Evaluation of Information Security Management Based on ISO/IEC 27001 at Universitas Nasional Library (UNAS)

Main Article Content

Afifah Nur fadilah
Dwi Fajar Saputra
Ibnu Fyras Maulana
Muhammad Jordan A. N
Dzaki Rizky Jumayyil
Sarah Aurelia T. M.
Saffana Mufiddah Adhayanti

Abstract

As the utilization of digital systems continues to grow, libraries must strengthen their information management systems to protect against threats such as cyberattacks and data breaches. This study employed a descriptive qualitative approach using interviews, observation, and documentation. The findings indicate that several ISO/IEC 27001 based controls have been implemented, including firewalls, encryption, and regular audits. However, security gaps remain, such as weak credentials, the absence of multi-factor authentication, and limited real-time monitoring and data backup. Major risks include malware, network attacks, and system failures. Although the National University (UNAS) Cyber Library has developed a Disaster Recovery Plan (DRP), improvements in formal documentation and user digital literacy are still needed. These findings serve as a strategic evaluation basis for enhancing the effectiveness of information security governance in academic library environments.

Article Details

How to Cite
fadilah, A. N., Saputra, D. F., Fyras Maulana, I., Jordan A. N, M., Rizky Jumayyil, D., T. M., S. A., & Mufiddah Adhayanti, S. (2025). Evaluation of Information Security Management Based on ISO/IEC 27001 at Universitas Nasional Library (UNAS). TADWIN: Jurnal Ilmu Perpustakaan Dan Informasi, 6(1), 141-153. https://doi.org/10.19109/tadwin.v6i1.29814 (Original work published 2025)
Section
Articles

How to Cite

fadilah, A. N., Saputra, D. F., Fyras Maulana, I., Jordan A. N, M., Rizky Jumayyil, D., T. M., S. A., & Mufiddah Adhayanti, S. (2025). Evaluation of Information Security Management Based on ISO/IEC 27001 at Universitas Nasional Library (UNAS). TADWIN: Jurnal Ilmu Perpustakaan Dan Informasi, 6(1), 141-153. https://doi.org/10.19109/tadwin.v6i1.29814 (Original work published 2025)

References

AL-Dosari, K., & Fetais, N. (2023). Risk-management framework and information-security systems for small and medium enterprises (SMES): A meta-analysis approach. Electronics, 12(17), 3629. DOI 10.3390/electronics12173629

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. DOI 10.3390/electronics12061333

Bahrudin, M., & Firmansyah, F. (2018). Manajemen keamanan informasi di perpustakaan menggunakan Framework SNI ISO/IEC 27001. Media Pustakawan, 25(1), 43-50. DOI 10.37014/medpus.v25i1.191

Cheng, E. C., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information, 13(4), 192. DOI 10.3390/ info13040192

Clarissa, S., & Wang, G. (2023). Assessing Information Security Management Using ISO 27001:2013 | Jurnal Indonesia Sosial Teknologi. DOI 10.59141/jist.v4i9.739

Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. https://books.google.co.id/books?hl=en&lr=&id=335ZDwAAQBAJ

Dunn Cavelty, M., & Smeets, M. (2023). Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. Journal of European Public Policy, 30(7), 1330-1352. DOI 10.1080/13501763.2023.2173274

Farid, G., Warraich, N. F., & Iftikhar, S. (2023). Digital information security management policy in academic libraries: A systematic review (2010–2022). Journal of Information Science, 01655515231160026. DOI 10.1177/01655515231160026

Fattah Ys, Moh. A., Parga Zen, B., & Wasitarini, D. E. (2024). Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi. Cyber Security Dan Forensik Digital, 6(2), 76-82. DOI 10.14421/csecurity.2023.6.2.4190

Folorunso, A., Mohammed, V., Wada, I., & Samuel, B. (2024). The impact of ISO security standards on enhancing cybersecurity posture in organizations. World Journal of Advanced Research and Reviews, 24(1), 2582-2595. DOI 10.30574/wjarr.2024.24.1.3169

Galih, A. P. (2020). Keamanan Informasi (Information Security) Pada Aplikasi Perpustakaan IPusnas. AL Maktabah, 5(1), 10. DOI 10.29300/mkt.v5i1.3086

Ikenwe, I. J., & Udem, O. K. (2022). Innovative digital transformation for dynamic information service sustainability in university libraries in Nigeria. DOI 10.12775/FT.2022.004

International Organization for Standardization. (2013). ISO/IEC 27001:2013(en), Information technology—Security techniques—Information security management systems—Requirements. https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en

ISACA. (2019). COBIT | Control Objectives for Information Technologies, ISACA. https://www.isaca.org/resources/cobit

Jevelin, J., & Faza, A. (2023). Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification. Journal of Information Systems and Informatics, 5(4), 1240-1256. DOI 10.51519/journalisi.v5i4.572

Mehmood, T. (2021). Does information technology competencies and fleet management practices lead to effective service delivery? Empirical evidence from e-commerce industry. International Journal of Technology Innovation and Management (IJTIM), 1(2), 14-41. DOI 10.54489/ijtim.v1i2.26

Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). Arizona State University. https://books.google.co.id/books?id=p0wXBAAAQBAJ

Nugroho, A. R., & Legowo, N. (2022). Risk Assessment at it Company by Focusing on Information Security Area Using Iso 27001:2022. Syntax Literate ; Jurnal Ilmiah Indonesia, 7(12), 20307–20324. https://jurnal.syntaxliterate.co.id/index.php/syntax-literate/article/view/15349

Nur Fa’izi, M. B. (2024, October 17). Strategi Pentingnya Disaster Recovery Plan dalam IT Bisnis. https://cyberhub.id/pengetahuan-dasar/disaster-recovery-plan

Onunka, O., Onunka, T., Fawole, A. A., Adeleke, I. J., & Daraojimba, C. (2023). Library and information services in the digital age: Opportunities and challenges. Acta Informatica Malaysia, 7(1), 113-121. DOI 10.26480/aim.02.2023.113.121

Posthumus, S., & von Solms, R. (2004). A framework for the governance of information security. Computers & Security, 23 (8), 638-646. DOI 10.1016/j.cose.2004.10.006

Rahmat, D. (2019). Perencanaan Sistem Manajemen Keamanan Informasi Menggunakan Standar Sni Iso/Iec 27001: 2013. COMPUTING | Jurnal Informatika, 6 (2), 37-41. DOI 10.55222/computing.v6i2.203

Ruthven, I., Robinson, E., & McMenemy, D. (2023). The value of digital and physical library services in UK public libraries and why they are not interchangeable. Journal of Librarianship and Information Science, 55(4), 1143-1154. DOI 10.1177/09610006221127027

San Nicolas-Rocca, T., & Burkhard, R. J. (2019). Information Security in Libraries. Information Technology and Libraries, 38(2), 58–71. DOI 10.6017/ital.v38i2.10973

Spring, M., Faulconbridge, J., & Sarwar, A. (2022). How information technology automates and augments processes: Insights from Artificial‐Intelligence‐based systems in professional service operations. Journal of Operations Management, 68(6-7), 592-618. DOI 10.1002/joom.1215

Taherdoost, H. (2023). An overview of trends in information systems: Emerging technologies that transform the information technology industry. Taherdoost, H. (2023). An overview of trends in information systems: emerging technologies that transform the information technology industry. Cloud Computing and Data Science, 1-16. DOI 10.37256/ccds.4120231653

Wibowo, A. M. (n.d.). Business Continuity Plan & Disaster Recovery Plan.

Yusuf, A. M. (2016). Metode penelitian kuantitatif, kualitatif & penelitian gabungan. Prenada Media. https://books.google.co.id/books?id=RnA-DwAAQBAJ