1
Usulan
Keamanan Siber, Keamanan Informasi
dan
Sistem Manajemen Layanan
serta Kualitas Data
v2
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM
Anggota PT35-01 Teknologi Informasi
Gedung Sapta Pesona – SDPPI Kominfo, Jakarta 28 Februari 2017
The Next Computing Revolution
Mainframe computing (60’s – 70’s)
Large computers to execute big data processing applications
Desktop computing & Internet (80’s – 90’s)
One computer at every desk to do business/personal activities
Ubiquitous computing (00’s)
Numerous computing devices in every place/person
Millions for desktops vs. billions for embedded processors
Cyber Physical Systems (10’s)
3
Hardware TROJAN
4
Presentation: KamInfo.ID5
5
KEAMANAN INFORMASI VERSIISACA
Information security is a business enabler that is strictly bound to
stakeholder trust, either by addressing business risk or by creating value
for an enterprise, such as competitive advantage.
At a time when the significance of information and related technologies is
increasing in every aspect of business and public life, the need to mitigate
information risk, which includes protecting information and related IT
assets from ever-changing threats, is constantly intensifying.
ISACA defines information security as something that:
Ensures that information is readily available (availability),
when required, and protected against disclosure to
unauthorised users (confidentiality) and improper
modification (integrity).
Presentation: KamInfo.ID6
6
KEAMANAN INFORMASI
......... pemerintah negara Indonesia yang melindungi segenap
bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk
memajukan kesejahteraan umum,
mencerdaskan kehidupan bangsa, dan ikut
melaksanakan ketertiban dunia yang berdasarkan kemerdekaan,
perdamaian abadi dan keadilan sosial........
Pemanfaatan INFORMASI sebagai darah nadi
kehidupan bangsa
dalam perspektif Pertumbuhan Ekonomi
untuk Kesejahteraan Rakyat
Presentation: KamInfo.ID7
7
KEAMANAN NASIONAL
......... pemerintah negara Indonesia yang melindungi segenap
bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk
memajukan kesejahteraan umum,
mencerdaskan kehidupan bangsa, dan ikut
melaksanakan ketertiban dunia yang berdasarkan kemerdekaan,
perdamaian abadi dan keadilan sosial........
Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa
dalam perspektif Pertumbuhan Ekonomi
untuk Kesejahteraan Rakyat
8
Kategori Kontrol berbasis Risiko
9
Source: Transforming Cybersecurity: Using COBIT 5, ISACA, 2013
Hubungan antar Kerangka
Keamanan
COBIT 5
Panduan Umum Tata Kelola TIK Nas
+
Kuesioner Evaluasi Pengendalian Intern TIK
Internal Control
Framework COSO
SNI ISO 38500
PP60/2008
Sistem Pengendalian Intern
Pemerintah
TataKelolaManajemenPerangkat
SNI ISO 20000
10
RSNI ISO 27013
SNI ISO 27014
Governance of Information Security
SNI ISO 15408
Common Criteria
SNI ISO 27001
Information Security Management System
ISO/IEC JTC 1/SC 40 - IT Service Management and IT Governance
ISO/IEC 20000-1:2011
SNI ISO/IEC 20000-1:2013 Teknologi Informasi - Manajemen Layanan - Bagian 1: Persyaratan sistem
manajemen layanan IEEE Std 20000-1-2013
ISO/IEC 20000-2:2012
SNI ISO/IEC 20000-2:2013 Teknologi informasi - Manajemen layanan - Bagian 2: Pedoman penerapan
sistem manajemen layanan IEEE Std 20000-2-2013
ISO/IEC TR 20000-3:2012
SNI ISO/IEC TR 20000-3:2013 Teknologi informasi - Manajemen layanan - Bagian 3: Pedoman pendefinisian
lingkup dan kesesuaian dari SNI ISO/IEC 20000-1
ISO/IEC TR 20000-4:2010
SNI ISO/IEC TR 20000-4:2013 Teknologi informasi - Manajemen layanan - Bagian 4: Model referensi proses
ISO/IEC TR 20000-5:2010 – replaced by ISO/IEC TR 20000-5:2013
SNI ISO/IEC TR 20000-5:2013 Teknologi informasi - Manajemen layanan - Bagian 5: Contoh acuan
perencanaan implementasi SNI ISO/IEC 20000-1
ISO/IEC FDIS 20000-6
Information technology -- Service management -- Part 6: Requirements for bodies providing audit and certification
of service management systems
ISO/IEC TR 20000-9:2015 Information technology -- Service management -- Part 9: Guidance on the
application of ISO/IEC 20000-1 to cloud services
ISO/IEC TR 20000-10:2013 Information technology -- Service management -- Part 10: Concepts and
terminology
ISO/IEC TR 20000-12:2016
Information technology -- Service management -- Part 12: Guidance on the relationship between ISO/IEC 20000-
1:2011 and service management frameworks: CMMI-SVC
ISO/IEC 30121:2015 Information technology -- Governance of digital forensic risk framework
ISO/IEC 38500:2015 Information technology -- Governance of IT for the organization
ISO/IEC TS 38501:2015 Information technology -- Governance of IT -- Implementation guide
ISO/IEC TR 38502:2014 Information technology -- Governance of IT -- Framework and model
ISO/IEC TR 38504:2016
Governance of information technology -- Guidance for principles-based standards in the governance of information
technology
11
Customers
(and other
interested
parties)
Service
Requirements Services
Customers
(and other
interested
parties)
5. Design and transition of new or changed services
8. Resolution processes 7. Relationship processes
8.1 Incident and service request
management
8.2 Problem management
7.1 Business relationship
management
7.2 Supplier management
6. Service delivery processes
6.5 Capacity management
6.3 Service continuity &
availability management
6.1 Service level
management
6.2 Service reporting
6.6 Information security
management
6.4 Budgeting &
accounting for services
4.1 Management responsibility 4.2 Governance of processes
operated by other parties
4.5 Establish the SMS 4.3 Documentation management
4.4 Resource management
4. Service Management System (SMS)
9. Control processes
9.1 Configuration management
9.2 Change management
9.3 Release and deployment
management
ISO/IEC JTC 1/SC 7 - Software and systems engineering
ISO/IEC 33001:2015
Information technology -- Process assessment -- Concepts and terminology60.60
35.080
ISO/IEC 33002:2015
Information technology -- Process assessment -- Requirements for performing
process assessment
ISO/IEC 33003:2015
Information technology -- Process assessment -- Requirements for process
measurement frameworks60.60 35.080
ISO/IEC 33004:2015
Information technology -- Process assessment -- Requirements for process
reference, process assessment and maturity models60.60 35.080
ISO/IEC TR 33014:2013
Information technology -- Process assessment -- Guide for process improvement
ISO/IEC 33020:2015
Information technology -- Process assessment -- Process measurement framework
for assessment of process capability
ISO/IEC TS 33052:2016
Information technology -- Process reference model (PRM) for information security
management
ISO/IEC 33063:2015
Information technology -- Process assessment -- Process assessment model for
software testing60.60 35.080
ISO/IEC TS 33072:2016
Information technology -- Process assessment -- Process capability assessment
model for information security management
ISO/IEC NP 33016 Information technology -- Process assessment -- Process assessment
body of knowledge 10.99
Trying to Run Before Walking
Reactive
Proactive
 Analyze trends
 Set thresholds
 Predict problems
 Measure appli-
cation availability
 Automate
 Mature problem,
configuration,
change, asset
and performance
mgt processes
 Fight fires
 Inventory
 Desktop SW
distribution
 Initiate
problem mgt
process
 Alert and
event mgt
 Measure component
availability (up/down)
 IT as a service
provider
 Define services,
classes, pricing
 Understand costs
 Guarantee SLAs
 Measure & report
service availability
 Integrate processes
 Capacity
mgt
Service
Value
 IT as strategic
business partner
 IT and business
metric linkage
 IT/business
collaboration
improves business
process
 Real-time
infrastructure
 Business planning
Level 2
Level 3
Level 4
Chaotic
 Ad hoc
 Undocumented
 Unpredictable
 Multiple help
desks
 Minimal IT
operations
 User call
notification
Level 1
Tool Leverage
Manage IT as a Business
Service Delivery Process Engineering
Operational Process Engineering
Service and Account Management
Level 5
ISO/IEC JTC 1/SC 27 - IT Security techniques (1/2)
ISO/IEC 27000:2016 Information technology -- Security techniques -- Information security management systems -- Overview and
vocabulary
ISO/IEC 27001:2013 Information technology -- Security techniques -- Information security management systems – Requirements
ISO/IEC 27001:2013/Cor 1:2014 60.60 35.040
ISO/IEC 27001:2013/Cor 2:2015 60.60 35.040
ISO/IEC 27002:2013 Information technology -- Security techniques -- Code of practice for information security controls
ISO/IEC 27002:2013/Cor 1:2014 60.60 35.040
ISO/IEC 27002:2013/Cor 2:2015 60.60 35.040
ISO/IEC DIS 27003.2 Information technology -- Security techniques -- Information security management system -- Guidance 4
ISO/IEC 27003:2010 Information technology -- Security techniques -- Information security management system implementation
guidance 90.92 35.040
ISO/IEC 27004:2009 Information technology -- Security techniques -- Information security management – Measurement
ISO/IEC 27004 Information technology -- Security techniques -- Information security management -- Monitoring, measurement,
analysis and evaluation 60.00
ISO/IEC 27005:2011 Information technology -- Security techniques -- Information security risk management 60.60 35.040
ISO/IEC 27006:2015 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of
information security management systems 60.60 35.040
ISO/IEC CD 27007 Information technology -- Security techniques -- Guidelines for information security management systems
auditing
ISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information security management systems
auditing
ISO/IEC PDTS 27008 Information technology -- Security techniques -- Guidelines for the assessment of information security controls
ISO/IEC TR 27008:2011 Information technology -- Security techniques -- Guidelines for auditors on information security controls
ISO/IEC 27009:2016 Information technology -- Security techniques -- Sector-specific application of ISO/IEC 27001 – Requirements
ISO/IEC 27010:2015 Information technology -- Security techniques -- Information security management for inter-sector and inter-
organizational communications 60.60 35.040
ISO/IEC FDIS 27011 Information technology -- Security techniques -- Code of practice for Information security controls based on
ISO/IEC 27002 for telecommunications organizations 50.60 35.040
ISO/IEC 27011:2008 Information technology -- Security techniques -- Information security management guidelines for
telecommunications organizations based on ISO/IEC 27002 90.92 35.040
ISO/IEC 27013:2015 Information technology -- Security techniques -- Guidance on the integrated implementation of ISO/IEC 27001
and ISO/IEC 20000-1 60.60 03.080.99
ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information security 60.60 35.040
ISO/IEC TR 27015:2012 Information technology -- Security techniques -- Information security management guidelines for financial
services
ISO/IEC TR 27016:2014 Information technology -- Security techniques -- Information security management -- Organizational
economics 60.60
ISO/IEC 27017:2015 Information technology -- Security techniques -- Code of practice for information security controls based on
ISO/IEC 27002 for cloud services 60.60 35.040
ISO/IEC 27018:2014 Information technology -- Security techniques -- Code of practice for protection of personally identifiable
information (PII) in public clouds acting as PII processors 60.60 35.040
ISO/IEC TR 27019:2013 Information technology -- Security techniques -- Information security management guidelines based on
ISO/IEC 27002 for process control systems specific to the energy utility industry
15
ISO/IEC JTC 1/SC 27 - IT Security techniques (2/2)
ISO/IEC TR 27023:2015 Information technology -- Security techniques -- Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002
ISO/IEC 27031:2011 Information technology -- Security techniques -- Guidelines for information and communication technology readiness for business
continuity 90.60 35.040
ISO/IEC 27032:2012 Information technology -- Security techniques -- Guidelines for cybersecurity 60.60 35.040
ISO/IEC 27033-1:2015 Information technology -- Security techniques -- Network security -- Part 1: Overview and concepts 60.60 35.040
ISO/IEC 27033-2:2012 Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network
security 60.60 35.040
ISO/IEC 27033-3:2010 Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques
and control issues
ISO/IEC 27033-4:2014 Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security
gateways 60.60 35.040
ISO/IEC 27033-5:2013 Information technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual
Private Networks (VPNs) 60.60 35.040
ISO/IEC 27033-6:2016 Information technology -- Security techniques -- Network security -- Part 6: Securing wireless IP network access 60.60 35.040
ISO/IEC 27034-1:2011 Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts 90.20 35.040
ISO/IEC 27034-1:2011/Cor 1:2014 60.60 35.040
ISO/IEC 27034-2:2015 Information technology -- Security techniques -- Application security -- Part 2: Organization normative framework 60.60
ISO/IEC CD 27034-3 Information technology -- Security techniques -- Application security -- Part 3: Application security management process 30.60
ISO/IEC DIS 27034-5 Information technology -- Security techniques -- Application security -- Part 5: Protocols and application security controls data structure
40.60
ISO/IEC 27034-6:2016 Information technology -- Security techniques -- Application security -- Part 6: Case studies 60.60 35.040
ISO/IEC DIS 27034-7 Information technology -- Security techniques -- Application security -- Part 7: Application security assurance prediction model
ISO/IEC PDTS 27034-5-1 Information technology -- Security techniques -- Application security -- Part 5-1: Protocols and application security controls data
structure -- XML schemas 30.60 35.040
ISO/IEC 27035:2011Information technology -- Security techniques -- Information security incident management 90.92 35.040
ISO/IEC 27035-1 Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident management
ISO/IEC 27035-2 Information technology -- Security techniques -- Information security incident management -- Part 2: Guidelines to plan and prepare for incident
response
ISO/IEC 27036-1:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 1: Overview and concepts
ISO/IEC 27036-2:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 2: Requirements 60.60
ISO/IEC 27036-3:2013 Information technology -- Security techniques -- Information security for supplier relationships -- Part 3: Guidelines for information and
communication technology supply chain security 60.60 35.040
ISO/IEC 27036-4:2016 Information technology -- Security techniques -- Information security for supplier relationships -- Part 4: Guidelines for security of cloud
services
ISO/IEC 27037:2012 Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence
ISO/IEC 27038:2014 Information technology -- Security techniques -- Specification for digital redaction 60.60 35.040
ISO/IEC 27039:2015 Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection and prevention systems (IDPS)
60.60
ISO/IEC 27040:2015 Information technology -- Security techniques -- Storage security 60.60 35.040
ISO/IEC 27041:2015 Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method
ISO/IEC 27042:2015 Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence 60.60 35.040
ISO/IEC 27043:2015 Information technology -- Security techniques -- Incident investigation principles and processes 60.60 35.040
ISO/IEC 27050-1 Information technology -- Security techniques -- Electronic discovery -- Part 1: Overview and concepts 60.00 35.040
ISO/IEC CD 27050-2 Information technology -- Security techniques -- Electronic discovery -- Part 2: Guidance for governance and management of electronic
discovery 30.60 35.040
ISO/IEC DIS 27050-3 Information technology -- Security techniques -- Electronic discovery -- Part 3: Code of Practice for electronic discovery
16
Network is Compromised
threat
Usulan dari ISO/TC 184/SC 4 - Industrial data (1/2)
Page 19
ISO/TS 8000-1:2011 Data quality -- Part 1: Overview90.93 25.040.40 ISO 8000-
2:2012 Data quality -- Part 2: Vocabulary60.60 01.040.25
ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and
measuring60.60 01.040.25
ISO 8000-100:2016 Data quality -- Part 100: Master data: Exchange of characteristic
data: Overview60.60 25.040.40
ISO 8000-110:2009 Data quality -- Part 110: Master data: Exchange of characteristic
data: Syntax, semantic encoding, and conformance to data specification90.60
ISO 8000-120:2016 Data quality -- Part 120: Master data: Exchange of characteristic
data: Provenance60.60 25.040.40
ISO 8000-130:2016 Data quality -- Part 130: Master data: Exchange of characteristic
data: Accuracy60.60 25.040.40
ISO 8000-140:2016 Data quality -- Part 140: Master data: Exchange of characteristic
data: Completeness60.60 25.040.40
ISO/TS 8000-150:2011 Data quality -- Part 150: Master data: Quality management
framework
Usulan dari ISO/TC 184/SC 4 - Industrial data (2/2)
Page 20
ISO 15926-1:2004 Industrial automation systems and integration -- Integration of life-cycle data for process
plants including oil and gas production facilities -- Part 1: Overview and fundamental principles90.93 25.ISO
15926-2:2003 Industrial automation systems and integration -- Integration of life-cycle data for process plants
including oil and gas production facilities -- Part 2: Data model90.93 25.040.40
ISO/TS 15926-3:2009 Industrial automation systems and integration -- Integration of life-cycle data for
process plants including oil and gas production facilities -- Part 3: Reference data for geometry and
topology90.93 75.020
ISO/TS 15926-4:2007 Industrial automation systems and integration -- Integration of life-cycle data for
process plants including oil and gas production facilities -- Part 4: Initial reference data90.93 75.020
ISO/TS 15926-4:2007/Amd 1:2010 60.60 75.020
ISO/TS 15926-6:2013 Industrial automation systems and integration -- Integration of life-cycle data for
process plants including oil and gas production facilities -- Part 6: Methodology for the development and
validation of reference data90.92 25.040.40
ISO/TS 15926-7:2011 Industrial automation systems and integration -- Integration of life-cycle data for
process plants including oil and gas production facilities -- Part 7: Implementation methods for the integration
of distributed systems: Template methodology90.93 75.020
ISO/TS 15926-8:2011 Industrial automation systems and integration -- Integration of life-cycle data for
process plants including oil and gas production facilities -- Part 8: Implementation methods for the integration
of distributed systems: Web Ontology Language (OWL) implementation90.93 75.020
ISO/TS 15926-11:2015 Industrial automation systems and integration -- Integration of life-cycle data for
process plants including oil and gas production facilities -- Part 11: Methodology for simplified industrial usage
of reference data
Seri ISO 8000 Data Quality
Page 21
ISO 8000 ontology
Part 1 : Scope , Justification and principles
Part 3 Taxonomy : ISO 8000 parts & other standards relationships
Part 8 Information and Data Quality Measuring
Part 9 Information data
quality relationship with
other standards
Part 20 Data Quality: Provenance
Part 30 Data Quality Accuracy
Part 40 Data Quality Completeness
Part 50 Data Quality
management framework
Part 60 Information &
Data Quality Process
Assessment
Part 100 Master data:
Exchange of characteristic
data: Overview
Part 10 Data Quality Syntax, semantic encoding,
and conformance to data specification
Part 120 Master data:
Exchange of characteristic
data: Provenance
Part 130 Master data:
Exchange of characteristic
data: Accuracy
Part 140 Master data:
Exchange of characteristic
data: Completeness
Part 150 Master Data
Quality management
framework
Part 311 Guidance for
the application of PDQ-S
Part 2 Vocabulary
Characteristics or Data quality dimensions
RequirementsSyntax SemanticsPragmatics Measurements
methods
Management
methods
Introduction
Vocab. / Onto
General concepts & definitions
Specialized concepts & definitions
Management framework
Usage guides
Part 110 Master data:
Exchange of characteristic
data: Overview
Diskusi
22

More Related Content

PPTX
Usulan untuk wg1 dan wg2 serta kualitas data pada kaminfo 12 agustus 2015
PPT
PPTX
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
PDF
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
PPTX
02 sasaran kendali pencapaian tujuan v05
PPTX
Know more about exin unique information security program
PPTX
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
PPTX
SCADA Cybersecurity Training
Usulan untuk wg1 dan wg2 serta kualitas data pada kaminfo 12 agustus 2015
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
02 sasaran kendali pencapaian tujuan v05
Know more about exin unique information security program
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
SCADA Cybersecurity Training

What's hot (16)

PPTX
Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015 rapat ke-2 pt35-...
PPTX
Usulan untuk wg1 dan wg2 pada pnps2015 rapat awal pt35-01 - 9 april 2015
PPTX
UNINFO - BIG DATA & Information Security Standards - Guasconi
PDF
Iso 29001 white paper lakshy rev02_17022015 low
PDF
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
PPT
Integrating Multiple IT Security Standards
PPTX
All you wanted to know about iso 27000
PPTX
Get iso 27000 certification in 7 steps
PPT
Introduction to Information System Security
PPTX
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
PPT
ISO 27001 - Information Security Management System
PDF
ET4045-Information Security Management System-2018
PDF
Guide to industrial control systems (ics) security
PPS
ISO 27001 2013 isms final overview
PDF
27001 2015(+a1)
PDF
NQA Your Risk Assurance Partner
Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015 rapat ke-2 pt35-...
Usulan untuk wg1 dan wg2 pada pnps2015 rapat awal pt35-01 - 9 april 2015
UNINFO - BIG DATA & Information Security Standards - Guasconi
Iso 29001 white paper lakshy rev02_17022015 low
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Integrating Multiple IT Security Standards
All you wanted to know about iso 27000
Get iso 27000 certification in 7 steps
Introduction to Information System Security
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
ISO 27001 - Information Security Management System
ET4045-Information Security Management System-2018
Guide to industrial control systems (ics) security
ISO 27001 2013 isms final overview
27001 2015(+a1)
NQA Your Risk Assurance Partner
Ad

Viewers also liked (20)

PPTX
Unhan membangun kemampuan siber indonesia di era perang informasi
PDF
E gov keamanan informasi 3 okt 2016 - kpk
PDF
Kriteria Evaluasi Keamanan Perangkat - Common criteria for dummies, Sistem Pe...
PPTX
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
PDF
K. sarwono sutikno makalah singkat kpk 2015
PDF
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
PDF
ID IGF 2016 - Infrastruktur 3 - Cyber Security Solution through Lemsaneg Fram...
PDF
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
PDF
ODP
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
PPT
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
PPT
Developing a Legal Framework for Privacy
Unhan membangun kemampuan siber indonesia di era perang informasi
E gov keamanan informasi 3 okt 2016 - kpk
Kriteria Evaluasi Keamanan Perangkat - Common criteria for dummies, Sistem Pe...
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
K. sarwono sutikno makalah singkat kpk 2015
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Infrastruktur 3 - Cyber Security Solution through Lemsaneg Fram...
What you need to know about NGSOC. Presented at #CSXAsia #ScavengerHunt about...
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Developing a Legal Framework for Privacy
Ad

Similar to Usulanuntukwg1danwg2dandata28 feb2017 (20)

PDF
Iso27001- Nashwan Mustafa
PPT
S nandakumar_banglore
PPT
S nandakumar
PDF
List of ISO27000-Family International Standards organisation.pdf
PDF
mm CGEIT Best Practices and Concepts
PPTX
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
PPTX
Sosialisasi sni iso iec 20000 - sistem manajemen layanan
PDF
Standards and best practices
PDF
A Major Revision of the CISRCP Program
PPTX
Cybersecurity Presentation at WVONGA spring meeting 2018
PPT
IT Audit methodologies
PDF
Standards for Virutal Manufacturing and Factory of the Future: position and s...
PPTX
Standards for virtual manufacturing and factory of the future position and s...
PDF
20CS024 Ethics in Information Technology
PPT
Metholodogies and Security Standards
PPTX
Masters of Machines II: Conquering complexity with operational intelligence
DOCX
Policy InformationPolicy Name __________________________ ID _.docx
DOCX
What operational technology cyber security is?
PPTX
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
PDF
Pci standards, from participation to implementation and review
Iso27001- Nashwan Mustafa
S nandakumar_banglore
S nandakumar
List of ISO27000-Family International Standards organisation.pdf
mm CGEIT Best Practices and Concepts
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sosialisasi sni iso iec 20000 - sistem manajemen layanan
Standards and best practices
A Major Revision of the CISRCP Program
Cybersecurity Presentation at WVONGA spring meeting 2018
IT Audit methodologies
Standards for Virutal Manufacturing and Factory of the Future: position and s...
Standards for virtual manufacturing and factory of the future position and s...
20CS024 Ethics in Information Technology
Metholodogies and Security Standards
Masters of Machines II: Conquering complexity with operational intelligence
Policy InformationPolicy Name __________________________ ID _.docx
What operational technology cyber security is?
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Pci standards, from participation to implementation and review

More from Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F (20)

PDF
Makalah Optimalisasi Peran Dewan Pengawas 2024 v01.pdf
PDF
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
PDF
Keamanan Data Digital - SPI ITB - Rabu 3 Agustus 2022 -v2.pdf
PDF
Keamanan Informasi Metaverse - 18 Juni 2022.pdf
PDF
Webinar Sabtu 14 Mei 2022 - Digital Signature dan Keamanan Transaksi Keuangan...
PDF
SMKI vs SMAP vs SMM vs SMOP v06
PDF
Tata Kelola Informasi & Teknologi (I&T), dan Aset Informasi
PDF
Silabus el5213 internal auditing (audit internal) v021
PDF
Kuliah tamu itb 11 maret 2020
PPTX
PDF
Buku gratifikasi dalam perspektif agama - Desember 2019 - KPK
PDF
Rancang bangun portable hacking station menggunakan raspberry pi tesis-sath...
PDF
Sistem Tata Kelola Keamanan Informasi SPBE menggunakan COBIT 2019
PDF
Indeks Presepsi Korupsi Indonesia 20 thn Reformasi - TII
PPTX
Materi wisuda untag 7 sep2019 won
PDF
Materi caleg road show bus nganjuk - mod won
PDF
Islam, pendidikan karakter & antikorupsi mod won v02
PDF
SMKI vs SMAP vs SMM vs SML v04
PPT
Perguruan tinggi dan pencegahan korupsi mod won
Makalah Optimalisasi Peran Dewan Pengawas 2024 v01.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Keamanan Data Digital - SPI ITB - Rabu 3 Agustus 2022 -v2.pdf
Keamanan Informasi Metaverse - 18 Juni 2022.pdf
Webinar Sabtu 14 Mei 2022 - Digital Signature dan Keamanan Transaksi Keuangan...
SMKI vs SMAP vs SMM vs SMOP v06
Tata Kelola Informasi & Teknologi (I&T), dan Aset Informasi
Silabus el5213 internal auditing (audit internal) v021
Kuliah tamu itb 11 maret 2020
Buku gratifikasi dalam perspektif agama - Desember 2019 - KPK
Rancang bangun portable hacking station menggunakan raspberry pi tesis-sath...
Sistem Tata Kelola Keamanan Informasi SPBE menggunakan COBIT 2019
Indeks Presepsi Korupsi Indonesia 20 thn Reformasi - TII
Materi wisuda untag 7 sep2019 won
Materi caleg road show bus nganjuk - mod won
Islam, pendidikan karakter & antikorupsi mod won v02
SMKI vs SMAP vs SMM vs SML v04
Perguruan tinggi dan pencegahan korupsi mod won

Recently uploaded (20)

PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
semiconductor packaging in vlsi design fab
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
My India Quiz Book_20210205121199924.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PPTX
Education and Perspectives of Education.pptx
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
semiconductor packaging in vlsi design fab
Everyday Spelling and Grammar by Kathi Wyldeck
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Climate and Adaptation MCQs class 7 from chatgpt
What’s under the hood: Parsing standardized learning content for AI
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Journal of Dental Science - UDMY (2020).pdf
Climate Change and Its Global Impact.pptx
My India Quiz Book_20210205121199924.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Education and Perspectives of Education.pptx
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf

Usulanuntukwg1danwg2dandata28 feb2017

  • 1. 1 Usulan Keamanan Siber, Keamanan Informasi dan Sistem Manajemen Layanan serta Kualitas Data v2 Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM Anggota PT35-01 Teknologi Informasi Gedung Sapta Pesona – SDPPI Kominfo, Jakarta 28 Februari 2017
  • 2. The Next Computing Revolution Mainframe computing (60’s – 70’s) Large computers to execute big data processing applications Desktop computing & Internet (80’s – 90’s) One computer at every desk to do business/personal activities Ubiquitous computing (00’s) Numerous computing devices in every place/person Millions for desktops vs. billions for embedded processors Cyber Physical Systems (10’s)
  • 3. 3
  • 5. Presentation: KamInfo.ID5 5 KEAMANAN INFORMASI VERSIISACA Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying. ISACA defines information security as something that: Ensures that information is readily available (availability), when required, and protected against disclosure to unauthorised users (confidentiality) and improper modification (integrity).
  • 6. Presentation: KamInfo.ID6 6 KEAMANAN INFORMASI ......... pemerintah negara Indonesia yang melindungi segenap bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk memajukan kesejahteraan umum, mencerdaskan kehidupan bangsa, dan ikut melaksanakan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi dan keadilan sosial........ Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa dalam perspektif Pertumbuhan Ekonomi untuk Kesejahteraan Rakyat
  • 7. Presentation: KamInfo.ID7 7 KEAMANAN NASIONAL ......... pemerintah negara Indonesia yang melindungi segenap bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk memajukan kesejahteraan umum, mencerdaskan kehidupan bangsa, dan ikut melaksanakan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi dan keadilan sosial........ Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa dalam perspektif Pertumbuhan Ekonomi untuk Kesejahteraan Rakyat
  • 8. 8
  • 9. Kategori Kontrol berbasis Risiko 9 Source: Transforming Cybersecurity: Using COBIT 5, ISACA, 2013
  • 10. Hubungan antar Kerangka Keamanan COBIT 5 Panduan Umum Tata Kelola TIK Nas + Kuesioner Evaluasi Pengendalian Intern TIK Internal Control Framework COSO SNI ISO 38500 PP60/2008 Sistem Pengendalian Intern Pemerintah TataKelolaManajemenPerangkat SNI ISO 20000 10 RSNI ISO 27013 SNI ISO 27014 Governance of Information Security SNI ISO 15408 Common Criteria SNI ISO 27001 Information Security Management System
  • 11. ISO/IEC JTC 1/SC 40 - IT Service Management and IT Governance ISO/IEC 20000-1:2011 SNI ISO/IEC 20000-1:2013 Teknologi Informasi - Manajemen Layanan - Bagian 1: Persyaratan sistem manajemen layanan IEEE Std 20000-1-2013 ISO/IEC 20000-2:2012 SNI ISO/IEC 20000-2:2013 Teknologi informasi - Manajemen layanan - Bagian 2: Pedoman penerapan sistem manajemen layanan IEEE Std 20000-2-2013 ISO/IEC TR 20000-3:2012 SNI ISO/IEC TR 20000-3:2013 Teknologi informasi - Manajemen layanan - Bagian 3: Pedoman pendefinisian lingkup dan kesesuaian dari SNI ISO/IEC 20000-1 ISO/IEC TR 20000-4:2010 SNI ISO/IEC TR 20000-4:2013 Teknologi informasi - Manajemen layanan - Bagian 4: Model referensi proses ISO/IEC TR 20000-5:2010 – replaced by ISO/IEC TR 20000-5:2013 SNI ISO/IEC TR 20000-5:2013 Teknologi informasi - Manajemen layanan - Bagian 5: Contoh acuan perencanaan implementasi SNI ISO/IEC 20000-1 ISO/IEC FDIS 20000-6 Information technology -- Service management -- Part 6: Requirements for bodies providing audit and certification of service management systems ISO/IEC TR 20000-9:2015 Information technology -- Service management -- Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services ISO/IEC TR 20000-10:2013 Information technology -- Service management -- Part 10: Concepts and terminology ISO/IEC TR 20000-12:2016 Information technology -- Service management -- Part 12: Guidance on the relationship between ISO/IEC 20000- 1:2011 and service management frameworks: CMMI-SVC ISO/IEC 30121:2015 Information technology -- Governance of digital forensic risk framework ISO/IEC 38500:2015 Information technology -- Governance of IT for the organization ISO/IEC TS 38501:2015 Information technology -- Governance of IT -- Implementation guide ISO/IEC TR 38502:2014 Information technology -- Governance of IT -- Framework and model ISO/IEC TR 38504:2016 Governance of information technology -- Guidance for principles-based standards in the governance of information technology 11
  • 12. Customers (and other interested parties) Service Requirements Services Customers (and other interested parties) 5. Design and transition of new or changed services 8. Resolution processes 7. Relationship processes 8.1 Incident and service request management 8.2 Problem management 7.1 Business relationship management 7.2 Supplier management 6. Service delivery processes 6.5 Capacity management 6.3 Service continuity & availability management 6.1 Service level management 6.2 Service reporting 6.6 Information security management 6.4 Budgeting & accounting for services 4.1 Management responsibility 4.2 Governance of processes operated by other parties 4.5 Establish the SMS 4.3 Documentation management 4.4 Resource management 4. Service Management System (SMS) 9. Control processes 9.1 Configuration management 9.2 Change management 9.3 Release and deployment management
  • 13. ISO/IEC JTC 1/SC 7 - Software and systems engineering ISO/IEC 33001:2015 Information technology -- Process assessment -- Concepts and terminology60.60 35.080 ISO/IEC 33002:2015 Information technology -- Process assessment -- Requirements for performing process assessment ISO/IEC 33003:2015 Information technology -- Process assessment -- Requirements for process measurement frameworks60.60 35.080 ISO/IEC 33004:2015 Information technology -- Process assessment -- Requirements for process reference, process assessment and maturity models60.60 35.080 ISO/IEC TR 33014:2013 Information technology -- Process assessment -- Guide for process improvement ISO/IEC 33020:2015 Information technology -- Process assessment -- Process measurement framework for assessment of process capability ISO/IEC TS 33052:2016 Information technology -- Process reference model (PRM) for information security management ISO/IEC 33063:2015 Information technology -- Process assessment -- Process assessment model for software testing60.60 35.080 ISO/IEC TS 33072:2016 Information technology -- Process assessment -- Process capability assessment model for information security management ISO/IEC NP 33016 Information technology -- Process assessment -- Process assessment body of knowledge 10.99
  • 14. Trying to Run Before Walking Reactive Proactive  Analyze trends  Set thresholds  Predict problems  Measure appli- cation availability  Automate  Mature problem, configuration, change, asset and performance mgt processes  Fight fires  Inventory  Desktop SW distribution  Initiate problem mgt process  Alert and event mgt  Measure component availability (up/down)  IT as a service provider  Define services, classes, pricing  Understand costs  Guarantee SLAs  Measure & report service availability  Integrate processes  Capacity mgt Service Value  IT as strategic business partner  IT and business metric linkage  IT/business collaboration improves business process  Real-time infrastructure  Business planning Level 2 Level 3 Level 4 Chaotic  Ad hoc  Undocumented  Unpredictable  Multiple help desks  Minimal IT operations  User call notification Level 1 Tool Leverage Manage IT as a Business Service Delivery Process Engineering Operational Process Engineering Service and Account Management Level 5
  • 15. ISO/IEC JTC 1/SC 27 - IT Security techniques (1/2) ISO/IEC 27000:2016 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary ISO/IEC 27001:2013 Information technology -- Security techniques -- Information security management systems – Requirements ISO/IEC 27001:2013/Cor 1:2014 60.60 35.040 ISO/IEC 27001:2013/Cor 2:2015 60.60 35.040 ISO/IEC 27002:2013 Information technology -- Security techniques -- Code of practice for information security controls ISO/IEC 27002:2013/Cor 1:2014 60.60 35.040 ISO/IEC 27002:2013/Cor 2:2015 60.60 35.040 ISO/IEC DIS 27003.2 Information technology -- Security techniques -- Information security management system -- Guidance 4 ISO/IEC 27003:2010 Information technology -- Security techniques -- Information security management system implementation guidance 90.92 35.040 ISO/IEC 27004:2009 Information technology -- Security techniques -- Information security management – Measurement ISO/IEC 27004 Information technology -- Security techniques -- Information security management -- Monitoring, measurement, analysis and evaluation 60.00 ISO/IEC 27005:2011 Information technology -- Security techniques -- Information security risk management 60.60 35.040 ISO/IEC 27006:2015 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems 60.60 35.040 ISO/IEC CD 27007 Information technology -- Security techniques -- Guidelines for information security management systems auditing ISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information security management systems auditing ISO/IEC PDTS 27008 Information technology -- Security techniques -- Guidelines for the assessment of information security controls ISO/IEC TR 27008:2011 Information technology -- Security techniques -- Guidelines for auditors on information security controls ISO/IEC 27009:2016 Information technology -- Security techniques -- Sector-specific application of ISO/IEC 27001 – Requirements ISO/IEC 27010:2015 Information technology -- Security techniques -- Information security management for inter-sector and inter- organizational communications 60.60 35.040 ISO/IEC FDIS 27011 Information technology -- Security techniques -- Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations 50.60 35.040 ISO/IEC 27011:2008 Information technology -- Security techniques -- Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 90.92 35.040 ISO/IEC 27013:2015 Information technology -- Security techniques -- Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 60.60 03.080.99 ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information security 60.60 35.040 ISO/IEC TR 27015:2012 Information technology -- Security techniques -- Information security management guidelines for financial services ISO/IEC TR 27016:2014 Information technology -- Security techniques -- Information security management -- Organizational economics 60.60 ISO/IEC 27017:2015 Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC 27002 for cloud services 60.60 35.040 ISO/IEC 27018:2014 Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 60.60 35.040 ISO/IEC TR 27019:2013 Information technology -- Security techniques -- Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry 15
  • 16. ISO/IEC JTC 1/SC 27 - IT Security techniques (2/2) ISO/IEC TR 27023:2015 Information technology -- Security techniques -- Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 ISO/IEC 27031:2011 Information technology -- Security techniques -- Guidelines for information and communication technology readiness for business continuity 90.60 35.040 ISO/IEC 27032:2012 Information technology -- Security techniques -- Guidelines for cybersecurity 60.60 35.040 ISO/IEC 27033-1:2015 Information technology -- Security techniques -- Network security -- Part 1: Overview and concepts 60.60 35.040 ISO/IEC 27033-2:2012 Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network security 60.60 35.040 ISO/IEC 27033-3:2010 Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques and control issues ISO/IEC 27033-4:2014 Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security gateways 60.60 35.040 ISO/IEC 27033-5:2013 Information technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs) 60.60 35.040 ISO/IEC 27033-6:2016 Information technology -- Security techniques -- Network security -- Part 6: Securing wireless IP network access 60.60 35.040 ISO/IEC 27034-1:2011 Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts 90.20 35.040 ISO/IEC 27034-1:2011/Cor 1:2014 60.60 35.040 ISO/IEC 27034-2:2015 Information technology -- Security techniques -- Application security -- Part 2: Organization normative framework 60.60 ISO/IEC CD 27034-3 Information technology -- Security techniques -- Application security -- Part 3: Application security management process 30.60 ISO/IEC DIS 27034-5 Information technology -- Security techniques -- Application security -- Part 5: Protocols and application security controls data structure 40.60 ISO/IEC 27034-6:2016 Information technology -- Security techniques -- Application security -- Part 6: Case studies 60.60 35.040 ISO/IEC DIS 27034-7 Information technology -- Security techniques -- Application security -- Part 7: Application security assurance prediction model ISO/IEC PDTS 27034-5-1 Information technology -- Security techniques -- Application security -- Part 5-1: Protocols and application security controls data structure -- XML schemas 30.60 35.040 ISO/IEC 27035:2011Information technology -- Security techniques -- Information security incident management 90.92 35.040 ISO/IEC 27035-1 Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident management ISO/IEC 27035-2 Information technology -- Security techniques -- Information security incident management -- Part 2: Guidelines to plan and prepare for incident response ISO/IEC 27036-1:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 1: Overview and concepts ISO/IEC 27036-2:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 2: Requirements 60.60 ISO/IEC 27036-3:2013 Information technology -- Security techniques -- Information security for supplier relationships -- Part 3: Guidelines for information and communication technology supply chain security 60.60 35.040 ISO/IEC 27036-4:2016 Information technology -- Security techniques -- Information security for supplier relationships -- Part 4: Guidelines for security of cloud services ISO/IEC 27037:2012 Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence ISO/IEC 27038:2014 Information technology -- Security techniques -- Specification for digital redaction 60.60 35.040 ISO/IEC 27039:2015 Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection and prevention systems (IDPS) 60.60 ISO/IEC 27040:2015 Information technology -- Security techniques -- Storage security 60.60 35.040 ISO/IEC 27041:2015 Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method ISO/IEC 27042:2015 Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence 60.60 35.040 ISO/IEC 27043:2015 Information technology -- Security techniques -- Incident investigation principles and processes 60.60 35.040 ISO/IEC 27050-1 Information technology -- Security techniques -- Electronic discovery -- Part 1: Overview and concepts 60.00 35.040 ISO/IEC CD 27050-2 Information technology -- Security techniques -- Electronic discovery -- Part 2: Guidance for governance and management of electronic discovery 30.60 35.040 ISO/IEC DIS 27050-3 Information technology -- Security techniques -- Electronic discovery -- Part 3: Code of Practice for electronic discovery 16
  • 19. Usulan dari ISO/TC 184/SC 4 - Industrial data (1/2) Page 19 ISO/TS 8000-1:2011 Data quality -- Part 1: Overview90.93 25.040.40 ISO 8000- 2:2012 Data quality -- Part 2: Vocabulary60.60 01.040.25 ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and measuring60.60 01.040.25 ISO 8000-100:2016 Data quality -- Part 100: Master data: Exchange of characteristic data: Overview60.60 25.040.40 ISO 8000-110:2009 Data quality -- Part 110: Master data: Exchange of characteristic data: Syntax, semantic encoding, and conformance to data specification90.60 ISO 8000-120:2016 Data quality -- Part 120: Master data: Exchange of characteristic data: Provenance60.60 25.040.40 ISO 8000-130:2016 Data quality -- Part 130: Master data: Exchange of characteristic data: Accuracy60.60 25.040.40 ISO 8000-140:2016 Data quality -- Part 140: Master data: Exchange of characteristic data: Completeness60.60 25.040.40 ISO/TS 8000-150:2011 Data quality -- Part 150: Master data: Quality management framework
  • 20. Usulan dari ISO/TC 184/SC 4 - Industrial data (2/2) Page 20 ISO 15926-1:2004 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 1: Overview and fundamental principles90.93 25.ISO 15926-2:2003 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 2: Data model90.93 25.040.40 ISO/TS 15926-3:2009 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 3: Reference data for geometry and topology90.93 75.020 ISO/TS 15926-4:2007 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 4: Initial reference data90.93 75.020 ISO/TS 15926-4:2007/Amd 1:2010 60.60 75.020 ISO/TS 15926-6:2013 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 6: Methodology for the development and validation of reference data90.92 25.040.40 ISO/TS 15926-7:2011 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 7: Implementation methods for the integration of distributed systems: Template methodology90.93 75.020 ISO/TS 15926-8:2011 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 8: Implementation methods for the integration of distributed systems: Web Ontology Language (OWL) implementation90.93 75.020 ISO/TS 15926-11:2015 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 11: Methodology for simplified industrial usage of reference data
  • 21. Seri ISO 8000 Data Quality Page 21 ISO 8000 ontology Part 1 : Scope , Justification and principles Part 3 Taxonomy : ISO 8000 parts & other standards relationships Part 8 Information and Data Quality Measuring Part 9 Information data quality relationship with other standards Part 20 Data Quality: Provenance Part 30 Data Quality Accuracy Part 40 Data Quality Completeness Part 50 Data Quality management framework Part 60 Information & Data Quality Process Assessment Part 100 Master data: Exchange of characteristic data: Overview Part 10 Data Quality Syntax, semantic encoding, and conformance to data specification Part 120 Master data: Exchange of characteristic data: Provenance Part 130 Master data: Exchange of characteristic data: Accuracy Part 140 Master data: Exchange of characteristic data: Completeness Part 150 Master Data Quality management framework Part 311 Guidance for the application of PDQ-S Part 2 Vocabulary Characteristics or Data quality dimensions RequirementsSyntax SemanticsPragmatics Measurements methods Management methods Introduction Vocab. / Onto General concepts & definitions Specialized concepts & definitions Management framework Usage guides Part 110 Master data: Exchange of characteristic data: Overview

Editor's Notes

  • #15: Key Issue: What pitfalls should be avoided when implementing ITIL? Strategic Planning Assumption: Through 2012, 30 percent of large enterprises will achieve end-to-end IT service management, up from fewer than 15 percent today (0.8 probability).