data and information are managed, exposed, and
maintained, against the background of ISO 17799,
the standard for information security management
information systbems.
Information security protects from a wide range of
threats to ensure business continuity, minimize
corporate loss and maximize return on investment
and business opportunity. This security management
allows data to be distributed electronically, so that a
system is needed to ensure data is safe and well
received by the user. Information security can be
defined as “Adequately protecting
the confidentiality, integrity and availability of
information against possible threat
manifestations.” (Verheul, 2011).
Information security is obtained by
implementing a decent set of control tools, which
can be policy, practice, organizational structure and
software.
ISO1779 is an internationally recognized
management standard, which has a broad scope and
is conceptual. This approach allows the application
of ISO 17799 to various companies and applications.
ISO 17799 defines information as a valuable asset
and needs to be protected. ISO 17799 covers the
selection and management of information security
controls. In the 1990s the tech world realized the
weakness of the open concept when malwere, the
term for malicious software (malicious software),
appeared in the form of a virus. Instantly the open
concept turns into a weak point of the system that
allows viruses to enter and attack.
Then came the thought to protect
computers that can only be accessed by authorized
only. So it can be said that the security of the system
need to pay attention to three aspects of teknoology,
human and process. This further emphasizes the
importance of every company is always wary of the
three aspects of IT system security. In order to
minimize the risk of IT system security for the
sustainability of its business
.
1.2 Problem Formulation
a. Does management controls affect the
establishment of ISO 17799?
b. Does operational controls affect the
formation of ISO 17799?
c. Do technical controls affect the formation
of ISO 17799?
1.3 Research Purposes
a. To know and test empirically
management controls is a factor forming
ISO 17799
b. To know and test empirically operational
controls is an ISO form factor 17799
c. To know and test empirically technical
controls is a factor forming ISO 17799
2 LITERATURE REVIEW
2.1 Information Security
Information is an asset must be protected. Security is
generally defined as "quality or state of being
secure-to be free from danger ". Creating safe is by
protecting from enemies and threats of danger.
Examples of information security by (Whitman and
Mattord 2011) are as follows:
a. Physical Security that focuses on strategies for
securing workers or members of organizations,
physical assets, and workplaces from various
threats including fire hazards, unauthorized
access, and natural disasters.
b. Personal Security is overlapped with "phisycal
security" in protecting people in the
organization.
c. Operation Security that focuses on strategies to
secure the ability of an organization or
company to work without interruption.
d. Communications Security which aims to secure
communication media, communication
technology and content, as well as the ability to
utilize this tool to achieve organizational goals.
e. Network Security that focuses on securing the
organization's data network equipment, its
network and its contents, as well as the ability
to use the network in fulfilling the function of
the organization's data communications.
information. Information security has been treated as
a by-product, if not as a ‘‘necessary evil that hinders
productivity’’ (Conray-Murray, 2003). gradually
information security becomes a necessity , surely
information security is getting intothe forefront of
things, and has been promoted froma by-
product to an integral part of business
operations (Conner and Coviello, 2003)
According to( BSI 2008), ISMS is part of the
management system overall based on a business risk
approach to building, implement, operate, monitor,
review, maintain and improve information security.