• Hadi Prasetyo Utomo Universitas Langlangbuana


The physical security of information technology facilities has become increasingly popular in recent years. This is due to the increasing awareness of information technology institutions about the importance of the security of their physical facilities. Physical security has a very broad scope, including access rights, the environment and also infrastructure. Many institutions have no choice in building their own physical security. Because the majority of infrastructure used is infrastructure that is ready to use. This of course greatly limits the physical security policy that you want to implement. Aside from infrastructure aspects, there are other aspects that are often overlooked, namely the people involved in them. Humans can commit crimes under various conditions. Therefore, physical security must also consider motives and situations that can trigger crime by humans. Even highly trusted people are capable of committing crime if the motive and situation is supportive. In this paper, we will discuss several alternatives for handling physical security based on CPTED (Crime Prevention Through Environmental Design) and infrastructure standardization based on TIA-942. The basic concept of CPTED is that the physical environment can be changed and have an impact on reducing crime. CPTED focuses on four areas to achieve its objectives, namely access control, passive supervision, support activities, and motivation. Whereas TIA-942 is a standard issued by the Telecommunications Industry Association for information technology infrastructure.


[ ] R. Samuels. Afterdark Design, Night Animation & Interpersonal Interaction: Towards a Community-Security Paradigm. Journal of Architectural and Planning Research. 2005.
[2] G.R. Cook. CPTED Makes a Comeback. Crime Wise Library. 2003.
[3] R. Atlas. The Other Side of CPTED. Crime Wise Library. 2001.
[ ] J.A. Walsh. Employee Theft. International Foundation for Protection Officers. 2000.
[5] TIA-942. TIA Standard. Telecommunication Industry Association. 2005.
[ ] S.M. Ali, T.R. Soomro. Integration of Information Security Essential Controls into Information Technology Infrastructure Library. IJASTNET. 2014; Vol 4.
[ ] H. Hamidovic. Fire Protection of Computer Rooms - Legal Obligations and Best Practices. ISACA Journal. 2014; Vol 4
How to Cite
UTOMO, Hadi Prasetyo. DESAIN KEAMANAN FISIK TEKNOLOGI INFORMASI STUDI KASUS: UNIVERSITAS LANGLANGBUANA. Infosecure, [S.l.], v. 1, n. 2, p. 53-59, may 2020. ISSN 2087-1023. Available at: <>. Date accessed: 20 sep. 2020.