CFP last date
20 May 2024
Reseach Article

Analysis Risk Assessment on Village Information System using OCTAVE Allegro Framework

by Agung Nur Maghribi, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 23
Year of Publication: 2021
Authors: Agung Nur Maghribi, Imam Riadi
10.5120/ijca2021921603

Agung Nur Maghribi, Imam Riadi . Analysis Risk Assessment on Village Information System using OCTAVE Allegro Framework. International Journal of Computer Applications. 183, 23 ( Sep 2021), 46-52. DOI=10.5120/ijca2021921603

@article{ 10.5120/ijca2021921603,
author = { Agung Nur Maghribi, Imam Riadi },
title = { Analysis Risk Assessment on Village Information System using OCTAVE Allegro Framework },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2021 },
volume = { 183 },
number = { 23 },
month = { Sep },
year = { 2021 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number23/32071-2021921603/ },
doi = { 10.5120/ijca2021921603 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:17:43.286394+05:30
%A Agung Nur Maghribi
%A Imam Riadi
%T Analysis Risk Assessment on Village Information System using OCTAVE Allegro Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 23
%P 46-52
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Village Information System or commonly known as SID is an application used to manage village government data, can be interpreted as IT-based applications and processes to manage information related to the village office, support the duties and functions of the village office. SID allows for risks that can interfere with information assets and organizational goals. This study uses the OCTAVE Allegro framework with the aim of analyzing risk assessment and choosing a mitigation approach to the risks that may occur. The OCTAVE Allegro risk assessment method is divided into eight steps, namely establishing risk measurement criteria; developing information asset profiles; identify containers of information assets; identify areas of concern (problem areas) on technical, physical, and people container aspects; identify threat scenarios; identify risks; analyze risk; choose a mitigation and control approach that is adjusted to the results of the relative risk score calculation. Based on the test results on the Village Information System (SID), the results of the mitigated approach are 4, accept is 2, and defer is 2, with a relatively high risk value found in Physical Container with a risk value of 29, namely due to natural disasters that caused SID services ( Village Information System) stops. While the relatively low risk value is found in Technical Containers with a total of 15, which is caused by interference with internet connectivity so that the SID (Village Information System) service stops temporarily.

References
  1. Australian Government Publishing Service. 1994. Style manual for authors, editors and printers (5th ed.). Canberra: Writer.
  2. Azhari, I., & Rahman, A. May 2005. Detection of circles in digital images using Sobel filter and Hough transform. Expert, 6(1), 25-32.
  3. Aristasari, P. and Riadi, I. (2011) 'Risk Management in Learning Management System Using OCTAVE Allegro Framework', pp. 1–15.
  4. Bohrer, S., Zielke, T., & Freiburg, V. 1995. Integrated obstacle detection framework for intelligent cruise control on motorways. Presentation paper at the IEEE Intelligent Vehicles Symposium. Detroit, MI: Piscataway.
  5. Brookshear, JG 2003. Computer science: An introduction (7th ed.), Trans. Computer science: An overview (7th ed.), I. Hardiansyah (Pen.), HW Hardiani (Ed.). Jakarta: Erlangga.
  6. Caralli, RA, Steven, JF, Young, LR, & Wilson, RW 2007. Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process. USA: Software Engineering Institute Carnegie Mellon University Alberts, Christopher, &Dorofee, A. 2005. OCTAVE Method Implementation Guide. PA: Software Engineering Institute, Carnegie Mellon University.
  7. DeHart, GB, Alan SL, & Cooper, RG 1995. Child development: Its nature and course (4th ed.). Boston: McGraw-Hill.
  8. Effendi, BD 2007. Application of object-oriented programming methods to build a lecturer activity agenda system using PHP 4. Informatics Dynamics, 1 (1), 53-67.
  9. Finnegan, D., M. 2006. E-Learning success: Readability versus reading skill [Electronic version]. International Journal of Instructional Technology and Distance Learning, 3 (10), 37-47.
  10. Friedman, SL, &Wachs, TD (Ed.). 1999. Measuring environment across the life span: Emerging methods and concepts. Washington, DC: American Psychological Association.
  11. Kristanto, A. 2003. Data structure with C++. Yogyakarta: GrahaIlmu. Prajanti, AD, &Krisnadi, I. 2016. Project Management Review on Implementation of Electronic Service Manuscripts in Indonesian Government Towards Bureaucratic Reform. Thesis. Faculty of Electrical Engineering. University of Indonesia: Jakarta.
  12. Kurniawan, Y. April 2007. KOffice: Alternative Office Tools on Linux. Computer Info, p. 142-143.
  13. Security Holes in Firefox. April 2007. Computer Info, p. 84.
  14. Merceron, A., &Yacef, K. May 2005. TADA-Ed for educational data mining. Interactive Multimedia Electronic Journal of Computer-Enhanced Learning, 7 (1). Retrieved April 30, 2007, from http://imej.wfu.edu/articles/2005/1/03/index.asp
  15. NAACP. April 29, 2005. NAACP supports Congressional fight to end predatory lending. Retrieved August 19, 2005, from http://www.naacp.org/inc/docs/washington/109/109_aa-2005-04-28.pdf
  16. Nielsen, J., & Loranger, H. 2006. Prioritizing the Web Usability. Berkeley, CA: New Riders.
  17. Oxford learner's pocket dictionary. 2003. New York: Oxford University Press.
  18. Purwadi, E., &Istiyanto, J., E. 2005. SMS-based remote temperature monitoring device. In Ardiansyah, E. Aribowo, &Hasanudin (Ed.), Proceedings of the 2005 National Informatics Seminar (pp. 317-320). Yogyakarta: Informatics Study Program, Ahmad Dahlan University.
  19. Ramadiani. 2005. Measuring the success of information systems using information user satisfaction indicator variables and structural equation model in LISREL (Case study at UPT Library ITB). Thesis, Computer Science, Gadjah Mada University, Yogyakarta.
  20. Wareham, J., Zheng, JG, & Straub, D. February 2005. Critical themes in electronic commerce research: A meta-analysis. Journal of Information Technology, 20(1), 1-19.
  21. Wibowo, HS 2006. Modeling analysis and design of object-oriented systems using UML (Case study of lecture scheduling information system FMIPA-UAD). Thesis, Computer Science, Ahmad Dahlan University, Yogyakarta.
  22. Winograd, T. 1997a. From computing machinery to interaction design. In P. Denning & R. Metcalfe (Ed.), Beyond calculation: The next fifty years of Computing (pp. 149-162). Amsterdam: Springer-Verlag.
  23. Winograd, T. 1997b. Understanding computers and cognition. Norwood, NJ: Addison-Wesley. Kang, Y., & Liu, R. (2016). Development of a rail-breaking risk management information system. 3rd International Conference on Systems and Informatics (ICSAI) (pp.492-496). Shanghai China: IEEE.
  24. Ikhsan, Hidayatul and Nanda Jarti. 2018. Information Technology Security Risk Analysis Using Octave Allegro. Responsive Journal, 2(1), 31-41.
Index Terms

Computer Science
Information Sciences

Keywords

Village Information System Risk Assessment OCTAVE Allegro Mitigation.