Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)

As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these as...

Full description

Saved in:
Bibliographic Details
Main Authors: Ibrahim, Subariah, Salleh, Mazleena, Ithin, Norafida, Ahmad, Rabiah
Format: Monograph
Language:English
Published: Faculty of Computer Science and Information system 2003
Subjects:
Online Access:http://eprints.utm.my/id/eprint/4241/1/71510.pdf
http://eprints.utm.my/id/eprint/4241/
https://www.researchgate.net/publication/279495278_Risk_Analysis_Of_Cyber-Campus_Modules_Security_Guidelines_Of_Electronic_Academic_Assets
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This project focuses in outlining the security guideline that can be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, email security, pc intrusion and administrative responsibilities for the users and administrators who manage computers and networks. Risk analysis technique is used as a guidance in order to come out with the security guideline that is suitable for FSKSM. The guideline is simple and short enough so that it is easy to understand and followed by all levels of staffs. The security guideline formulated can be used as a starting point in drafting a security policy at UTM. With the application of security policy in the academic environment, the security of academic assets can be enhanced and the network as a whole can be trusted.