A study of trusted computing implementation in public sector information, communication and technology (ICT) domain

The Trusted Computing evolution has introduced a lot of opportunities for Information, Communication and Technology (ICT) that enhance the protection approach to the ICT environment towards computer threats. With time the changes in technology have influenced many giant ICT companies worldwide to ge...

Full description

Bibliographic Details
Main Author: Isnin@Hamdan, Rusnita
Format: Thesis
Language:English
Published: 2010
Subjects:
Online Access:http://eprints.utm.my/12073/1/RusnitaIsninHamdanMFSKSM2010.pdf
Description
Summary:The Trusted Computing evolution has introduced a lot of opportunities for Information, Communication and Technology (ICT) that enhance the protection approach to the ICT environment towards computer threats. With time the changes in technology have influenced many giant ICT companies worldwide to get involved in research and development (R&D) in order to simultaneously provide better solutions on leveraging ICT usage in business. The public sector is also not excluded from this influence of developing as a R&D platform provider and implementer. The Malaysian Public sector already made a statement that allows companies in Malaysia to do further R&D in trusted computing. However the implementation level in general in Malaysia and more specifically the Malaysian Public Sector has never been explored. Therefore this study has been conducted to discover the depth of implementation of trusted computing in the public sector ICT Domain. This study attempts to reveal trusted computing usage levels according to its revolution in the public sector agencies. As a result of this study, guidance will be provided for ICT officers to attain better implementation of trusted computing in their organization.