Manajemen Risiko dan Keamanan Layanan TI


🧭 1. Pengantar Manajemen Risiko & Keamanan TI

https://images.openai.com/static-rsc-4/QNQjrXJkZrS7-VaSQqOICqROyLgaIiNGTydfZ7OAwOLPpXOvaXILxVRP1DDVWgeOJA6V5taWfLiQZXBUAEOYc8I4ssBjTRoU1pzxXoEORtEfM0VnS2CxITZJmUb9UdQ0OgWIxN5NbTbmxIGq_4u9FqFo0q9RtKCqRoxvJ2j35tFDY8f98eWhqCw16YAq7Qzn?purpose=fullsize
https://images.openai.com/static-rsc-4/UIZhvWUrF93ivJIUBQM6QQHLz_yBo2-wehblVEbDuoHyY4rTafhnXmRlW7QYR38w_f8DQKNwxGVOoghimMKxMLX_SneUIGf8Ed7aGdEHF0h2GETpFa4whfFpnsVEcyScIl10_jTWCrvsGUUZmSBu8TKApxZ-X-gb-31Htrk3SU4feTTYGR_k8R_bCKoQjftq?purpose=fullsize

7

πŸ“– Definisi

  • Manajemen Risiko TI β†’ proses mengidentifikasi, menganalisis, dan mengendalikan risiko dalam layanan TI
  • Keamanan TI (Information Security) β†’ upaya melindungi sistem, data, dan layanan dari ancaman

Mengacu pada standar internasional seperti:
πŸ‘‰ ISO/IEC 27001


🧠 Narasi

Dalam layanan TI modern:

  • Risiko tidak bisa dihindari
  • Ancaman semakin kompleks

πŸ‘‰ Contoh:

  • Serangan hacker
  • Kebocoran data
  • Sistem down

πŸ‘‰ Oleh karena itu:

Keamanan dan risiko harus dikelola secara sistematis


🎯 2. Tujuan Manajemen Risiko & Keamanan TI

https://images.openai.com/static-rsc-4/BXt0CZZ_LfG-QT5tLoHKKtjzrxyWJ0LLRruuaBpLt6mC8me1lhniiK1QoUAobezidrWFTZYzDRHEg4IYi1xxZ72DbmxbUdfDEoQqdoWIT0mEs7WWKdxaGqNZ1wFimg5Zk9x33LpjhzEUSrWTPq9OhItK4hBQgD3GDPvMXNSBYLxP-H-7hH5sy96L39G_qZb7?purpose=fullsize
https://images.openai.com/static-rsc-4/PorjXDogIK3mqBhQrv-ytudQzK1lUuwyuX-izap_zZimJEISdQnKFJSURdH0y941LdZFxRol_q2hbD2gVXpbC4_a2o_04_h38FTloxC_Z-AC4UNWhAppZQE3GWDq0pKmIvThvXsOSR-KH1y_gr8hhHuGSCq91H16DJZXXEhgtSc-J9dz5dEqXWaIsh5sAs1v?purpose=fullsize
https://images.openai.com/static-rsc-4/XXjHSekAOC7wwDpOyE7M0fY-aiWPba2Uy45Ld1GoFYeN4ETyCbr58b4o8ZE14fs3PQz79UF_Iq102N3LcJsC0JyEfYpv7eUK-I50aBPMPyFFaSzvOCXH7gsHFMo_reYpyLGsg6LxTZQkyLPb-CcI0qDmgbMEnmGyux-pHhi0SYTg08TCRTSI2_78Qat4A-fl?purpose=fullsize

7

🎯 Tujuan Utama

  • Melindungi data dan sistem
  • Mengurangi risiko gangguan layanan
  • Menjamin kontinuitas layanan
  • Meningkatkan kepercayaan pengguna

🧠 Narasi

Tanpa keamanan:

  • Data bisa bocor
  • Sistem bisa diserang

Tanpa manajemen risiko:

  • Organisasi tidak siap menghadapi ancaman

πŸ”Ί 3. CIA Triad (Konsep Keamanan Informasi)

https://images.openai.com/static-rsc-4/FEKdeIzarmW-rwU6RaMZjhE0whlBRHOTfvVLVX98vF0JO2bJDtwvJrzADBoaC5JfP8d1s6xKl8WBkI2XP7Qw6MGdrimZ_Wjv5bVy5u-juNHShTWPWjJ1wXHSR4WY8ut5YRxE3UksTa9DDkh-PissCAUB8txM5kavidbAmyVmzODHg3Urh4LGKukZ8FiL7DDS?purpose=fullsize
https://images.openai.com/static-rsc-4/XggTRDFWVY_Akcddusz80Au9bOYSQWTgrdA0Fm-18FcchTRIEYS7df02FJHnT50DK0nJd1NGksXQSXhHFtaqjA6nJEawMBXQjoN7g8Qg9dD4DYYBOEx4h684MzfRGH-xerxsd9JMSKViZa9MrqPUNp2CFbNUQzE9-L95VVYlBI9qnrUQJWoJEyZZeokJY5C-?purpose=fullsize
https://images.openai.com/static-rsc-4/gfJxGFvW3ajHT72igcVskCK0NUElFkp03XSKwSymIIO7fOkUeLv4YlinGAvWKD6VDLtgC6sokSpbpUNDkOQTUmcHti-3f1R2VKTxhxqMx4tdX3x6E4DAETCfufkD1wZ_ZhP-YOm4atFgM-zXKnOFNowW5L2TawJHBlEETluUMniEoht8f1vXjuVsGKIRGoNQ?purpose=fullsize

7

πŸ“– Komponen CIA

KomponenPenjelasan
ConfidentialityKerahasiaan data
IntegrityKeutuhan data
AvailabilityKetersediaan layanan

🧠 Narasi

Contoh:

  • Data mahasiswa tidak boleh bocor β†’ Confidentiality
  • Nilai tidak boleh diubah β†’ Integrity
  • Sistem harus selalu bisa diakses β†’ Availability

⚠️ 4. Jenis Risiko dalam Layanan TI

https://images.openai.com/static-rsc-4/9GYZ2dzk0lkBxd99RMh19bKptQKLhTmXqwA6J62U8zF1QqTGs7E8uOOn8RbjRdaOq6jF2qB5vfQowdLh2LzgsXskNd1N88zfvX2z53oReosnYpmonkflf5lcpZf0NCD61UTnu607Xqb1o4MvYJmK1HnVA2OUzIjIjZV6pS6WqCogZyMcV31HglMkVF4Zyd38?purpose=fullsize
https://images.openai.com/static-rsc-4/Jve3TgxWkOhKtyqj7lPaReynrRN7tGSOjWf_izqqC1z6qtuCo7nuGhSZSJnKqtOJ2PJ6AreXmiOtPHrE7oTJXxNJhN99VGd-_FEeg8BD9KbAQGo8GFpYVCnZKLb2vWlKBYhwiQesS_4CiSlNiDIXizhW4pishtbF4iM6t8tVBNWR26nAjlod9JSUDXft8hHL?purpose=fullsize
https://images.openai.com/static-rsc-4/3wXF9b7mXIoe1GVHko5FLu85w-dB0C0Fk0DDt0yGpxMBnOdaCskwHcMbmEl8AUQP-AIzAK44AqclkgzFfl6_g6mu_CkBhshTuEhwS-KWI4ZpLeT0Mh01z7Lq8HdyxTH-K7q-OuajDsxW52bXLqjG5W2su2xGxILD-JkuXEbf9yNR8VpRcSwFHHbTFDYJ50HJ?purpose=fullsize

8

πŸ“– Kategori Risiko

JenisContoh
TeknisServer down
KeamananHacking
OperasionalHuman error
LingkunganBencana alam

🧠 Narasi

Risiko bisa berasal dari:

  • Internal
  • Eksternal

πŸ‘‰ Semua harus diidentifikasi


πŸ” 5. Proses Manajemen Risiko

https://images.openai.com/static-rsc-4/hsGcBGryR8KqHbqd-fgM6Tz4p60aECdrzd5PWQL8pOh-omczjb6BOxeQl2xm5W8WIdQQxm4Wa0msbrSjXYJZIHshG5CUvOUzBhexLtQ84hRvvmhStRpnLCzu67_4lsB_0uMU5otkwwr8QmZi-4r-98XHlabmvDGv4jVWhjtyx1xQC7qrw3icjWMsIhPxotMk?purpose=fullsize
https://images.openai.com/static-rsc-4/KuQQS2OyUHtUW7AHf48-7dLZh7fj__ggCnrq904wH2wI8nAOwYZVTFvDHJJ8IWT7gvR6ixZgSdMAegZ1dqtpCw5YfGqmoIrE4NEKlg7cWXnoHx5ePfprP7s38kqu8wXKKQPUYMb7vsI1ofvssXbXw-pWGbUvtNrhIvqZHflalcVjmM2FGNBlJY6VBNf4hOD2?purpose=fullsize
https://images.openai.com/static-rsc-4/a1ZEXtYxmJJqFZn4lTF1V8emUckhE-Qtu2uVZSuwPvOciCQbsLO14HInNaUHS1Guv7hTI0q0Ahl9yHH9VtDrzvixM38ophyl0xOV0rRWZNOBd1ubEDN_AO2LQEnVJye-tbYxWaVy9h36Yq4VN0fJSOZ_DeRyUMxRIGZhtscipWZ2NXvtFoH2Io1zr5F2wSmE?purpose=fullsize

7

πŸ“– Tahapan

  1. Identifikasi Risiko
  2. Analisis Risiko
  3. Evaluasi Risiko
  4. Mitigasi Risiko
  5. Monitoring

🧠 Narasi

πŸ”Ž Identifikasi

Menentukan potensi risiko

πŸ“Š Analisis

Menilai dampak dan kemungkinan

βš–οΈ Evaluasi

Menentukan prioritas

πŸ›‘οΈ Mitigasi

Mengurangi risiko

πŸ”„ Monitoring

Mengawasi risiko secara terus-menerus


πŸ“Š 6. Risk Matrix (Matriks Risiko)

https://images.openai.com/static-rsc-4/GIaGdCBg9nwhK3mUKrPzJ8TuOnlrL-7wAO3tcj_z71_vUkXp1WXLsAdUr1DcoESclgmXchg2tktxZNm0FIOce2VajIJ_sr118L_0yaAYSpqXkw_maVWJu8C1UQiDZANIk0K9RST6ZUXJtQ9R8dSDh7vj7UmP1OynnO3ckW4ZpvcSIUUaDikOhQIZzGUKZoVQ?purpose=fullsize
https://images.openai.com/static-rsc-4/lHf-EoMS0ve-lmKBkNbFwhnp0VjxGn40Q0lZRm-xLMfWC7Cx6Yx1YgFbyEHmeAr6lc76Pig7iQIK4a9zu8Qn7K9EwwXJ79imVO8MYowvsL_8yQRIfHp1u1fOtVW67YbYhxRJIpgFv3nu_9PEPZBaHcbPBuOoQY_ocoHFxg_2t7VHBq6GOZhRSTqgRys_wViO?purpose=fullsize
https://images.openai.com/static-rsc-4/NC3kZ0_zgJhloxrc8GATFu2tIwDDr3LVMJPonTIam_CnkxdoiWkWeakj2BLKVfZoGzsXb41JTkCYASelLDA6yMfeAevtA4Cgc-Xy6_gM1wMTBE_tKQfy1QShkls_3StjoVf-pvMY9W1bt0jriBDdaO1kMi_bRZg6f1zxkrSY7OcDfMp38mddYoX1uVZq2R5f?purpose=fullsize

6

πŸ“– Contoh Matriks

ImpactProbabilityRisk Level
TinggiTinggiCritical
TinggiRendahHigh
RendahTinggiMedium
RendahRendahLow

🧠 Narasi

Matriks membantu:

  • Menentukan prioritas risiko
  • Fokus pada risiko terbesar

πŸ” 7. Keamanan Layanan TI

https://images.openai.com/static-rsc-4/JLPocBNiaUJQToMqrhq7fsmkXFEUKc9cqhGFYZ_873pPFwPBJM5VI3gIAWysDC5yeboIs6zyWj6mPiWpBFZr941PZq2Po9cr1Fx9Hf-5KqnpwHg9lWKhsvDWleOwR93sUbq-c8-lIv10610U9D1MXPuNHz1C8ODIJZt1FHlkQ1t_pxBAqoe-A-v8WdsavGNy?purpose=fullsize
https://images.openai.com/static-rsc-4/BNsngaPRRFSq1u4fQOSBWKw4c48Iy6d6SxqGJR96W518FyNVMuj3EDt5CybhalaS9yLd2lxyOls2GHf6cpheW9NX-NpXPNcJcsexaD6yt3KNQnXdpxfJ7r7e1vjt4ZcHQt7FwQBd_n4hDB1IYbXTxoHag2oV3sFf4rNX7MnXGaCBUPN8T1X9IOWHJvjPoxb7?purpose=fullsize
https://images.openai.com/static-rsc-4/xPnbJF-bG9Pmne5w5qtuN6HXFyLm431sIiUm7YjqMvt-_ShNcz2EyV4QP_gxyuqPFSjAceuEcNTBuq82I5YgDgfdisPlqJu9pGq1pKLtmMlHI2jk55PVyI5h_pYvic7k7n1xVtn8jhthD4AqrbBRoFBBZ-Gob7B-L8ibldc_umGsmMZy1lCIrChSb9bknSCp?purpose=fullsize

6

πŸ“– Layer Keamanan

  • Network Security
  • Application Security
  • Endpoint Security
  • Data Security

🧠 Narasi

Keamanan harus berlapis (defense in depth)

πŸ‘‰ Jika satu layer gagal β†’ layer lain melindungi


πŸ”‘ 8. Kontrol Keamanan (Security Controls)

https://images.openai.com/static-rsc-4/3jP86OY9xZRrW8lxoAUtNQYURWj6mpq1EyRgc30GvEsYJ6TxCvB2eA6TYaNNTX4iAi-upFRvA6Mp68YM0b_sreMY-G1nbflf6JN0BVp7bVvRaan3lbngYIoSLAz6-B-aEyt-buppGTbkj5oKwJGZeuDAKEnQDyTWmQIC4x8zxlGtKdS4--yy1fD1REkzUHNt?purpose=fullsize
https://images.openai.com/static-rsc-4/HS6z0QcJhVs0pgPQTxIilMGrOQ2OqPWiuGsFf8sDczSI733jN3CEHRGSFaY77HCIfZ9tMvleUUPvh6DMQP07yQ_laHxWvqsbTcgT4_FswroWbus9Qqdneh0Z48V9uFWkU-cnano4yafblpT16nmFL554Cdydw5Q_861wK9LuLd6IuuFAm_bppS_N4G17ZhuA?purpose=fullsize
https://images.openai.com/static-rsc-4/T_7Po6VajFkK_DMV5yOhhREzXqGJ31zt2c8qUbvW5-btXWL0zwZBCVmjXB3Y9oUvjnZnAHlHTiQ0PjnhANp8HQ9ZLmbAwfJBMsIj6b8X--ebB04lnfi8_m_1x3RK7oLeqt01q9-1Yo1-yShnuBNZF0wfz2bPzxg5U2_OdI9F50DkrdKXrL_BqYjwAzsi-6J-?purpose=fullsize

7

πŸ“– Jenis Kontrol

JenisContoh
PreventiveFirewall
DetectiveMonitoring
CorrectiveBackup

🧠 Narasi

Tujuan:

  • Mencegah
  • Mendeteksi
  • Memperbaiki

πŸ” 9. Standar Keamanan TI

https://images.openai.com/static-rsc-4/KCTHRnonUQcQep8jB5pUNzyS1uIuiIHGsZVJe_ORERc1gtYkoK4rWu7d9V7tSPGWk3gm0GY1WKh1W0NV7MIxj0sTwD4sxpdq07doQbkOYKijUUOxnMiYqlDC7aczHyxdQ0eJnL4Ves3nY8TLTHH0jOh1suu5wJQxIZnzSYrLBzKKGMhfjR5A-en-u2a_lMke?purpose=fullsize
https://images.openai.com/static-rsc-4/cBpsxStDEyhscivo_wbRgdWIFww7XqGAedb5Zem3Fn2HmOV_4q_I_f-sQjOlLyPAlE-YM5Ak_VJrNl5IRWg9m0IVcnbFMG_WtUW5pxhooShWws0IQC2t-3e4IKFVC084z0sTq3NC1rhAZkteFiDGPyEI7IwYmR0moi7cHFVl8HZy5M_GU05Yd_4kqLr-mRk0?purpose=fullsize
https://images.openai.com/static-rsc-4/9RpK916brsQa_t0rewahQP-8swV-bPR6FgIV71Ve2ZHh-0wUejr5Kveu2ki_y9NwDw6NuIyf9vkOO3bgx9vlMiHYoYCPlwidM0ns2YrW942M1bBnQsCvy4NnMaHchvS0RmUx8Tmg26r1LsEugf8hRHepC6l0Jg-5NX8DZs9eki8Z_F0r7d9HwhI9fKrlOpEf?purpose=fullsize

6

πŸ“– Standar Utama

πŸ‘‰ ISO/IEC 27001


🧠 Narasi

ISO 27001 membantu:

  • Mengelola keamanan secara sistematis
  • Standarisasi keamanan organisasi

πŸ› οΈ 10. Studi Kasus Nyata

πŸŽ“ Kasus: Kebocoran Data Kampus

πŸ“Œ Masalah

  • Data mahasiswa bocor

πŸ” Analisis

AreaSolusi
RiskIdentifikasi celah
SecurityEnkripsi data
AccessKontrol akses
MonitoringAudit sistem

🧠 Narasi

Dengan manajemen risiko:

  • Masalah bisa dicegah
  • Dampak bisa diminimalkan

πŸ§ͺ 11. Tutorial Mini (Latihan Mahasiswa)

🎯 Tujuan

Memahami manajemen risiko

πŸ“‹ Langkah

  1. Pilih layanan TI
  2. Identifikasi risiko
  3. Analisis dampak
  4. Buat mitigasi
  5. Presentasikan

πŸ“Š 12. Ringkasan Materi

TopikInti
RisikoAncaman layanan
CIAKeamanan data
MatrixPrioritas risiko
ControlProteksi sistem
ISO 27001Standar keamanan

🎯 13. Evaluasi / Diskusi

  1. Apa itu manajemen risiko TI?
  2. Jelaskan CIA Triad!
  3. Apa fungsi risk matrix?
  4. Berikan contoh risiko TI!

πŸš€ Penutup

Manajemen Risiko dan Keamanan dalam layanan TI sangat penting untuk menjaga keberlangsungan layanan.

Dengan pendekatan seperti ISO/IEC 27001:

  • Layanan lebih aman
  • Risiko terkendali
  • Kepercayaan meningkat

Tanpa itu:

  • Risiko tinggi
  • Ancaman besar
  • Layanan tidak stabil