SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Kontrol dan Audit Sistem
Informasi
Arie Rahman Satria
11353100515
COBIT 5
COBIT 5
For information
security
ISACA defines information
security as something that:
Ensures that within the
enterprise, information is
protected against disclosure to
unauthorised users
(confidentiality), improper
modification (integrity) and
non-access when required
(availability).
• Confidentiality means preserving authorised restrictions on
access and disclosure, including means for protecting privacy
and proprietary information.
• Integrity means guarding against improper information
modification or destruction, and includes ensuring information
non-repudiation and authenticity.
• Availability means ensuring timely and reliable access to and
use of information
Although several other definitions of the
term exist, this definition provides the very
basics of information security as it covers
the confidentiality, integrity and availability
(CIA) concept. It is important to note that
while the CIA concept is globally accepted,
there are broader uses of the term ‘integrity’
in the wider business context. COBIT 5
covers this term in the information enabler
as information goals of completeness and
accuracy.
• COBIT 5 for Information Security is limited to
the security view of this term and builds on
this definition to describe how information
security can be applied in real life, taking into
account the COBIT 5 principles.
• Information security is a business enabler that is strictly bound
to stakeholder trust, either by addressing business risk or by
creating value for an enterprise, such as competitive
advantage. At a time when the significance of information and
related technologies is increasing in every aspect of business
and public life, the need to mitigate information risk, which
includes protecting information and related IT assets from
ever-changing threats, is constantly intensifying. Increasing
regulation within the business landscape adds to the awareness
of the board of directors of the criticality of information
security for information and IT-related assets.
For Risk
Enterprises exist to create value for their stakeholders.
Consequently, any enterprise, commercial or not, has
value creation as a governance objective. Value creation
means realising benefits at an optimal resource cost while
optimising risk (figure 4). Benefits can take many forms,
e.g., financial for commercial enterprises or public service
for government entities.
Enterprises have many stakeholders, and ‘creating
value’ means different, and sometimes conflicting,
things to each stakeholder. Governance is about
negotiating and deciding amongst different
stakeholder value interests.
The risk optimisation component of value
creation shows that:
• Risk optimisation is an essential part of any
governance system.
• Risk optimisation cannot be seen in isolation, i.e.,
actions taken as part of risk management will
influence benefits realisation and resource
optimisation.
Risk is generally defined as the combination of the probability
of an event and its consequence (ISO Guide 73).
Consequences are that enterprise objectives are not met.
COBIT 5 for Risk defines IT risk as business risk, specifically,
the business risk associated with the use, ownership, operation,
involvement, influence and adoption of IT within an
enterprise. IT risk consists of IT-related events that could
potentially impact the business. IT risk can occur with both
uncertain frequency and impact and creates challenges in
meeting strategic goals and objectives.
IT risk always exists, whether or not it is
detected or recognised by an enterprise
IT risk can be categorised as
follows:
● IT benefit/value enablement risk - Associated with
missed opportunities to use technology to improve
efficiency or effectiveness of business processes or as
an enabler for new business initiatives.
● IT programme and project delivery risk - Associated
with the contribution of IT to new or improved
business solutions, usually in the form of projects and
programmes as part of investment portfolios
● IT operations and service delivery risk - Associated
with all aspects of the business as usual performance of
IT systems and services, which can bring destruction or
reduction of value to the enterprise
Figure 5 shows that for all categories of
downside IT risk (‘Fail to Gain’ and
‘Lose’ business value) there is an
equivalent upside (‘Gain’ and ‘Preserve’
business). For example: • Service
delivery—If service delivery practices
are strengthened, the enterprise can
benefit, e.g., by being ready to absorb
additional transaction volumes or market
share. • Project delivery—Successful
project delivery brings new business
functionality.
• It is important to keep this upside/downside
duality of risk in mind (see figure 6) during all
risk-related decisions. For example, decisions
should consider:
• The exposure that may result if a risk is not
mitigated versus the benefit if the associated loss
exposure is reduced to an acceptable level.
• The potential benefit that may accrue if
opportunities are taken versus missed benefits if
opportunities are foregone.
Risk is not always to be avoided. Doing business is about
taking risk that is consistent with the risk appetite, i.e., many
business propositions require IT risk to be taken to achieve the
value proposition and realise enterprise goals and objectives,
and this risk should be managed but not necessarily avoided.

Weitere ähnliche Inhalte

Andere mochten auch (9)

Bilješke uz financijski izvještaj 2015
Bilješke uz financijski izvještaj 2015Bilješke uz financijski izvještaj 2015
Bilješke uz financijski izvještaj 2015
 
2. сознание самосознание
2. сознание самосознание2. сознание самосознание
2. сознание самосознание
 
тема 4.2. мотивы и мотивация. классификация мотивов
тема 4.2. мотивы и мотивация. классификация мотивовтема 4.2. мотивы и мотивация. классификация мотивов
тема 4.2. мотивы и мотивация. классификация мотивов
 
тема 5.4. психология детей дошкольного возраста
тема 5.4. психология детей дошкольного возрастатема 5.4. психология детей дошкольного возраста
тема 5.4. психология детей дошкольного возраста
 
Materia analisis financiero
Materia analisis financieroMateria analisis financiero
Materia analisis financiero
 
Revista pediatrica ed4
Revista pediatrica ed4Revista pediatrica ed4
Revista pediatrica ed4
 
1
11
1
 
раздел 5. предмет, задачи, основные категории возрастной психологии
раздел 5. предмет, задачи, основные категории возрастной психологиираздел 5. предмет, задачи, основные категории возрастной психологии
раздел 5. предмет, задачи, основные категории возрастной психологии
 
тема 2.8. воля
тема 2.8. волятема 2.8. воля
тема 2.8. воля
 

Ähnlich wie Arie rahman satria ( 11353100515 )

gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
Anne Starr
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
Robert Kloots
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
Abdulbasit Almauly
 
71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docx
sleeperharwell
 

Ähnlich wie Arie rahman satria ( 11353100515 ) (20)

)k
)k)k
)k
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITIL
 
Topic11
Topic11Topic11
Topic11
 
Cobit 41 framework
Cobit 41 frameworkCobit 41 framework
Cobit 41 framework
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
 
Getting The Benefits
Getting The BenefitsGetting The Benefits
Getting The Benefits
 
MRTI_W11.pdf
MRTI_W11.pdfMRTI_W11.pdf
MRTI_W11.pdf
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
Physical security roi
Physical security roi Physical security roi
Physical security roi
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 
COBIT5-IntroductionS
COBIT5-IntroductionSCOBIT5-IntroductionS
COBIT5-IntroductionS
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
Cobit5 and-grc
Cobit5 and-grcCobit5 and-grc
Cobit5 and-grc
 
Cobit5 introduction
Cobit5 introductionCobit5 introduction
Cobit5 introduction
 
71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docx
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Arie rahman satria ( 11353100515 )

  • 1.
  • 2.
  • 3. Kontrol dan Audit Sistem Informasi Arie Rahman Satria 11353100515 COBIT 5
  • 5. ISACA defines information security as something that: Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).
  • 6. • Confidentiality means preserving authorised restrictions on access and disclosure, including means for protecting privacy and proprietary information. • Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. • Availability means ensuring timely and reliable access to and use of information
  • 7. Although several other definitions of the term exist, this definition provides the very basics of information security as it covers the confidentiality, integrity and availability (CIA) concept. It is important to note that while the CIA concept is globally accepted, there are broader uses of the term ‘integrity’ in the wider business context. COBIT 5 covers this term in the information enabler as information goals of completeness and accuracy.
  • 8. • COBIT 5 for Information Security is limited to the security view of this term and builds on this definition to describe how information security can be applied in real life, taking into account the COBIT 5 principles.
  • 9. • Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying. Increasing regulation within the business landscape adds to the awareness of the board of directors of the criticality of information security for information and IT-related assets.
  • 10. For Risk Enterprises exist to create value for their stakeholders. Consequently, any enterprise, commercial or not, has value creation as a governance objective. Value creation means realising benefits at an optimal resource cost while optimising risk (figure 4). Benefits can take many forms, e.g., financial for commercial enterprises or public service for government entities.
  • 11. Enterprises have many stakeholders, and ‘creating value’ means different, and sometimes conflicting, things to each stakeholder. Governance is about negotiating and deciding amongst different stakeholder value interests. The risk optimisation component of value creation shows that: • Risk optimisation is an essential part of any governance system. • Risk optimisation cannot be seen in isolation, i.e., actions taken as part of risk management will influence benefits realisation and resource optimisation.
  • 12. Risk is generally defined as the combination of the probability of an event and its consequence (ISO Guide 73). Consequences are that enterprise objectives are not met. COBIT 5 for Risk defines IT risk as business risk, specifically, the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. IT risk consists of IT-related events that could potentially impact the business. IT risk can occur with both uncertain frequency and impact and creates challenges in meeting strategic goals and objectives.
  • 13. IT risk always exists, whether or not it is detected or recognised by an enterprise
  • 14. IT risk can be categorised as follows: ● IT benefit/value enablement risk - Associated with missed opportunities to use technology to improve efficiency or effectiveness of business processes or as an enabler for new business initiatives. ● IT programme and project delivery risk - Associated with the contribution of IT to new or improved business solutions, usually in the form of projects and programmes as part of investment portfolios ● IT operations and service delivery risk - Associated with all aspects of the business as usual performance of IT systems and services, which can bring destruction or reduction of value to the enterprise
  • 15. Figure 5 shows that for all categories of downside IT risk (‘Fail to Gain’ and ‘Lose’ business value) there is an equivalent upside (‘Gain’ and ‘Preserve’ business). For example: • Service delivery—If service delivery practices are strengthened, the enterprise can benefit, e.g., by being ready to absorb additional transaction volumes or market share. • Project delivery—Successful project delivery brings new business functionality.
  • 16. • It is important to keep this upside/downside duality of risk in mind (see figure 6) during all risk-related decisions. For example, decisions should consider: • The exposure that may result if a risk is not mitigated versus the benefit if the associated loss exposure is reduced to an acceptable level. • The potential benefit that may accrue if opportunities are taken versus missed benefits if opportunities are foregone.
  • 17. Risk is not always to be avoided. Doing business is about taking risk that is consistent with the risk appetite, i.e., many business propositions require IT risk to be taken to achieve the value proposition and realise enterprise goals and objectives, and this risk should be managed but not necessarily avoided.