Program Bakti Siswa 2014 PTSS Di Kodiang - MYNEWSHUB.MY - Politeknik Tuanku Syed Sirajuddin Perlis

Program Bakti Siswa 2014 PTSS Di Kodiang - MYNEWSHUB.MY - Politeknik Tuanku Syed Sirajuddin Perlis


Program Bakti Siswa 2014 PTSS Di Kodiang - MYNEWSHUB.MY - Politeknik Tuanku Syed Sirajuddin Perlis

Posted: 13 Apr 2014 11:19 PM PDT

Program Bakti Siswa 2014 PTSS Di Kodiang - MYNEWSHUB.MY - Politeknik Tuanku Syed Sirajuddin Perlis


Program Bakti Siswa 2014 PTSS Di Kodiang - MYNEWSHUB.MY

Posted: 06 Apr 2014 11:36 PM PDT

In a recent study, physical and environmental information security in a government organization is a crucial part in a government organization because it involved with a lot of private and confidential information. So instead of taking care on the system itself the physical security also important since all the data and information are handled by the human in a physical environment.

Keywords-information security;physical and environmental security; government organization.

Introduction

Most organizations around the world are now focusing on the security system to protect their properties and employees. Properties include buildings or the premises, the facilities such as electronic devices, telecommunication devices such as telephone and fax machine, documents and all the belongings in the premise. Employees are the constructors of an organization and they are the working force that enables the organization's daily transaction. Both facilities and employees are the assets that must be protected because they are the essence that moves the organization to meet its target. Most companies only focus on the security of the device and software based information security solutions because the cost for the devices is very high. Actually, the organization should also focus on their personnel, internal and external technical experts, and also the customers. Traditionally, the employees and the insiders are the main source of the most injurious crimes in an organization because they have the knowledge, access and frequently a job-related motive to commit such crime.

This research will cover the user's perception on the physical and environment information security management in their organization, the implementation and the effectiveness of the implementations of the security protection. This paper has organized as below: II. Literature Review, III. Mehodology, IV. Analysis/Finding, V. Conclusion and VI. References.

Literature Review

According to [3], information includes both technological and human issues, so the overall process of managing risks should include factors both from natural, theoretical and social science paradigms. Physical security contains administrative, technical and physical control. It will decide the facility location and will ensure that the construction process is done accordingly. The countermeasures must be planned to face any possible physical security risk and threats. The security system should also plan the process, deployment, monitoring and continuous improvement of physical countermeasures against infrastructure including the safeguarding of electric power and water supply, as well as fire prevention, detection and restrain. Physical security is divided into three parts which are security against natural disaster, physical access control and design of right parameters. Access control deals with controlled access to data, information, locations, and resources like the printouts, tapes, thumb drives, CDs, and the like. For any data that has a connection with human being, there should be a system that can identify and authenticate the users of the system. Discretionary, mandatory and nondiscretionary models are defined and their actions are monitored using auditing practices. Security against natural disaster is to protect the organization and take some precaution steps to minimize the effects from natural disasters such as flood, earthquake, tornado, landslide, hurricane and volcano when they strike. The last part in security control is designing the right parameter. Parameters are information that is defined either by the user or the system to operate the security system such as using the password or tags for identification and authentication purpose. As stated in [2] the report defined the overall scope of the problem:

"Computer systems are coming of age. As

computer systems become more prevalent,

sophisticated, embedded in physical

processes, and interconnected, society

becomes more vulnerable to poor system

design, accidents that disable systems and

attacks on computer systems . . . . without

adequate safeguards, we risk intrusions into

personal privacy (given the growing

electronic storage of personal information)

and potential disasters that can cause

economic and even human losses".

Methodology

According to the (Wikipedia); a questionnaire is a research instrument consisting of a series of questions and other prompts for the purpose of gathering information from respondents. In this research, questionnaire was used to collect data about the physical and environmental security management in Politeknik Tuanku Syed Sirajuddin, Perlis. There are 120 sets of questionnaire being distributed to 120 respondents in four departments and one unit; Department of Mathematics and Computer Science, Department of Hospitality, Department of Engineering, Department of Multimedia, Visual and Communication and ICT Unit. There are seven sections have to be answered by the respondents; respondents background, use security areas to protect facilities, use physical security perimeters/logical boundary to protect areas, secury organizations's offices, rooms and facilities, protect facilities from natural and human threats, secure power and telecommunications cables and maintain organization;s equipment. The respondents answered based on the scale Yes, No or Not Applicable. The responds is analyzed using SPSS software.

Analysis / Finding

V. Conclusion

VI. References

Questionnaire.Retrieved Jan 10,2011,from http://en.wikipedia.org/wiki/Questionnaire

Computer at Risk:Safe Computing in the information Age.National Research Council,Natioanl Academy Press,March 1991.

M. Gerber and R. von Solms, "Management of Risk in the Information Age," in Computers & Security, vol. 24, pp. 16-30, 2005.

Need an essay? You can buy essay help from us today!


Request the removal of this essay.

PROGRAM HIJRAH MINDA - <b>Politeknik Tuanku Syed Sirajuddin</b> <b>...</b>

Posted: 04 Apr 2014 01:05 PM PDT

Dimaklumkan Majlis Agama Islam dan Adat Istiadat Melayu Negeri Perlis dengan kerjasama Pusat Islam ,Politeknik Tuanku Syed Sirajuddin,Perlis akan mengadakan Program Hijrah Minda pada tarikh , masa dan tempat seperti berikut:

Tarikh : 4 April 2014

Masa   : 12.15 tengahari

Tempat : Pusat Islam,Luqman Al Hakim ,PTSS

DYTM  Tuanku Raja Muda Perlis akan berangkat  bersama ke program ini .

Aturcara Program adalah seperti berikut:

Masa                                                      Aktiviti

12.15tgh -12.45tgh     Ceramah - Kefahaman Ahli Sunnah Wal-Jamaah

( Al Fadhil Ustaz Mohamad Abdul Kadir bin Sahak)

Pegawai Hal Ehwal Agama Islm ,Jabatan Mufti Negeri Perlis

12.45tgh -1.00tgh      Ceramah -Wakaf Satu Pelaburan Abadi

(Al- Fadhil Ustaz Syed Aisam bin Syed Idris Al- Habshi)

Pegawai Unit Wakaf Maip)

1.00tgh                    Keberangkatan tiba DYTM Tuanku Raja Muda Perlis

Sumbangan Kepada Asnaf Terpilih oleh DYTM Tuanku Raja Muda Perlis

Tribute to MH370

Sesi Bergambar DYTM Tuanku Raja Muda Perlis Bersama Pelajar PTSS

Solat Jumaat

Keberangkatan balik DYTM Tuanku Raja Muda Perlis

Majlis Bersurai

Semua pelajar ,pegawai dan kakitangan PTSS dan orangramai dijemput ke program yang akan diadakan ini

Sekian terima kasih

Pejabat Perhubungan Awam PTSS

PERTANDINGAN PIDATO 1MALAYSIA 2014 - <b>Politeknik Tuanku</b>

Posted: 05 Apr 2014 11:25 PM PDT

Sukacita dimaklumkan, Unit Sistem Maklumat, Politeknik Tuanku Sultanah Bahiyah Kulim, Kedah akan menganjurkan kursus-kursus ICT seperti ketetapan berikut:

i.     Kursus Penggunaan Microsoft Office 2013 (Asas), 23-24 Mac 2014
ii.    Kursus Pembangunan Sistem Menggunakan Pengaturcaraan PHP dan MySQL (Asas), 13-14 April 2014
iii.    Kursus Olahan Grafik Secara Kreatif Menggunakan Adobe Photoshop CS6 (Asas), 21-22 April 2014
iv.   Kursus Pembangunan Laman Web Menggunakan CMS Joomla! 3 (Asas), 23-24 November 2014

Kursus akan bermula pada pukul 8:00 pagi sehingga 5:00 petang bertempat di Makmal Latihan Staf, Politeknik Tuanku Sultanah Bahiyah Kulim.
Untuk makluman, yuran kursus adalah RM50.00 dan terhad kepada 30 orang peserta sahaja. Hanya peserta yang telah membuat pembayaran dikira telah menempah tempat.

Sehubungan dengan itu, dikepilkan bersama borang untuk penyertaan kursus tersebut. Sebarang pertanyaan mengenai kursus, sila hubungi pegawai berikut:

i)     Pn Norazura binti Mohd Nor ( This e-mail address is being protected from spambots. You need JavaScript enabled to view it ; H/P: 019-4444190 ; Ext: 2020)
ii)    Pn. Lenny Esma binti Tomadi ( This e-mail address is being protected from spambots. You need JavaScript enabled to view it ; H/P: 012-4231404; Ext: 2041)
iii)   Pn. Nurmaniza binti Othman ( This e-mail address is being protected from spambots. You need JavaScript enabled to view it ; H/P: 013-5241212; Ext: 2028)

Maklumat lanjut boleh didapati dengan melayari laman portal PTSB http://www.ptsb.edu.my

0 Comment for "Program Bakti Siswa 2014 PTSS Di Kodiang - MYNEWSHUB.MY - Politeknik Tuanku Syed Sirajuddin Perlis"