Security guidelines of electronic academic assets

As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these asset...

Full description

Bibliographic Details
Main Authors: Ibrahim, Subariah, Salleh, Mazleena
Format: Conference or Workshop Item
Published: 2002
Subjects:
_version_ 1825909365097365504
author Ibrahim, Subariah
Salleh, Mazleena
author_facet Ibrahim, Subariah
Salleh, Mazleena
author_sort Ibrahim, Subariah
collection ePrints
description As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly so that these information resources can be accessible when and where it is needed. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This paper addresses security issues in the context of electronic academic assets. Threats and vulnerabilities of academic assets are discussed. Assets, threats and vulnerabilities of academic information resources are determined through a risk analysis approach, whereby a survey is conducted amongst academic staffs as respondents. Security controls that can be employed to reduce the risks of attacks on these assets are then determined. The final outcome of the research is a security guideline that may be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, e-mail security, pc intrusion and administrative responsibilities. It defines the security responsibilities of both the users and the administrators who manage computers and networks. With the availability of security guideline and proper training to staffs who managed academic assets, the security of academic assets can be enhanced and the network in the academic environment as a whole gains more trusts.
first_indexed 2024-03-05T18:01:04Z
format Conference or Workshop Item
id utm.eprints-3270
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T18:01:04Z
publishDate 2002
record_format dspace
spelling utm.eprints-32702017-07-22T08:21:18Z http://eprints.utm.my/3270/ Security guidelines of electronic academic assets Ibrahim, Subariah Salleh, Mazleena QA75 Electronic computers. Computer science As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these assets should be managed properly so that these information resources can be accessible when and where it is needed. Without proper security measures and controls may result in the compromise, improper modification, or destruction of the information resources. This paper addresses security issues in the context of electronic academic assets. Threats and vulnerabilities of academic assets are discussed. Assets, threats and vulnerabilities of academic information resources are determined through a risk analysis approach, whereby a survey is conducted amongst academic staffs as respondents. Security controls that can be employed to reduce the risks of attacks on these assets are then determined. The final outcome of the research is a security guideline that may be followed by academic staffs and others who are responsible for the security of electronic information in a university environment. The guideline addresses issues such as choosing good passwords, preventing virus attacks, e-mail security, pc intrusion and administrative responsibilities. It defines the security responsibilities of both the users and the administrators who manage computers and networks. With the availability of security guideline and proper training to staffs who managed academic assets, the security of academic assets can be enhanced and the network in the academic environment as a whole gains more trusts. 2002-09 Conference or Workshop Item PeerReviewed Ibrahim, Subariah and Salleh, Mazleena (2002) Security guidelines of electronic academic assets. In: Malaysian Science & Technology Congress 2002, September 19-21, 2002, Johor, Bahru.
spellingShingle QA75 Electronic computers. Computer science
Ibrahim, Subariah
Salleh, Mazleena
Security guidelines of electronic academic assets
title Security guidelines of electronic academic assets
title_full Security guidelines of electronic academic assets
title_fullStr Security guidelines of electronic academic assets
title_full_unstemmed Security guidelines of electronic academic assets
title_short Security guidelines of electronic academic assets
title_sort security guidelines of electronic academic assets
topic QA75 Electronic computers. Computer science
work_keys_str_mv AT ibrahimsubariah securityguidelinesofelectronicacademicassets
AT sallehmazleena securityguidelinesofelectronicacademicassets