Security guidelines of electronic academic assets
As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these asset...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2002
|
Subjects: |
_version_ | 1825909365097365504 |
---|---|
author | Ibrahim, Subariah Salleh, Mazleena |
author_facet | Ibrahim, Subariah Salleh, Mazleena |
author_sort | Ibrahim, Subariah |
collection | ePrints |
description | As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly so that these information resources can be accessible when and where it is needed. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This paper addresses security issues in the context of electronic academic assets. Threats and vulnerabilities of academic assets are discussed. Assets, threats and vulnerabilities of academic information resources are determined through a risk analysis approach, whereby a survey is conducted amongst academic staffs as respondents. Security controls that can be employed to reduce the risks of attacks on these assets are then determined. The final outcome of the research is a security guideline that may be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, e-mail security, pc intrusion and administrative responsibilities. It defines the security responsibilities of both the users and the administrators who manage computers and networks. With the availability of security guideline and proper training to staffs who managed academic assets, the security of academic assets can be enhanced and the network in the academic environment as a whole gains more trusts. |
first_indexed | 2024-03-05T18:01:04Z |
format | Conference or Workshop Item |
id | utm.eprints-3270 |
institution | Universiti Teknologi Malaysia - ePrints |
last_indexed | 2024-03-05T18:01:04Z |
publishDate | 2002 |
record_format | dspace |
spelling | utm.eprints-32702017-07-22T08:21:18Z http://eprints.utm.my/3270/ Security guidelines of electronic academic assets Ibrahim, Subariah Salleh, Mazleena QA75 Electronic computers. Computer science As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly so that these information resources can be accessible when and where it is needed. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This paper addresses security issues in the context of electronic academic assets. Threats and vulnerabilities of academic assets are discussed. Assets, threats and vulnerabilities of academic information resources are determined through a risk analysis approach, whereby a survey is conducted amongst academic staffs as respondents. Security controls that can be employed to reduce the risks of attacks on these assets are then determined. The final outcome of the research is a security guideline that may be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, e-mail security, pc intrusion and administrative responsibilities. It defines the security responsibilities of both the users and the administrators who manage computers and networks. With the availability of security guideline and proper training to staffs who managed academic assets, the security of academic assets can be enhanced and the network in the academic environment as a whole gains more trusts. 2002-09 Conference or Workshop Item PeerReviewed Ibrahim, Subariah and Salleh, Mazleena (2002) Security guidelines of electronic academic assets. In: Malaysian Science & Technology Congress 2002, September 19-21, 2002, Johor, Bahru. |
spellingShingle | QA75 Electronic computers. Computer science Ibrahim, Subariah Salleh, Mazleena Security guidelines of electronic academic assets |
title | Security guidelines of electronic academic assets |
title_full | Security guidelines of electronic academic assets |
title_fullStr | Security guidelines of electronic academic assets |
title_full_unstemmed | Security guidelines of electronic academic assets |
title_short | Security guidelines of electronic academic assets |
title_sort | security guidelines of electronic academic assets |
topic | QA75 Electronic computers. Computer science |
work_keys_str_mv | AT ibrahimsubariah securityguidelinesofelectronicacademicassets AT sallehmazleena securityguidelinesofelectronicacademicassets |