Grin logo
en de es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › BWL - Informationswissenschaften, Informationsmanagement

System ICT Security Policy and the Implementation by Local Authorities in Malaysia

A Case Study

Titel: System ICT Security Policy and the Implementation by Local Authorities in Malaysia

Forschungsarbeit , 2015 , 9 Seiten , Note: A

Autor:in: Mohd Farizul Mat Ghani (Autor:in)

BWL - Informationswissenschaften, Informationsmanagement
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

The purpose of this project is to investigate and resolve problems related to the implementation of the security policy in Marang District Council. Furthermore, the ICT Security Policy System is to be designed, developed in order to assist the Information Technology Department (BTM). In addition, these documents must be compliant to the ISO 27001 standard and the Information Technology Security and Communication Policies for the Public Sector which is developed by MAMPU. The ICT Security Policy System is a web based system. All results would be presented and discussed.

ICT Security Policy is a common topic that is being discussed in the public sector, because security incidents happen to organizations that offer online services to the public.

These problems or incidents are also affecting the IT Department (BTM) at Marang District Council (MDM), as we also provide computer and internet facilities to our users. Based on the research findings, including inputs gathered from the respondents from Marang District Council, these problems can be reduced by providing a computerized ICT Policy document guideline, creating user awareness programs and by enforcing these ICT Policies.

Leseprobe


Inhaltsverzeichnis (Table of Contents)

  • 1 Introduction
    • 1.1 Problem Statement
  • 2 Project Goals
    • 2.1 Project Objectives
    • 2.2 Project Scope
  • 3 Literature review
    • 3.1 Issues Raised
  • 4 Methodology
  • 5 System Design
    • 5.1 Database Design
    • 5.2 Program Code
  • 6 Benefits of the System
    • 6.1 General Benefits of MDM and Local Authorities
  • 7 Conclusion

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

The main objective of this project is to develop and implement a web-based ICT Security Policy System for the Marang District Council (MDM) in Malaysia. This system aims to improve MDM's compliance with ISO 27001 standards and MAMPU guidelines, enhancing the overall security of their ICT infrastructure. The project investigates existing problems related to ICT security policy implementation within MDM and proposes solutions to mitigate these issues.

  • Implementation of ICT Security Policies in Public Sector Organizations
  • Development and Implementation of a Web-Based ICT Security Policy System
  • Compliance with ISO 27001 Standards and MAMPU Guidelines
  • Addressing ICT Security Vulnerabilities and Risks
  • User Awareness and Training in ICT Security

Zusammenfassung der Kapitel (Chapter Summaries)

1 Introduction: This chapter introduces the significance of ICT security in the context of rapidly developing information technology and its impact on governmental organizations. It highlights the vulnerability of ICT assets and sensitive information within government bodies and emphasizes the need for robust security policies. The chapter establishes the importance of protecting valuable resources and preventing unauthorized access to sensitive data that could harm national interests. The chapter concludes by referencing studies highlighting the lack of awareness and inadequate security policies in many organizations, thereby setting the stage for the project's focus on improving ICT security within the Marang District Council.

2 Project Goals: This chapter clearly defines the project's primary goals, which are to implement a system that will help the Marang District Council (MDM) comply with ICT Security Policy based on ISO 27001 standards, circulars, and guidelines from MAMPU (the Malaysian Administrative Modernisation and Management Planning Unit). It lays the groundwork for the project by establishing its main purpose – enabling MDM to effectively implement its ICT Security Policy. The chapter also includes a detailed breakdown of the project objectives and scope.

3 Literature review: This chapter presents a review of existing literature focusing on the challenges and issues related to ICT security in organizations. It highlights the existing awareness levels and practices related to ICT security in MDM and other organizations, drawing from surveys and studies to underline the significance of the project. The chapter uses data to illustrate the gaps in existing security measures and the need for better implementation strategies, setting the context for the proposed solutions. This chapter demonstrates the need for a more comprehensive ICT security policy, based on existing research and the current state of affairs within MDM.

4 Methodology: This chapter outlines the methodology used for the development of the ICT Security Policy System. It details the adoption of the Rapid Application Development (RAD) strategy, emphasizing its iterative and user-centric approach. The chapter explains how the RAD methodology facilitates efficient requirements analysis, design, and implementation, minimizing development time while ensuring user involvement throughout the process. The description of the RAD process includes its core principles and its advantages in this particular context.

5 System Design: This chapter describes the design of the proposed ICT Security Policy System. While specifics regarding the database design and program code are mentioned, the overall focus remains on the structure and functionality of the system as a solution to the problems identified in earlier chapters. It provides a high-level overview of the system architecture, highlighting its key features and how these features address the challenges of implementing an effective ICT security policy. The details of the database (MySQL) and programming language (PHP) used provide context but do not dominate the chapter’s focus on the system’s overall design.

6 Benefits of the System: This chapter discusses the expected benefits of the implemented ICT Security Policy System. It explores both the general benefits for MDM and other local authorities, highlighting the positive impacts on efficiency, compliance, and security. The chapter likely connects these benefits to the goals and objectives defined in the earlier sections, showing how the system addresses the previously identified challenges and improves overall organizational capabilities and security posture. The discussion would synthesize findings from the entire project, especially the impact on resource management and information protection.

Schlüsselwörter (Keywords)

Organizations, ICT security policy, implementation, system, ISO 27001, MAMPU, Malaysia, Marang District Council (MDM), Information Technology, Risk Management, Security Awareness.

Frequently Asked Questions: A Comprehensive Language Preview of ICT Security Policy System for Marang District Council

What is the main topic of this document?

This document provides a comprehensive preview of a project focused on developing and implementing a web-based ICT Security Policy System for the Marang District Council (MDM) in Malaysia. It aims to improve MDM's compliance with ISO 27001 standards and MAMPU guidelines, enhancing overall ICT infrastructure security.

What are the key objectives of the project?

The main objective is to develop and implement a web-based ICT Security Policy System for MDM to improve its compliance with ISO 27001 and MAMPU guidelines. Key themes include implementing ICT security policies in public sector organizations, developing a web-based system, achieving compliance with relevant standards, addressing ICT security vulnerabilities and risks, and improving user awareness and training in ICT security.

What is covered in the Table of Contents?

The Table of Contents outlines the structure of the document, covering an introduction, project goals, a literature review, methodology, system design, benefits of the system, and a conclusion. Each section is further broken down into sub-sections detailing specific aspects of the project.

What methodology was used for the project?

The project utilized the Rapid Application Development (RAD) methodology. This iterative and user-centric approach facilitated efficient requirements analysis, design, and implementation, minimizing development time while ensuring user involvement.

What system was designed and what technologies were used?

The project designed a web-based ICT Security Policy System. While specifics about the database design and program code are mentioned, the focus is on the system's structure and functionality. MySQL and PHP were used for the database and programming respectively.

What are the benefits of the implemented system?

The implemented system offers several benefits, including improved compliance with ISO 27001 and MAMPU guidelines, enhanced security of MDM's ICT infrastructure, increased efficiency, and better protection of sensitive data. Benefits extend to other local authorities as well.

What are the key challenges addressed by the project?

The project addresses challenges related to implementing ICT security policies in public sector organizations, specifically within MDM. These include a lack of awareness, inadequate security policies, and existing ICT security vulnerabilities.

What is the significance of ISO 27001 and MAMPU in this project?

ISO 27001 and MAMPU (Malaysian Administrative Modernisation and Management Planning Unit) represent the standards and guidelines that the project aims to help MDM comply with. Compliance with these standards ensures a higher level of ICT security and data protection.

What are the key takeaways from the chapter summaries?

The chapter summaries provide a concise overview of each section's content, highlighting key findings and contributions. They demonstrate the progression of the project from identifying problems, proposing solutions, designing the system, and finally, highlighting the benefits of the implemented system.

What are the keywords associated with this project?

Keywords include: Organizations, ICT security policy, implementation, system, ISO 27001, MAMPU, Malaysia, Marang District Council (MDM), Information Technology, Risk Management, and Security Awareness.

Ende der Leseprobe aus 9 Seiten  - nach oben

Details

Titel
System ICT Security Policy and the Implementation by Local Authorities in Malaysia
Untertitel
A Case Study
Veranstaltung
Doctor of Philosophy in Informatics
Note
A
Autor
Mohd Farizul Mat Ghani (Autor:in)
Erscheinungsjahr
2015
Seiten
9
Katalognummer
V312614
ISBN (eBook)
9783668117426
ISBN (Buch)
9783668117433
Sprache
Englisch
Schlagworte
system security policy implementation local authorities malaysia case study
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Mohd Farizul Mat Ghani (Autor:in), 2015, System ICT Security Policy and the Implementation by Local Authorities in Malaysia, München, GRIN Verlag, https://www.grin.com/document/312614
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • https://cdn.openpublishing.com/images/brand/1/preview_popup_advertising.jpg
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  9  Seiten
Grin logo
  • Grin.com
  • Zahlung & Versand
  • Impressum
  • Datenschutz
  • AGB
  • Impressum