data and information are managed, exposed, and 
maintained, against the background of ISO 17799, 
the standard for information security management 
information systbems. 
Information security protects from a wide range of 
threats to ensure business continuity, minimize 
corporate loss and maximize return on investment 
and business opportunity. This security management 
allows data to be distributed electronically, so that a 
system is needed to ensure data is safe and well 
received by the user. Information security can be 
defined as “Adequately protecting 
the confidentiality, integrity and availability of 
information against possible threat 
manifestations.” (Verheul, 2011). 
Information security is obtained by 
implementing a decent set of control tools, which 
can be policy, practice, organizational structure and 
software. 
ISO1779 is an internationally recognized 
management standard, which has a broad scope and 
is conceptual. This approach allows the application 
of ISO 17799 to various companies and applications. 
ISO 17799 defines information as a valuable asset 
and needs to be protected. ISO 17799 covers the 
selection and management of information security 
controls. In the 1990s the tech world realized the 
weakness of the open concept when malwere, the 
term for malicious software (malicious software), 
appeared in the form of a virus. Instantly the open 
concept turns into a weak point of the system that 
allows viruses to enter and attack.   
Then came the thought to protect 
computers that can only be accessed by authorized 
only. So it can be said that the security of the system 
need to pay attention to three aspects of teknoology, 
human and process. This further emphasizes the 
importance of every company is always wary of the 
three aspects of IT system security. In order to 
minimize the risk of IT system security for the 
sustainability of its business
. 
1.2  Problem Formulation 
a.  Does management controls affect the 
establishment of ISO 17799? 
b.  Does operational controls affect the 
formation of ISO 17799? 
c.  Do technical controls affect the formation 
of ISO 17799? 
1.3  Research Purposes 
a.  To know and test empirically 
management controls is a factor forming 
ISO 17799 
b.  To know and test empirically operational 
controls is an ISO form factor 17799 
c.  To know and test empirically technical 
controls is a factor forming ISO 17799 
2  LITERATURE  REVIEW 
2.1  Information Security 
Information is an asset must be protected. Security is 
generally defined as "quality or state of being 
secure-to be free from danger ". Creating safe is by 
protecting from enemies and threats of danger. 
Examples of information security by (Whitman and 
Mattord 2011) are as follows: 
a.  Physical Security that focuses on strategies for 
securing workers or members of organizations, 
physical assets, and workplaces from various 
threats including fire hazards, unauthorized 
access, and natural disasters. 
b.  Personal Security is overlapped with "phisycal 
security" in protecting people in the 
organization. 
c.  Operation Security that focuses on strategies to 
secure the ability of an organization or 
company to work without interruption. 
d.  Communications Security which aims to secure 
communication media, communication 
technology and content, as well as the ability to 
utilize this tool to achieve organizational goals. 
e.  Network Security that focuses on securing the 
organization's data network equipment, its 
network and its contents, as well as the ability 
to use the network in fulfilling the function of 
the organization's data communications. 
information. Information security has been treated as 
a by-product, if not as a ‘‘necessary evil that hinders 
productivity’’ (Conray-Murray, 2003). gradually 
information security becomes a necessity , surely 
information security is getting intothe   forefront   of   
things,   and   has   been   promoted   froma  by-
product  to  an   integral  part  of   business  
operations (Conner and Coviello, 2003) 
According to(  BSI 2008), ISMS is part of the 
management system overall based on a business risk 
approach to building, implement, operate, monitor, 
review, maintain and improve information security.