Physical And Environmental Information Security Management - Politeknik Tuanku Syed Sirajuddin Perlis

Physical And Environmental Information Security Management - Politeknik Tuanku Syed Sirajuddin Perlis


Physical And Environmental Information Security Management - Politeknik Tuanku Syed Sirajuddin Perlis

Posted: 28 Jan 2014 11:11 PM PST

Physical And Environmental Information Security Management - Politeknik Tuanku Syed Sirajuddin Perlis


Physical And Environmental Information Security Management

Posted: 09 Jan 2014 12:01 AM PST

In a recent study, physical and environmental information security in a government organization is a crucial part in a government organization because it involved with a lot of private and confidential information. So instead of taking care on the system itself the physical security also important since all the data and information are handled by the human in a physical environment.

Keywords-information security;physical and environmental security; government organization.

Introduction

Most organizations around the world are now focusing on the security system to protect their properties and employees. Properties include buildings or the premises, the facilities such as electronic devices, telecommunication devices such as telephone and fax machine, documents and all the belongings in the premise. Employees are the constructors of an organization and they are the working force that enables the organization's daily transaction. Both facilities and employees are the assets that must be protected because they are the essence that moves the organization to meet its target. Most companies only focus on the security of the device and software based information security solutions because the cost for the devices is very high. Actually, the organization should also focus on their personnel, internal and external technical experts, and also the customers. Traditionally, the employees and the insiders are the main source of the most injurious crimes in an organization because they have the knowledge, access and frequently a job-related motive to commit such crime.

This research will cover the user's perception on the physical and environment information security management in their organization, the implementation and the effectiveness of the implementations of the security protection. This paper has organized as below: II. Literature Review, III. Mehodology, IV. Analysis/Finding, V. Conclusion and VI. References.

Literature Review

According to [3], information includes both technological and human issues, so the overall process of managing risks should include factors both from natural, theoretical and social science paradigms. Physical security contains administrative, technical and physical control. It will decide the facility location and will ensure that the construction process is done accordingly. The countermeasures must be planned to face any possible physical security risk and threats. The security system should also plan the process, deployment, monitoring and continuous improvement of physical countermeasures against infrastructure including the safeguarding of electric power and water supply, as well as fire prevention, detection and restrain. Physical security is divided into three parts which are security against natural disaster, physical access control and design of right parameters. Access control deals with controlled access to data, information, locations, and resources like the printouts, tapes, thumb drives, CDs, and the like. For any data that has a connection with human being, there should be a system that can identify and authenticate the users of the system. Discretionary, mandatory and nondiscretionary models are defined and their actions are monitored using auditing practices. Security against natural disaster is to protect the organization and take some precaution steps to minimize the effects from natural disasters such as flood, earthquake, tornado, landslide, hurricane and volcano when they strike. The last part in security control is designing the right parameter. Parameters are information that is defined either by the user or the system to operate the security system such as using the password or tags for identification and authentication purpose. As stated in [2] the report defined the overall scope of the problem:

"Computer systems are coming of age. As

computer systems become more prevalent,

sophisticated, embedded in physical

processes, and interconnected, society

becomes more vulnerable to poor system

design, accidents that disable systems and

attacks on computer systems . . . . without

adequate safeguards, we risk intrusions into

personal privacy (given the growing

electronic storage of personal information)

and potential disasters that can cause

economic and even human losses".

Methodology

According to the (Wikipedia); a questionnaire is a research instrument consisting of a series of questions and other prompts for the purpose of gathering information from respondents. In this research, questionnaire was used to collect data about the physical and environmental security management in Politeknik Tuanku Syed Sirajuddin, Perlis. There are 120 sets of questionnaire being distributed to 120 respondents in four departments and one unit; Department of Mathematics and Computer Science, Department of Hospitality, Department of Engineering, Department of Multimedia, Visual and Communication and ICT Unit. There are seven sections have to be answered by the respondents; respondents background, use security areas to protect facilities, use physical security perimeters/logical boundary to protect areas, secury organizations's offices, rooms and facilities, protect facilities from natural and human threats, secure power and telecommunications cables and maintain organization;s equipment. The respondents answered based on the scale Yes, No or Not Applicable. The responds is analyzed using SPSS software.

Analysis / Finding

V. Conclusion

VI. References

Questionnaire.Retrieved Jan 10,2011,from http://en.wikipedia.org/wiki/Questionnaire

Computer at Risk:Safe Computing in the information Age.National Research Council,Natioanl Academy Press,March 1991.

M. Gerber and R. von Solms, "Management of Risk in the Information Age," in Computers & Security, vol. 24, pp. 16-30, 2005.

Need an essay? You can buy essay help from us today!


Request the removal of this essay.

SERAHAN DOKUMEN PERJANJIAN PTPTN SALINAN <b>...</b>

Posted: 17 Jan 2014 11:16 PM PST

      
Adalah dimaklumkan bahawa aktiviti serahan dokumen perjanjian salinan  pelajar adalah salah satu aliran tatakerja baru yang digunapakai oleh  Seluruh PTPTN cawangan.    Bagi semua pelajar yang telah diluluskan pembiayaan PTPTN pada sesi  DIS 2012/2013 melibatkan kelompok 1 dan 2 adalah diminta untuk  mendapatkan DOKUMEN PERJANJIAN salinan pelajar yang akan diserahkan  kepada pelajar berkenaan bermula 8/1/2014 (Rabu) sehingga 9/1/2014  (Khamis) bertempat di DEWAN HARUM MANIS PTSS. Senarai nama pelajar  terlibat telah di paparkan di papan kenyataan asrama dan di Dewan  Harum Manis PTSS.    Pelajar yang gagal mendapatkan dokumen tersebut, akan mengakibatkan  pembiayaan untuk semester akan datang DISEKAT dan perjanjian tersebut  adalah TERBATAL secara AUTOMATIK.    Harap Maklum.      

Salam Maulidur Rasul 1435H - Blog <b>Politeknik Tunku Syed</b> <b>...</b>

Posted: 14 Jan 2014 07:06 AM PST

Assalamualaikum dan salam Sejahtera buat semua pembaca blog Perpustakaan PTSS.

Who Is the prophet Mohammed -peace be upon him-?

Mohammed -Peace and Blessings of God be upon him- was born in Makkah in the year 570 C.E.

Since his father died before his birth and his mother died shortly thereafter, he was raised by his Grandfather and then his uncle who were from the respected Arab tribe of Quraysh.

He was raised illiterate, unable to read or write, and remained so till his death. The Arabs in that time were not the most civilized. His people, before his mission as a prophet, were ignorant of science and most of them were illiterate.

As he grew up, he became known to be truthful, honest, trustworthy, generous, and sincere. He was so trustworthy that they called him Al-Ameen (In Arabic, which means the Trustworthy).

Mohammed was a Unitarian, and he had long detested the decadence and idolatry of his society.

At the age of forty, Mohammed received his first revelation from God Almighty through the Angel Gabriel. Mohammed was the last prophet sent by the God Almighty. while many prophets were sent before him to many nations, he was the only one sent to the whole of mankind.

The first word revealed to him was "Read" (or Recite) which meant that this religion is based on knowledge.

The revelations continued for twenty-three years, and they are collectively known as the Qur'an. the Qur'an isn't a book. it's the message brought by the prophet Mohammed -peace be upon him-.

As soon as he began to recite the Qur'an and to preach the truth which God had revealed to him, he and his small group of followers suffered persecution from the unbelievers of Makkah.

The persecution grew so fierce and bitter that in the year 622 the God gave them the command to emigrate.

This emigration from Makkah to the city of Madinah, some 260 miles to the north, marks the beginning of the Muslim calendar. today we are in the year 1434 A.H

After several years, Mohammed and his followers were able to return to Makkah, where they forgave their enemies.

Before Mohammed died, at the age of sixty-three, the greater part of the Arabian Peninsula had become Muslim, and within a century of his death, Islam had spread to Spain in the West and as far East as China.

Among the reasons for the rapid and peaceful spread of Islam was the truth and clarity of its doctrine.

Islam calls for faith in only one God, Who is the only one worthy of worship.

The Prophet Mohammed -peace be upon him- was a perfect example of an honest, just, merciful, compassionate, truthful, and brave human being. Though he was a man, he was far removed from all evil characteristics and strove solely for the sake of God and His reward in the Hereafter. Moreover, in all his actions and dealings, he was ever mindful and fearful of the God.

Muslims regard the prophet Mohammed -peace be upon him- as a role model, a guide and a teacher.

http://nayzak.deviantart.com/art/Let-everybody-learn-about-him-374469264

Blog <b>Politeknik Tunku Syed Sirajuddin Perlis</b>: 8 teams reveal as

Posted: 07 Dec 2013 11:34 PM PST

Blog <b>Politeknik Tunku Syed Sirajuddin Perlis</b>: 8 teams reveal as <b>...</b>

Posted: 02 Dec 2013 11:13 PM PST

8 teams reveal as invitees in GIGABYTE Premier League | DotaTalk

Posted: 27 Nov 2013 07:58 AM PST

8 teams reveal as invitees in GIGABYTE Premier League

GPL copy

8 teams has since been revealed as invitees to the upcoming Gigabyte Premier League Main Event which is due to start from 2-15th of December. Among the 8 teams listed as invitees are phAMD.Mineski, sgFirst Departure, my1Lowyat.net eSports, thMith Trust, my1Orange, my1Titan, idRex Regum Qeon and flag_australia_smallHans Reborn.

With the presence of top tier SEA teams as the likes of phAMD.Mineski, my1Lowyat.net eSports, sgFirst Departure, my1Orange and my1Titan, they will certainly be among the favorites to take home the champion tag. While up and coming teams like idRex Regum Qeon from Indonesia and flag_australia_smallHans Reborn from Australia with their recent good performance in tournaments will also be putting up a fight against the big guns around the scene. The main event will be joined by 8 qualified teams from various qualifiers. The Groups stage will start on Dec 3 and due to finish at Dec 12. With that, teams that will be in the Main Event will certainly have to put up their best to gain the title of being champions!

Invited Teams

  • phAMD.Mineski
  • sgFirst Departure
  • my1Lowyat.net eSports
  • thMith Trust
  • my1Orange
  • my1Titan
  • idRex Regum Qeon
  • flag_australia_smallHans Reborn

Qualified Teams 

  • ph GNE.Dreamz
  • ph Execration.PH
  • my1 Duskbin
  • INDIAN FLAGSiltherin Gaming
  • Indonesia 1
  • Rest of Sea 1
  • Rest of Sea 2
  • Taiwan 1

. Bookmark the

.

8 teams reveal as invitees in GIGABYTE Premier League | DotaTalk <b>...</b>

Posted: 03 Dec 2013 03:32 AM PST

8 teams reveal as invitees in GIGABYTE Premier League | DotaTalk

Posted: 27 Nov 2013 07:58 AM PST

8 teams reveal as invitees in GIGABYTE Premier League

GPL copy

8 teams has since been revealed as invitees to the upcoming Gigabyte Premier League Main Event which is due to start from 2-15th of December. Among the 8 teams listed as invitees are phAMD.Mineski, sgFirst Departure, my1Lowyat.net eSports, thMith Trust, my1Orange, my1Titan, idRex Regum Qeon and flag_australia_smallHans Reborn.

With the presence of top tier SEA teams as the likes of phAMD.Mineski, my1Lowyat.net eSports, sgFirst Departure, my1Orange and my1Titan, they will certainly be among the favorites to take home the champion tag. While up and coming teams like idRex Regum Qeon from Indonesia and flag_australia_smallHans Reborn from Australia with their recent good performance in tournaments will also be putting up a fight against the big guns around the scene. The main event will be joined by 8 qualified teams from various qualifiers. The Groups stage will start on Dec 3 and due to finish at Dec 12. With that, teams that will be in the Main Event will certainly have to put up their best to gain the title of being champions!

Invited Teams

  • phAMD.Mineski
  • sgFirst Departure
  • my1Lowyat.net eSports
  • thMith Trust
  • my1Orange
  • my1Titan
  • idRex Regum Qeon
  • flag_australia_smallHans Reborn

Qualified Teams 

  • ph GNE.Dreamz
  • ph Execration.PH
  • my1 Duskbin
  • INDIAN FLAGSiltherin Gaming
  • Indonesia 1
  • Rest of Sea 1
  • Rest of Sea 2
  • Taiwan 1

. Bookmark the

.

Eager Environmental Engineering Students Learn the Trades of <b>...</b>

Posted: 03 Dec 2013 01:20 AM PST

Eager Environmental Engineering Students Learn the Trades of <b>...</b>

Posted: 12 Sep 2013 03:00 AM PDT

Eager Environmental Engineering Students Learn the Trades of Waste Management at WMC  -  12 Sep, 2013

Students of Politeknik Sultan Idris Shah had on 12 September made a visit to Kualiti Alam's WMC to learn more about solid waste management, the processes of the treatment and disposal of scheduled waste.

Led by Khamisah, the 34 Environmental Engineering students were briefed by Sufian Azli on WMC's operations and the services it renders before touring the Environmental Management Services (EMS) laboratory, the on-ground facilities and the Secured landfill.

BACK

0 Comment for "Physical And Environmental Information Security Management - Politeknik Tuanku Syed Sirajuddin Perlis"