The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention from the DPA (differential power...
One of the requirements contained in IT general control is the availability of an SDLC. But until now, PT. Telkom has yet to implement risk management in the SDLC process. In order to manage the risks properly, risk assessment is needed to determine approriate internal controls for SDLC. This study tries to present a methodology to assess this value using semi-quantitative risk assessment. The methodology...
This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power...
The objective of information security is assuring the organization's goals instead of preserving information's confidentiality, integrity and availability. An information security management should be integrated with the overall organization's processes. Statistics Indonesia is a government agency which is accountable for providing official statistical data. The information derived from the data then...
Electronic cash research has been done for at least 3 decades. On that period, there have been many researches resulting in various schemes and forms of electronic cash. This paper is reviewing some researches on that period and classify the research based on the basic science used in the research. A number of 43 papers is classified into 4 categories: protocol engineering, information security, cryptography,...
Information is an asset, such as important business assets, has value to an organization and consequently must be well protected. In organizations, information becomes an important and must remain available, and its existence should be maintained from unauthorized access. The use of information by unauthorized parties could be used for negative purposes which would be detrimental to the organization...
In the government agency IT implementation, information technology service and security factors are very important aspect to be considered. International Standardization Organization has published ISO20000 standard as a standard for information technology services management and ISO27001 standard for information security management system. This research described the design of IT service and information...
Management of information without regard to risk the achievement of enterprise goals can have an impact on organizational performance, financial loss or organization's credibility. The risk control for the negative effects and utilization of chance in achieving enterprise goals is called information security. Information security are generally solved by partial and limited. It also happens to INTRAC...
Indonesia electronic identity card (KTP-el) system consisting wireless smartcard, smartcard reader and inhabitants database. Personal data of card holder are stored inside the card. These data can be viewed or taken by unauthorized party. Therefore, in this paper, we discuss about possible threats to the physical of KTP-el reader and the data reading process by KTP-el reader, to consolidate security...
One of early processes in an embedded system designing is system modeling. A modeling is performed to get preliminary figure of a product before it could be implemented in form of a prototype. Generally speaking, an embed system designing processes comprise five stages: product specifications, HW/SW separation. detailed HW/SW designing, integration and testing. The final output is in form of detailed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.