International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-8 Issue-6S2, August 2019 1152 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: F12860886S219/2019©BEIESP DOI:10.35940/ijeat.F1286.0886S219 Abstract: Any association that needs to work deliberately with PC systems and data security should receive certain structure for system and data security the board. Suitable administration of PCs (host, servers and work areas), the system foundation interconnecting them and data security is a basic necessity for any association. Associations every day face dangers to their systems and data resources. Most administration procedures are not characteristically verify, and specialized arrangements are just one bit of an all-encompassing way to deal with oversee PC systems and data security. Late years have seen various devices made to robotize this methodology. There are moreover instruments that compass sorts out and discover possible attack circumstances including complex blend of different vulnerabilities. This Paper is worried about issues identifying with the administration of PC system and data security in associations. Keywords : Computer Networks; Network Management; Information Security. I. INTRODUCTION Setting up data security prerequisites is basic, yet to do as such, associations must comprehend their very own one of a kind risk condition. It is difficult to verify something except if you obviously comprehend what you needs to verify. Danger situations are controlled by the execution of an efficient security chance evaluation. When security dangers are seen, fitting counters might be chosen to moderate these hazard factors. Associations of any size ought to have a grip of the associations' data resources (for example data, databases, application frameworks, records, and so on.) and a lot of archived assets, resources and frameworks utilized for PC systems with their area and any notes on conditions. Instances of things that ought to be considered are servers, workstations, storagesystem, routers, switches, center points, system and Telco links, and some other system components, for example, printers and UPS frameworks. Every one of these components should have a relative worth allotted in some way as to their significance to the association. For example most PCs will depend on power supply reinforcement frameworks, for example, UPSs which themselves might be a piece of the PC organize in the event Revised Manuscript Received on July 22, 2019. * Correspondence Author Rustono Farady Marta, Universitas Bunda Mulia, Indonesia. E-mail: rmarta@bundamulia.ac.id Achmad Daengs GS, Universitas 45 Surabaya, Indonesia Agus Daniar, Universitas Bunda Mulia, Indonesia. Wa Ode Seprina, Universitas Bunda Mulia, Indonesia Alfred Pieter Menayang, Universitas Bunda Mulia, Indonesia that they are overseen. A key issue in system and data security the executives is the manner by which to characterize a formal security arrangement. Managing PC framework and information security is less complex than it may show up, especially if you have security methodology of steady improvementto keep the various necessities in setting and to decline dismissing portions of security. A decent strategy determination ought to be anything but difficult to get right and moderately steady, even in a progressively evolving system. The enormous topic of system security is poor somewhere around analyzing the going with: History of security in frameworks Internet building and vulnerable security parts of the Internet Types of web attacks and security methods Security for frameworks with web get to Current progression in framework security hardware and programming II. ORGANIZATION OBJECTIVE Organizational PC network and data security the board tends to the requirement for an administration structure that makes, continues, and deals with the PC coordinate with security. The PC system must be planned, obtained, conveyed, worked and kept up as per great data security standards. Simultaneously security frameworks must be kept up in a way suitable to the prerequisites and equivalent with the estimation of information they contain and grant access to. To avoid interferences to association exercises and guarantee the right and secure activity of PC organize we require the accompanying errand to be finished by that system: Minimizing the danger of frameworks disappointments Safeguarding the integrity of the hierarchical programming and information Maintaining the respectability and accessibility of data administrations Provide continuous administration backing to the PC arrange Preventing harm to resources by controlling and physically securing PC arrange Develop security goals, techniques, and strategies Review security incidentreports and goals Formulate risk administration edges and confirmation necessities Information Security Risk and Management in Organizational Network Rustono Farady Marta, Achmad Daengs GS, Agus Daniar, Wa Ode Seprina, Alfred Pieter Menayang