Perancangan Sistem Informasi Pembatasan Hak Akses Pengelola Data Pada Aplikasi Core Banking System Temenos T24

Saghifa Fitriana, Ardy Iskandar, Satia Suhada

Abstract


The security system is very important in the process of managing data. Security guarantees are needed in information systems, especially in the Core Banking System application. The Core Banking System application used by the author is the Temenos T24 Core Banking System Application. The data manager in the Temenos T24 Core Banking System Application has the role of access rights registered as a Super User. Super User can perform any activity (Full Control) and this activity cannot be known by anyone. This results in all users being able to carry out activities that are not in accordance with their roles and authorities, and there is no recording of activities against users of data management access rights. Therefore, it is necessary to design and develop the Temenos T24 Core Banking System application. The design and development of tools is expected to be able to classify data manager access rights according to roles and authorities, and to be able to record activities on users of data manager access rights. Activity recording is the basis of information from each activity - each role and authority of the user.

Keywords: Temenos T24; Core Banking System; Access Rights

Full Text:

PDF (78-84)

References


Lenawati, M., & Winarno, W. W. (2017). Tata Kelola Keamanan Informasi Pada PDAM Menggunakan ISO/IEC 27001: 2013 Dan Cobit 5. Speed-Sentra Penelitian Engineering dan Edukasi, 9(1).

Hendarsyah, D. (2012). Keamanan Layanan Internet Banking Dalam Transaksi Perbankan. IQTISHADUNA: Jurnal Ilmiah Ekonomi Kita, 1(1), 12- 33.

Darudiato, S., Sam, A., & Hadi, G. P. (2006). Analisis dan Perancangan Basis Data Eksplorasi Berbasis Objek Studi Kasus Kondur Petroleum SA. In Seminar Nasional Aplikasi Teknologi Informasi (SNATI).

Guritno, S., Rahardja, U., & Setiatmi, V. (2008). Access Restriction Sebagai Bentuk Pengamanan Dengan Metode Ip Token. Creative Communication and Innovative Technology Journal, 1(3), 197-207.

Barka, E., Mathew, S. S., & Atif, Y. (2015). Securing the web of things with role-based access control. In Codes, Cryptology, and Information Security: First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings-In Honor of Thierry Berger 1 (pp. 14-26). Springer International Publishing.

Benuf, K. (2021). Hambatan Formal Penegakan Hukum Pidana Terhadap Kejahatan Pencurian Data Pribadi. Majalah Hukum Nasional, 51(2), 261-279.

Udi, U. (2018). Penerapan Metode SDLC Waterfall Dalam Pembuatan Sistem Informasi Akademik Berbasis Web Studi Kasus Pondok Pesantren Al-Habib Sholeh Kabupaten Kubu Raya, Kalimantan Barat. Jurnal Teknologi Dan Manajemen Informatika, 4(1).

Rosa , A. S., & Salahuddin, M. (2011). Modul pembelajaran rekayasa perangkat lunak (terstruktur dan berorientasi objek). Bandung: modula, 2.




DOI: https://doi.org/10.31294/evolusi.v12i1.22078

ISSN: 2657-0793 (online). ISSN: 2338-8161 (print)

Published By LPPM Universitas Bina Sarana Informatika

Jl. Kramat Raya No.98, Kwitang, Kec. Senen, Kota Jakarta Pusat, DKI Jakarta 10450
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License