MENGELOLA OBJEK VITAL, PENGAMANAN FILE, DAN PENGAMANAN CYBER TERHADAP MANAJEMEN SEKURITI PADA PT. PERTAMINA (PERSERO)

  • Edy Soesanto Program Studi Teknik Perminyakan, Universitas Bhayangkara Jakarta Raya, Indonesia
  • Anna Wijayanti Ekonomi & Bisnis/Manajemen, Universitas Bhayangkara Jakarta Raya, Indonesia
  • Muhamad Elzan Musyafa Ekonomi & Bisnis/Manajemen, Universitas Bhayangkara Jakarta Raya, Indonesia
  • Nurul Cahyani Ekonomi & Bisnis/Manajemen, Universitas Bhayangkara Jakarta Raya, Indonesia
Keywords: Manage Vital Objects, File Protection, Cyber Security, PT. Pertamina

Abstract

  1. Pertamina (Persero) is the only BUMN (State Owned Enterprise) engaged in the integrated oil and gas business, starting from the upstream to downstream scope of work with assets that really need to be maintained. PT Pertamina (Persero) ensures that meeting the needs for fuel and LPG as well as providing services to the community remain the Company's main priorities. As a BUMN, Pertamina, including all workers, is responsible for carrying out the Government's mandate to ensure national energy security. The purpose of this study is to determine vital objects, file security, and cyber security against security management at PT. Pertamina (Persero). This research method uses qualitative research with a Systematic Review approach, the source of data used in this study is secondary data, namely data obtained or collected by researchers from various existing sources. Secondary data can be in the form of data from the Annual Report of PT. Pertamina (Persero) and so on. The results of research in this journal serve as additional information material and input for companies that can be taken into consideration in managing Vital Objects, File Security and Cyber ​​​​Security for Security Management at PT. Pertamina (Persero), as with construction projects, the risk of work accidents disrupts the activities of the project workers.

References

Dwipayani. (2022). Kerangka Konsep. http://repository.poltekkes-denpasar.ac.id/9010/4/BAB%20III%20Kerangka%20Konsep.pdf
Gusleni, Y. (2010). Penentuan Prioritas Pelayanan Pengguna Jasa Kereta Api dalam Transportasi Antarmoda di Stasiun Gambir. Badan Litbang Perhubungan Kementrian Kementrian Perhubungan, 22(5), 569–578. http://ojs.balitbanghub.dephub.go.id/index.php/warlit/article/download/1122/818
Institut Tenologi Sepuluh Nopember. (2023). Keamanan Siber. https://www.its.ac.id/it/id/keamanan-siber/
Iskandar, O., & Nurlaila, S. (2021). Bahan Ajar Mata Kuliah Manajemen Sekuriti Edisi ke-1 (Vol. 1). http://repository.ubharajaya.ac.id/16849/1/BAHAN%20ANJAR%20MANAJEMEN%20SEKURIRI%20-%20OKTO%20ISKANDAR%20%26%20BU%20SILVIA%20%20%281%29.pdf
Keputusan Presiden RI No. 63 Tahun 2004. (n.d.). Presiden Republik Indonesia. Retrieved May 31, 2023, from https://jdih.esdm.go.id/peraturan/Keppres No. 63 Thn 2004.pdf
Namudat, H., Karlina, N., & Rusli, B. (2018). Analisis Kebijakan Pengamanan Objek Vital di PT. FREEPORT Indonesia. Jurnal Pemikiran Dan Penelitian Bidang Administrasi, Sosial, Humaniora Dan Kebijakan Publik, 1(2), 39–44. https://doi.org/10.24198/responsive.v1i2.20673
PERTAMINA. (2020a). Keamanan Siber Perusahaan. https://www.pertamina.com/id/keamanan-siber-perusahaan
PERTAMINA. (2020b). Kelola Objek Vital Nasional, Pertamina Prioritaskan Pelayanan BBM dan LPG Untuk Rakyat. https://www.pertamina.com/id/news-room/news-release/kelola-objek-vital-nasional-pertamina-prioritaskan-pelayanan-bbm-dan-lpg-untuk-rakyat
Prastowo. (2011). Metodologi Penelitian. http://e-journal.uajy.ac.id/11821/4/TI069043.pdf
Pratama, A. S. (2019). Analisis Risiko K3 Menggunakan Pendekatan HIRADC dan JSA (Studi Kasus: Proyek Pembangunan Sistem Pengamanan Kilang Terpadu Tahap II PT. Pertamina RU VI Balongan). https://www.academia.edu/download/63082308/Laporan_Kerja_Praktik_Analisis_Risiko_K3_Menggunakan_Pendekatan_HIRADC_dan_JSA_oleh__Akhmad_Setyawan_Pratama_201920200424-123232-1w1yy0r.pdf
Soesanto, E., Purba, L. M., Aprilia, B., Putra, D. R., & Putri, S. D. (2023). Implementasi Objek Vital, Pengamanan File dan Pengamanan Cyber di PT. Pertamina. IJM: Indonesian Journal of Multidisciplinary, 1(1), 96–105. https://journal.csspublishing.com/index.php/ijm/article/view/92
Suheri, A. (2017). Keamanan File dengan Teknik Zigzag dan Huffman. Media Jurnal Informatika, 9(2), 78–83. https://doi.org/10.35194/mji.v9i2.450
Winarto, W. W. A. (2021). Analisis Review Penggunaan Sistem Informasi pada PT. Pertamina. BIOS : Jurnal Teknologi Informasi Dan Rekayasa Komputer, 2(2), 51–59. https://doi.org/10.37148/bios.v2i2.20
Published
2023-06-06