Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these as...
| Main Authors: | , , , |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
Faculty of Computer Science and Information system
2003
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/4241/ http://eprints.utm.my/4241/1/71510.pdf |
| _version_ | 1848890753967718400 |
|---|---|
| author | Ibrahim, Subariah Salleh, Mazleena Ithin, Norafida Ahmad, Rabiah |
| author_facet | Ibrahim, Subariah Salleh, Mazleena Ithin, Norafida Ahmad, Rabiah |
| author_sort | Ibrahim, Subariah |
| building | UTeM Institutional Repository |
| collection | Online Access |
| description | As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This project focuses in outlining the security guideline that can be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, email security, pc intrusion and administrative responsibilities for the users and administrators who manage computers and networks. Risk analysis technique is used as a guidance in order to come out with the security guideline that is suitable for FSKSM. The guideline is simple and short enough so that it is easy to understand and followed by all levels of staffs. The security guideline formulated can be used as a starting point in drafting a security policy at UTM. With the application of security policy in the academic environment, the security of academic assets can be enhanced and the network as a whole can be trusted. |
| first_indexed | 2025-11-15T20:47:05Z |
| format | Monograph |
| id | utm-4241 |
| institution | Universiti Teknologi Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T20:47:05Z |
| publishDate | 2003 |
| publisher | Faculty of Computer Science and Information system |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utm-42412017-09-07T04:12:23Z http://eprints.utm.my/4241/ Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) Ibrahim, Subariah Salleh, Mazleena Ithin, Norafida Ahmad, Rabiah H Social Sciences (General) As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This project focuses in outlining the security guideline that can be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, email security, pc intrusion and administrative responsibilities for the users and administrators who manage computers and networks. Risk analysis technique is used as a guidance in order to come out with the security guideline that is suitable for FSKSM. The guideline is simple and short enough so that it is easy to understand and followed by all levels of staffs. The security guideline formulated can be used as a starting point in drafting a security policy at UTM. With the application of security policy in the academic environment, the security of academic assets can be enhanced and the network as a whole can be trusted. Faculty of Computer Science and Information system 2003 Monograph NonPeerReviewed application/pdf en http://eprints.utm.my/4241/1/71510.pdf Ibrahim, Subariah and Salleh, Mazleena and Ithin, Norafida and Ahmad, Rabiah (2003) Risk analysis of cyber-campus modules (security guidelines of electronic academic assets). Project Report. Faculty of Computer Science and Information system, Skudai Johor. (Unpublished) https://www.researchgate.net/publication/279495278_Risk_Analysis_Of_Cyber-Campus_Modules_Security_Guidelines_Of_Electronic_Academic_Assets |
| spellingShingle | H Social Sciences (General) Ibrahim, Subariah Salleh, Mazleena Ithin, Norafida Ahmad, Rabiah Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| title | Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| title_full | Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| title_fullStr | Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| title_full_unstemmed | Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| title_short | Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| title_sort | risk analysis of cyber-campus modules (security guidelines of electronic academic assets) |
| topic | H Social Sciences (General) |
| url | http://eprints.utm.my/4241/ http://eprints.utm.my/4241/ http://eprints.utm.my/4241/1/71510.pdf |