ARTICLE
TITLE

Information Security Analysis of Online Education Management System using Information Technology Infrastructure Library Version 3

SUMMARY

The rapid development of information affects many aspects of human life. So that the field of information security becomes one aspect that must be considered. This study aims to measure the information security awareness and to improve daily operational activities of managing IT services effectively and efficiently. Salemba Adventist Academy has used the Wium Online Education Management System (WIOEM) online system, but in its implementation the security aspects of the system are not yet known. The Information Technology Infrastructure Library (ITIL) v3 framework which is globally recognized for managing information technology is broken down into five parts: Service Strategy, Service Design, Service Transition, Service Operation, Continual Service Improvement. This study focuses on Service Operations with 4 attributes, namely: Security, Privacy, Risk, and Trust. The data collection method used by the researcher was through observation in the form of a questionnaire in taking the number of samples to several students by taking population samples using the Lemeshow method. After the data were collected, the results of the ITIL indicator questionnaire are calculated based on the data security level. The results show that the Security indicator is Level 1, the Privacy indicator is level 3, the Risk indicator is level 3, and the Trust indicator is level 4 on the Data Security Level scale. This shows that the WIOEM system can be used properly according to user expectations and meets several levels of data security according to ITIL v3 framework.  

 Articles related

O. V. Bisikalo,V. V. Kovtun,M. S. Yukhimchuk    

Context. Compared to universal information systems, the information system for critical use has a simplified structure of the information environment and specific requirements regarding the volumes and nature of information resources. This fact allo... see more


A. V. Dudatyev,O. P. Voitovych    

Context. The existence of a competitive information environment, which is a specific arena for special information operations, showsthe necessity for implemention of information resources complex protection. Information warfare and the problems, those ar... see more


Ian Cheong    

Privacy and security of personal health information continue to generate much discussion and debate. Significant international initiatives appear to be little known. "Privacy" and "security" in terms of information are poorly understood terms. The keys t... see more


Shahira An-nissa    

Cryptography is a technique that is generally used in security in the process of exchanging information in the form of text messages, picture messages, or others involving two or more users. There are many types and classifications of cryptography develo... see more


Po Abas Sunarya,Untung Rahardja,Lusyani Sunarya,Marviola Hardini    

The sophistication of education technology (edu-tech) from the perspective of the blockchain has not been well implemented, because so far the methods used in education are still centralized and tend to be any student data such as class schedules and stu... see more