteria.

Cite

CITATION STYLE

APA

Ranggadara, I. (2019). Evaluation for improving security management of service oriented architecture at meraki digital Indonesia. International Journal of Innovative Technology and Exploring Engineering, 8(9), 1191–1198. https://doi.org/10.35940/ijitee.i8067.078919

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free