Information Technology Risk Assessment: Octave-S Approach

Gunawan, Bambang and Merry, Merry and Nelly, Nelly (2011) Information Technology Risk Assessment: Octave-S Approach. Jurnal CommIT, 05 (01). ISSN 1979-2484

Full text not available from this repository.
Official URL:


Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.

Item Type: Article
Additional Information: 6_Volume 05 / Nomor 01 / May 2011_Information Technology Risk Assessment: Octave-S Approach
Subjects: Information Technology
Divisions: ?? journal_30_6_Volume-05-Nomor-01-May-2011 ??
Depositing User: Mr. Super Admin
Date Deposited: 30 May 2013 17:33
Last Modified: 03 Jun 2013 06:28

Actions (login required)

View Item View Item