Enter your keyword

2-s2.0-84967335407

[vc_empty_space][vc_empty_space]

Assessment of information technology security governance for Supervisory Control and Data Acquisition (SCADA) on the Smart Grid electricity

Setiawan A.B.a, Syamsudin A.b, Rosmansyah Y.b

a Balitbang SDM, Kementerian Kominfo, Indonesia
b Cyber Security Center, STEI ITB, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2015 IEEE.SCADA systems (Supervisory Control and Data Acquisition) as the smart grid control unit has been used in almost various industries around the world in terms of automation systems. Smart grid technology combines the energy and telecommunications infrastructure and Internet networks. SCADA system in order to function optimally, it is necessary to process the security of information technology governance. The process of taking a broad perspective in identifying risks that could cause system failure in realizing the objectives and strategy. This research was conducted by assessing the governance of information security and information technology governance in the electricity company which is the object of this research. This research method was a qualitative study by using embedded concurrent mixed method. The purpose of this study is to provide a recommendation the implementation of information security governance and information technology governance in general.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Information security governance,Information technology governance,Information technology security,SCADA,Smart grid,Smart Grid technologies,Supervisory control and data acquisition,Telecommunications infrastructures[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Information Security governance,Information Technology Governance,SCADA,Smart Grid[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI.2015.7437693[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]