SlideShare a Scribd company logo
Kontrol dan AuditKontrol dan Audit
Sistem InformasiSistem Informasi
RUDI KURNIAWAN
11353100145
UIN SUSKA RIAU
INFORMATION SYSTEM,FST
For information security
ISACA defines information security as something that :
Ensures that within the enterprise, information is
protected against disclosure to unauthorised users
(confidentiality), improper modification (integrity) and
non-access when required (availability).
Cont...
• Confidentiality means preserving authorised restrictions on
access and disclosure, including means for protecting privacy
and proprietary information.
• Integrity means guarding against improper information
modification or destruction, and includes ensuring information
non-repudiation and authenticity.
• Availability means ensuring timely and reliable access to and
use of information
Cont..
Although several other definitions of the term
exist, this definition provides the very basics of
information security as it covers the
confidentiality, integrity and availability (CIA)
concept. It is important to note that while the
CIA concept is globally accepted, there are
broader uses of the term ‘integrity’ in the wider
business context. COBIT 5 covers this term in
the information enabler as information goals of
completeness and accuracy.
Cont..
At a time when the significance of information
and related technologies is increasing in every
aspect of business and public life, the need to
mitigate information risk, which includes
protecting information and related IT assets from
ever-changing threats, is constantly intensifying.
Increasing regulation within the business
landscape adds to the awareness of the board of
directors of the criticality of information security
for information and IT-related assets.
For Risk
Enterprises exist to create value for their stakeholders.
Consequently, any enterprise, commercial or not, has value
creation as a governance objective. Value creation means
realising benefits at an optimal resource cost while optimising
risk (figure 4). Benefits can take many forms, e.g., financial for
commercial enterprises or public service for government entities.
Cont...
The risk optimisation component of value
creation shows that:
• Risk optimisation is an essential part of any
governance system.
• Risk optimisation cannot be seen in isolation,
i.e., actions taken as part of risk management
will influence benefits realisation and resource
optimisation.
Cont...
Risk is generally defined as the combination of the
probability of an event and its consequence (ISO Guide
73). Consequences are that enterprise objectives are not
met. COBIT 5 for Risk defines IT risk as business risk,
specifically, the business risk associated with the use,
ownership, operation, involvement, influence and
adoption of IT within an enterprise. IT risk consists of
IT-related events that could potentially impact the
business. IT risk can occur with both uncertain
frequency and impact and creates challenges in meeting
strategic goals and objectives.
Cont...
IT risk always exists, whether or not it is detected or recognised
by an enterprise.
IT risk can be categorised as
follows:
 IT benefit/value enablement risk—Associated with missed
opportunities to use technology to improve efficiency or
effectiveness of business processes or as an enabler for new
business initiatives.
 IT programme and project delivery risk—Associated with the
contribution of IT to new or improved business solutions,
usually in the form of projects and programmes as part of
investment portfolios
 IT operations and service delivery risk—Associated with all
aspects of the business as usual performance of IT systems and
services, which can bring destruction or reduction of value to
the enterprise.
Cont...
Figure 5 shows that for all categories of downside IT
risk (‘Fail to Gain’ and ‘Lose’ business value) there is
an equivalent upside (‘Gain’ and ‘Preserve’ business).
It is important to keep this upside/downside duality of
risk in mind (see figure 6) during all risk-related
decisions. For example, decisions should consider:
The exposure that may result if a risk is not mitigated
versus the benefit if the associated loss exposure is
reduced to an acceptable level.
Cont...
The potential benefit that may accrue if opportunities
are taken versus missed benefits if opportunities are
foregone.
Risk is not always to be avoided. Doing business is
about taking risk that is consistent with the risk
appetite, i.e., many business propositions require IT
risk to be taken to achieve the value proposition and
realise enterprise goals and objectives, and this risk
should be managed but not necessarily avoided.
Cont...
THANKS

More Related Content

PPTX
Cobit 5 ( Kontrol dan Auditing Sistem Informasi )
PPT
Cobit 5 - Kontrol dan Audit Sistem informasi
PPTX
Arie rahman satria ( 11353100515 )
PDF
Cobit 5 for Information Security
PDF
Cobit 5 for information security
PDF
Making Executives Accountable for IT Security
PPTX
Audit rizkie hafizzah
PPTX
Cobit 5 ( Kontrol dan Auditing Sistem Informasi )
Cobit 5 - Kontrol dan Audit Sistem informasi
Arie rahman satria ( 11353100515 )
Cobit 5 for Information Security
Cobit 5 for information security
Making Executives Accountable for IT Security
Audit rizkie hafizzah

What's hot (20)

PPTX
Donna Febriani
PPT
01 intro-cobit
PPTX
Using COBIT PO9 to perform Project Risk Analysis
PPTX
Corporate governance of INFORMATION TECHNOLOGY (IT)
PPT
Governance Of Enterprise Information Technology V3
PPT
Ais Romney 2006 Slides 06 Control And Ais
PPTX
Itil,cobit and ıso27001
PPTX
Cobit 41 framework
PPT
IT Governances
PPT
It governance
PPTX
Global Artificial Intelligence (AI) Index
PPT
Ais Romney 2006 Slides 07 Is Control1
PPT
Cobit5 and-grc
PDF
Grc coso cobit_mapped_shared
PPTX
rethinking marketing
PPT
MAKING SENSE OF IT GOVERNANCE
PDF
Control and audit of information System (hendri eka saputra)
PDF
IT Governance & ISO 38500
PPTX
Lailatul izzati
PDF
Compliance Management | Compliance Solutions
Donna Febriani
01 intro-cobit
Using COBIT PO9 to perform Project Risk Analysis
Corporate governance of INFORMATION TECHNOLOGY (IT)
Governance Of Enterprise Information Technology V3
Ais Romney 2006 Slides 06 Control And Ais
Itil,cobit and ıso27001
Cobit 41 framework
IT Governances
It governance
Global Artificial Intelligence (AI) Index
Ais Romney 2006 Slides 07 Is Control1
Cobit5 and-grc
Grc coso cobit_mapped_shared
rethinking marketing
MAKING SENSE OF IT GOVERNANCE
Control and audit of information System (hendri eka saputra)
IT Governance & ISO 38500
Lailatul izzati
Compliance Management | Compliance Solutions
Ad

Viewers also liked (13)

PPT
Information systems audit and control
PPTX
Auditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
PPTX
Simulasi audit menggunakan it governance ( cobit )
PDF
Comparación de CobiT 5 con CobiT 4.1
PDF
Automation risk isaca2017
DOCX
153084837 makalah-cobit
PPT
PENGENALAN AUDIT DAN KONTROL SISTEM INFORMASI
PDF
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
PPTX
Information System Architecture and Audit Control Lecture 1
PPT
Information system and control audit – lecture i
PPTX
Information System audit
PPT
Auditing In Computer Environment Presentation
Information systems audit and control
Auditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
Simulasi audit menggunakan it governance ( cobit )
Comparación de CobiT 5 con CobiT 4.1
Automation risk isaca2017
153084837 makalah-cobit
PENGENALAN AUDIT DAN KONTROL SISTEM INFORMASI
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Information System Architecture and Audit Control Lecture 1
Information system and control audit – lecture i
Information System audit
Auditing In Computer Environment Presentation
Ad

Similar to Cobit 5 (Control and Audit Information System) (20)

PPTX
Tomi ismeidianto ( 11353104557 ) Control and Auditing information Systam
PDF
My_notes_part1.pdf
DOCX
case studies on risk management in IT enabled organisation(vadodara)
PPT
Information security background
PPT
Information Security Background
PDF
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
PDF
Information Security Risk Management
PPTX
Introduction to Risk Management Fundamentals
PPTX
Presentation1 110616195133-phpapp01(information security)
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPTX
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
PPTX
Whitman_Ch05.pptx
PPTX
ke-1 - Copy cat massunu rahing.pptxdfdff
PDF
Information Risk Management - Cyber Risk Management - IT Risks
PDF
The Secure Online Business E Commerce It Functionality and Business Continuit...
PPTX
MIS: Information Security Management
PPTX
IT Security & Risk
PPT
COBIT 4.0
PDF
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
PDF
200606_NWC_Strategic Security
Tomi ismeidianto ( 11353104557 ) Control and Auditing information Systam
My_notes_part1.pdf
case studies on risk management in IT enabled organisation(vadodara)
Information security background
Information Security Background
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
Information Security Risk Management
Introduction to Risk Management Fundamentals
Presentation1 110616195133-phpapp01(information security)
Accounting Information Systems 11th Edition Bodnar Solutions Manual
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
Whitman_Ch05.pptx
ke-1 - Copy cat massunu rahing.pptxdfdff
Information Risk Management - Cyber Risk Management - IT Risks
The Secure Online Business E Commerce It Functionality and Business Continuit...
MIS: Information Security Management
IT Security & Risk
COBIT 4.0
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
200606_NWC_Strategic Security

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Computing-Curriculum for Schools in Ghana
PDF
Updated Idioms and Phrasal Verbs in English subject
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
master seminar digital applications in india
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Cell Structure & Organelles in detailed.
2.FourierTransform-ShortQuestionswithAnswers.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Microbial diseases, their pathogenesis and prophylaxis
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial disease of the cardiovascular and lymphatic systems
STATICS OF THE RIGID BODIES Hibbelers.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
Computing-Curriculum for Schools in Ghana
Updated Idioms and Phrasal Verbs in English subject
Paper A Mock Exam 9_ Attempt review.pdf.
master seminar digital applications in india
Chinmaya Tiranga quiz Grand Finale.pdf
Supply Chain Operations Speaking Notes -ICLT Program

Cobit 5 (Control and Audit Information System)

  • 1. Kontrol dan AuditKontrol dan Audit Sistem InformasiSistem Informasi RUDI KURNIAWAN 11353100145 UIN SUSKA RIAU INFORMATION SYSTEM,FST
  • 2. For information security ISACA defines information security as something that : Ensures that within the enterprise, information is protected against disclosure to unauthorised users (confidentiality), improper modification (integrity) and non-access when required (availability).
  • 3. Cont... • Confidentiality means preserving authorised restrictions on access and disclosure, including means for protecting privacy and proprietary information. • Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. • Availability means ensuring timely and reliable access to and use of information
  • 4. Cont.. Although several other definitions of the term exist, this definition provides the very basics of information security as it covers the confidentiality, integrity and availability (CIA) concept. It is important to note that while the CIA concept is globally accepted, there are broader uses of the term ‘integrity’ in the wider business context. COBIT 5 covers this term in the information enabler as information goals of completeness and accuracy.
  • 5. Cont.. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying. Increasing regulation within the business landscape adds to the awareness of the board of directors of the criticality of information security for information and IT-related assets.
  • 6. For Risk Enterprises exist to create value for their stakeholders. Consequently, any enterprise, commercial or not, has value creation as a governance objective. Value creation means realising benefits at an optimal resource cost while optimising risk (figure 4). Benefits can take many forms, e.g., financial for commercial enterprises or public service for government entities.
  • 7. Cont... The risk optimisation component of value creation shows that: • Risk optimisation is an essential part of any governance system. • Risk optimisation cannot be seen in isolation, i.e., actions taken as part of risk management will influence benefits realisation and resource optimisation.
  • 8. Cont... Risk is generally defined as the combination of the probability of an event and its consequence (ISO Guide 73). Consequences are that enterprise objectives are not met. COBIT 5 for Risk defines IT risk as business risk, specifically, the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise. IT risk consists of IT-related events that could potentially impact the business. IT risk can occur with both uncertain frequency and impact and creates challenges in meeting strategic goals and objectives.
  • 9. Cont... IT risk always exists, whether or not it is detected or recognised by an enterprise.
  • 10. IT risk can be categorised as follows:  IT benefit/value enablement risk—Associated with missed opportunities to use technology to improve efficiency or effectiveness of business processes or as an enabler for new business initiatives.  IT programme and project delivery risk—Associated with the contribution of IT to new or improved business solutions, usually in the form of projects and programmes as part of investment portfolios  IT operations and service delivery risk—Associated with all aspects of the business as usual performance of IT systems and services, which can bring destruction or reduction of value to the enterprise.
  • 11. Cont... Figure 5 shows that for all categories of downside IT risk (‘Fail to Gain’ and ‘Lose’ business value) there is an equivalent upside (‘Gain’ and ‘Preserve’ business). It is important to keep this upside/downside duality of risk in mind (see figure 6) during all risk-related decisions. For example, decisions should consider: The exposure that may result if a risk is not mitigated versus the benefit if the associated loss exposure is reduced to an acceptable level.
  • 12. Cont... The potential benefit that may accrue if opportunities are taken versus missed benefits if opportunities are foregone. Risk is not always to be avoided. Doing business is about taking risk that is consistent with the risk appetite, i.e., many business propositions require IT risk to be taken to achieve the value proposition and realise enterprise goals and objectives, and this risk should be managed but not necessarily avoided.