Implementing IT Risk in ITSM Tools using Octave Allegro Method Based at ITSM Project
R. Arga Tristian1, Antoni Wibowo2

1R. Arga Tristian*, Computer Science, Bina Nusantara University, Jakarta, Indonesia.
2Antoni Wibowo, Lecturer of Magister Teknologi Informasi, Bina Nusantara University, Jakarta, Indonesia.
Manuscript received on January 12, 2020. | Revised Manuscript received on January 30, 2020. | Manuscript published on March 30, 2020. | PP: 111-117 | Volume-8 Issue-6, March 2020. | Retrieval Number: E6766018520/2020©BEIESP | DOI: 10.35940/ijrte.E6766.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The purpose of this research is to identify and conduct risk analysis a Analyze risk on IT Service Management Information System Tools vulnerabilities at IT Service Management project, To obtain the level of vulnerability or weakness of information and to produce a strategic recommendation to overcome the vulnerability of information in the Project, OCTAVE Allegro was used as the method. Awareness of the importance of information system security and its assets to an organization and the impact that may arise from the destruction of the information system and its assets does not seem to be getting attention for most organizations and resulting low performance on Service Management while the evaluation and analysis process is more focused on the management of critical assets owned by the Project. Conclusion of the risk assessment is recommendations on the steps to be taken protect and manage the IT Service information system critical assets at IT Service management Project and also for a better service and achieve Service Level Agreement.
Keywords: Information Asset, Information Vulnerability, OCTAVE Allegro, Risk Management, threat.
Scope of the Article: Simulation Optimization and Risk Management