Kebijakan Keamanan Teknologi Informasi Pada Perangkat Keras Di Perusahaan Distributor Sepatu

Johanes Fernandes Andry, Andreas Wijaya, Devi Yurisca Bernanda, Yemima Monica Geasela, Cristiano Ronaldo Yusup, Johansen Christian Chandra, Jonathan Alexandre

Abstract


A shoe distributor company is a company engaged in the distribution of shoes to consumers. In its daily practice, shoe distributor companies have not implemented the IT Security Policy properly. Then the Community Service program is carried out with the aim of enforcing the established information security policy. The method is in the form of exposing material to shoe distributor companies regarding the importance of having and implementing an IT Security Policy, especially an IT Security Policy on Hardware. The implementation of the program was carried out in two major stages, namely the pre-implementation stage where the research team received data on company problems, conducted an analysis of these problems, prepared presentation materials/materials and the implementation stage where the PKM implementing team coordinated and executed the PKM material presentation activities. The presentation of the material was carried out face to face at the Head Office of the shoe distributor company. The activity began with an opening & introductory session, followed by presentation of material, which was divided into five major topics, namely explanation of system security, explanation of Policy, Standards, Procedures, Guidelines, explanation of Sample Template Policy, Standards, Procedures, Guidelines, explanation of Hardware security, and explanation of company Case Study. Then, the activity continued in the question-and-answer session and after that continued with the evaluation activities carried out by filling out the Google feedback link in the program implementation form for the participants. The results obtained in the PKM activities were that the implementation was carried out well and was beneficial for the shoe distributor company with several suggestions for improvement, namely the delivery of material that could be slower, examples that were more specific and appropriate.


Keywords


IT Security, Policy, Hardware, Shoe Distributor

Full Text:

PDF

References


Andry, J. F., Bernanda, D. Y., Lee, F. S., Mastan, I. A., & Geasela, Y. M. (2021). Etika Berbelanja Online Di Era Teknologi Informasi. In Jurnal Pengabdian dan Kewirausahaan (Vol. 5, Issue 2).

Destya, S. (2020). Pengukuran Tingkat Kesadaran Keamanan Informasi Berdasarkan Behavior Dan Offence Scale (Vol. 5, Issue 2).

Ferdiansyah, P., Subektiningsih, S., & Indrayani, R. (2019). Evaluasi Tingkat Kesiapan Keamanan Informasi Pada Lembaga Pendidikan Menggunakan Indeks Kami 4.0.

Hanafiah, Sauri, R. S., Mulyadi, D., & Arifudin, O. (2021). Pelatihan Software Mendeley Dalam Peningkatan Kualitas Artikel Ilmiah Bagi Mahasiswa.

Handoyo, E., Umar, R., & Riadi, I. (2018). Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI).

Johnson, R., & Easttom, C. (2020). Security Policies and Implementation Issues, 3rd Edition.

Kaleb, B. J., Lengkong, V. P. K., & Taroreh, R. N. (2019). Penerapan Sistem Informasi Manajemen Dan Pengawasannya Di Kantor Pelayanan Pajak Pratama Manado Implementation Of Management Information Systems And Its Supervision In Pratama Tax Service Office Manado.

Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review SIM).

Patawala, R., & Manuputty, A. D. (2021). Audit Sistem Informasi Pada Dinas Perpustakaan Dan Kearsipan Kota Salatiga Menggunakan Framework Cobit 4.1 Domain Monitor And Evaluate.

Putri, N. I., Komalasari, R., & Munawar, Z. (2020). Pentingnya Keamanan Data Dalam Intelijen Bisnis.

Lubis, A. R. (2020). Perangkat Keras Komputer (Hardware).

Rumlus, M. H., & Hartadi, H. (2020). Kebijakan Penanggulangan Pencurian Data Pribadi Dalam Media Elektronik




DOI: http://dx.doi.org/10.30813/jpk.v7i2.4775

Refbacks

  • There are currently no refbacks.