Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

System ICT Security Policy and the Implementation by Local Authorities in Malaysia - A Case Study

of: Mohd Farizul Mat Ghani

GRIN Verlag , 2015

ISBN: 9783668117426 , 9 Pages

Format: PDF, Read online

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Read Online for: Windows PC,Mac OSX,Linux

Price: 5,99 EUR



More of the content

System ICT Security Policy and the Implementation by Local Authorities in Malaysia - A Case Study


 

Research Paper (postgraduate) from the year 2015 in the subject Business economics - Information Management, grade: A, , course: Doctor of Philosophy in Informatics, language: English, abstract: The purpose of this project is to investigate and resolve problems related to the implementation of the security policy in Marang District Council. Furthermore, the ICT Security Policy System is to be designed, developed in order to assist the Information Technology Department (BTM). In addition, these documents must be compliant to the ISO 27001 standard and the Information Technology Security and Communication Policies for the Public Sector which is developed by MAMPU. The ICT Security Policy System is a web based system. All results would be presented and discussed. ICT Security Policy is a common topic that is being discussed in the public sector, because security incidents happen to organizations that offer online services to the public. These problems or incidents are also affecting the IT Department (BTM) at Marang District Council (MDM), as we also provide computer and internet facilities to our users. Based on the research findings, including inputs gathered from the respondents from Marang District Council, these problems can be reduced by providing a computerized ICT Policy document guideline, creating user awareness programs and by enforcing these ICT Policies.

Ts.Dr. Mohd Farizul Mat Ghani his a Professional Technologist. The title of P. Tech or Ts. is protected across Malaysia by copyright law, and specifically in certain jurisdictions by provincial law. The P. Tech designation came into place to align Technologists . Technologists can perform the functions of a Information Technology, Engineer or Scientist. He also has a M.Sc. degrees in Information Technology from Malaysia University of Science and Technology(MUST), Malaysia. He has Doctor of Philosophy in Informatics at Malaysia University of Science and Technology (MUST) and PhD Scholar from Ministry of Higher Education Malaysia (MOHE). He is currently a senior IT Specialist at the Information Technology Department in Marang District Council, Malaysia. His current research interests include: Technology Architecture and Integration, Digital Image Processing, Digital Image Forensic, Image Retrieval, Information Security, and Artificial Neural Networks. His research work has been published in several international journals and conference publications. Specialties: Information Technology & Information Security. - Technology Architecture and Integration. - Problem Solving & Process Improvement. - Extensive knowledge of IT Operations. - Strong technical knowledge in various IT platforms and software. - Solid understanding and application of Risk management and Information Security compliance. - Excellent understanding of International standards and best practices: ISO 27001, COBIT 5, ITIL. - Strong knowledge of Disaster Recovery and Business Continuity Management. - Effective communication & presentation skills - Proven project management record on timely delivery, effective cost control, high quality deliverable and meeting stakeholder's expectations. - Possessed multi-tasking abilities in various fields. - Proficient in project management and project management office governance, processes and measures. Current research field of interests: 1. ICT Security Policy System 2. Modeling, Control and Optimizing complex nonlinear systems using intelligent techniques such as Neural Networks, Fuzzy logic and Genetic Algorithm 3.RFID