SlideShare a Scribd company logo
1 of 17
Kontrol dan Audit Sistem
Informasi
Arie Rahman Satria
11353100515
COBIT 5
COBIT 5
For information
security
ISACA defines information
security as something that:
Ensures that within the
enterprise, information is
protected against disclosure to
unauthorised users
(confidentiality), improper
modification (integrity) and
non-access when required
(availability).
• Confidentiality means preserving authorised restrictions on
access and disclosure, including means for protecting privacy
and proprietary information.
• Integrity means guarding against improper information
modification or destruction, and includes ensuring information
non-repudiation and authenticity.
• Availability means ensuring timely and reliable access to and
use of information
Although several other definitions of the
term exist, this definition provides the very
basics of information security as it covers
the confidentiality, integrity and availability
(CIA) concept. It is important to note that
while the CIA concept is globally accepted,
there are broader uses of the term ‘integrity’
in the wider business context. COBIT 5
covers this term in the information enabler
as information goals of completeness and
accuracy.
• COBIT 5 for Information Security is limited to
the security view of this term and builds on
this definition to describe how information
security can be applied in real life, taking into
account the COBIT 5 principles.
• Information security is a business enabler that is strictly bound
to stakeholder trust, either by addressing business risk or by
creating value for an enterprise, such as competitive
advantage. At a time when the significance of information and
related technologies is increasing in every aspect of business
and public life, the need to mitigate information risk, which
includes protecting information and related IT assets from
ever-changing threats, is constantly intensifying. Increasing
regulation within the business landscape adds to the awareness
of the board of directors of the criticality of information
security for information and IT-related assets.
For Risk
Enterprises exist to create value for their stakeholders.
Consequently, any enterprise, commercial or not, has
value creation as a governance objective. Value creation
means realising benefits at an optimal resource cost while
optimising risk (figure 4). Benefits can take many forms,
e.g., financial for commercial enterprises or public service
for government entities.
Enterprises have many stakeholders, and ‘creating
value’ means different, and sometimes conflicting,
things to each stakeholder. Governance is about
negotiating and deciding amongst different
stakeholder value interests.
The risk optimisation component of value
creation shows that:
• Risk optimisation is an essential part of any
governance system.
• Risk optimisation cannot be seen in isolation, i.e.,
actions taken as part of risk management will
influence benefits realisation and resource
optimisation.
Risk is generally defined as the combination of the probability
of an event and its consequence (ISO Guide 73).
Consequences are that enterprise objectives are not met.
COBIT 5 for Risk defines IT risk as business risk, specifically,
the business risk associated with the use, ownership, operation,
involvement, influence and adoption of IT within an
enterprise. IT risk consists of IT-related events that could
potentially impact the business. IT risk can occur with both
uncertain frequency and impact and creates challenges in
meeting strategic goals and objectives.
IT risk always exists, whether or not it is
detected or recognised by an enterprise
IT risk can be categorised as
follows:
● IT benefit/value enablement risk - Associated with
missed opportunities to use technology to improve
efficiency or effectiveness of business processes or as
an enabler for new business initiatives.
● IT programme and project delivery risk - Associated
with the contribution of IT to new or improved
business solutions, usually in the form of projects and
programmes as part of investment portfolios
● IT operations and service delivery risk - Associated
with all aspects of the business as usual performance of
IT systems and services, which can bring destruction or
reduction of value to the enterprise
Figure 5 shows that for all categories of
downside IT risk (‘Fail to Gain’ and
‘Lose’ business value) there is an
equivalent upside (‘Gain’ and ‘Preserve’
business). For example: • Service
delivery—If service delivery practices
are strengthened, the enterprise can
benefit, e.g., by being ready to absorb
additional transaction volumes or market
share. • Project delivery—Successful
project delivery brings new business
functionality.
• It is important to keep this upside/downside
duality of risk in mind (see figure 6) during all
risk-related decisions. For example, decisions
should consider:
• The exposure that may result if a risk is not
mitigated versus the benefit if the associated loss
exposure is reduced to an acceptable level.
• The potential benefit that may accrue if
opportunities are taken versus missed benefits if
opportunities are foregone.
Risk is not always to be avoided. Doing business is about
taking risk that is consistent with the risk appetite, i.e., many
business propositions require IT risk to be taken to achieve the
value proposition and realise enterprise goals and objectives,
and this risk should be managed but not necessarily avoided.

More Related Content

Viewers also liked (9)

Bilješke uz financijski izvještaj 2015
Bilješke uz financijski izvještaj 2015Bilješke uz financijski izvještaj 2015
Bilješke uz financijski izvještaj 2015
 
2. сознание самосознание
2. сознание самосознание2. сознание самосознание
2. сознание самосознание
 
тема 4.2. мотивы и мотивация. классификация мотивов
тема 4.2. мотивы и мотивация. классификация мотивовтема 4.2. мотивы и мотивация. классификация мотивов
тема 4.2. мотивы и мотивация. классификация мотивов
 
тема 5.4. психология детей дошкольного возраста
тема 5.4. психология детей дошкольного возрастатема 5.4. психология детей дошкольного возраста
тема 5.4. психология детей дошкольного возраста
 
Materia analisis financiero
Materia analisis financieroMateria analisis financiero
Materia analisis financiero
 
Revista pediatrica ed4
Revista pediatrica ed4Revista pediatrica ed4
Revista pediatrica ed4
 
1
11
1
 
раздел 5. предмет, задачи, основные категории возрастной психологии
раздел 5. предмет, задачи, основные категории возрастной психологиираздел 5. предмет, задачи, основные категории возрастной психологии
раздел 5. предмет, задачи, основные категории возрастной психологии
 
тема 2.8. воля
тема 2.8. волятема 2.8. воля
тема 2.8. воля
 

Similar to Arie rahman satria ( 11353100515 )

gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
Anne Starr
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
Robert Kloots
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
Abdulbasit Almauly
 
71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docx
sleeperharwell
 

Similar to Arie rahman satria ( 11353100515 ) (20)

)k
)k)k
)k
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITIL
 
Topic11
Topic11Topic11
Topic11
 
Cobit 41 framework
Cobit 41 frameworkCobit 41 framework
Cobit 41 framework
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
 
Getting The Benefits
Getting The BenefitsGetting The Benefits
Getting The Benefits
 
MRTI_W11.pdf
MRTI_W11.pdfMRTI_W11.pdf
MRTI_W11.pdf
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
Physical security roi
Physical security roi Physical security roi
Physical security roi
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 
COBIT5-IntroductionS
COBIT5-IntroductionSCOBIT5-IntroductionS
COBIT5-IntroductionS
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
Cobit5 and-grc
Cobit5 and-grcCobit5 and-grc
Cobit5 and-grc
 
Cobit5 introduction
Cobit5 introductionCobit5 introduction
Cobit5 introduction
 
71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Arie rahman satria ( 11353100515 )

  • 1.
  • 2.
  • 3. Kontrol dan Audit Sistem Informasi Arie Rahman Satria 11353100515 COBIT 5
  • 5. ISACA defines information security as something that: Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).
  • 6. • Confidentiality means preserving authorised restrictions on access and disclosure, including means for protecting privacy and proprietary information. • Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. • Availability means ensuring timely and reliable access to and use of information
  • 7. Although several other definitions of the term exist, this definition provides the very basics of information security as it covers the confidentiality, integrity and availability (CIA) concept. It is important to note that while the CIA concept is globally accepted, there are broader uses of the term ‘integrity’ in the wider business context. COBIT 5 covers this term in the information enabler as information goals of completeness and accuracy.
  • 8. • COBIT 5 for Information Security is limited to the security view of this term and builds on this definition to describe how information security can be applied in real life, taking into account the COBIT 5 principles.
  • 9. • Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying. Increasing regulation within the business landscape adds to the awareness of the board of directors of the criticality of information security for information and IT-related assets.
  • 10. For Risk Enterprises exist to create value for their stakeholders. Consequently, any enterprise, commercial or not, has value creation as a governance objective. Value creation means realising benefits at an optimal resource cost while optimising risk (figure 4). Benefits can take many forms, e.g., financial for commercial enterprises or public service for government entities.
  • 11. Enterprises have many stakeholders, and ‘creating value’ means different, and sometimes conflicting, things to each stakeholder. Governance is about negotiating and deciding amongst different stakeholder value interests. The risk optimisation component of value creation shows that: • Risk optimisation is an essential part of any governance system. • Risk optimisation cannot be seen in isolation, i.e., actions taken as part of risk management will influence benefits realisation and resource optimisation.
  • 12. Risk is generally defined as the combination of the probability of an event and its consequence (ISO Guide 73). Consequences are that enterprise objectives are not met. COBIT 5 for Risk defines IT risk as business risk, specifically, the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. IT risk consists of IT-related events that could potentially impact the business. IT risk can occur with both uncertain frequency and impact and creates challenges in meeting strategic goals and objectives.
  • 13. IT risk always exists, whether or not it is detected or recognised by an enterprise
  • 14. IT risk can be categorised as follows: ● IT benefit/value enablement risk - Associated with missed opportunities to use technology to improve efficiency or effectiveness of business processes or as an enabler for new business initiatives. ● IT programme and project delivery risk - Associated with the contribution of IT to new or improved business solutions, usually in the form of projects and programmes as part of investment portfolios ● IT operations and service delivery risk - Associated with all aspects of the business as usual performance of IT systems and services, which can bring destruction or reduction of value to the enterprise
  • 15. Figure 5 shows that for all categories of downside IT risk (‘Fail to Gain’ and ‘Lose’ business value) there is an equivalent upside (‘Gain’ and ‘Preserve’ business). For example: • Service delivery—If service delivery practices are strengthened, the enterprise can benefit, e.g., by being ready to absorb additional transaction volumes or market share. • Project delivery—Successful project delivery brings new business functionality.
  • 16. • It is important to keep this upside/downside duality of risk in mind (see figure 6) during all risk-related decisions. For example, decisions should consider: • The exposure that may result if a risk is not mitigated versus the benefit if the associated loss exposure is reduced to an acceptable level. • The potential benefit that may accrue if opportunities are taken versus missed benefits if opportunities are foregone.
  • 17. Risk is not always to be avoided. Doing business is about taking risk that is consistent with the risk appetite, i.e., many business propositions require IT risk to be taken to achieve the value proposition and realise enterprise goals and objectives, and this risk should be managed but not necessarily avoided.