Protective security management in critical sectors of Malaysian government agencies /
The crime, opportunities for rule breaking violations, weakness or gap in a security program include structural, procedural, policy, electronic, human and other elements would provide opportunities to attack government assets and critical information. Statistics and case study shows that the vulnera...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Gombak, Selangor :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2016
|
Subjects: | |
Online Access: | http://studentrepo.iium.edu.my/handle/123456789/5516 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 032800000a22003370004500 | ||
---|---|---|---|
008 | 170223t2016 my a g m 000 0 eng d | ||
040 | |a UIAM |b eng | ||
041 | |a eng | ||
043 | |a a-my--- | ||
050 | |a JQ1062.A56S4 | ||
100 | 0 | |a Mohd Saiful Hisham bin Md. Salleh | |
245 | 1 | |a Protective security management in critical sectors of Malaysian government agencies / |c by Mohd Saiful Hisham bin Md. Salleh | |
260 | |a Gombak, Selangor : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2016 | ||
300 | |a xiii, 50 leaves : |b ill. ; |c 30cm. | ||
500 | |a Abstracts in English and Arabic. | ||
500 | |a "A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management."--On t.p. | ||
502 | |a Thesis (MPSM)--International Islamic University Malaysia, 2016. | ||
504 | |a Includes bibliographical references (leaves 47-48). | ||
520 | |a The crime, opportunities for rule breaking violations, weakness or gap in a security program include structural, procedural, policy, electronic, human and other elements would provide opportunities to attack government assets and critical information. Statistics and case study shows that the vulnerable area need to improve soon. Thus, the government must do a systematic approach used to assess a government department's security posture, analyze the effectiveness of the existing security program and tools, and identify security weaknesses. To implement protective security standards, agencies are required to clearly identify internal security governance structures and delineate responsibilities. The follow up and follow through movement across level of public servant are most required. There are many benefits an organization will enjoy when it makes those improvements, not the least of which is the budget justification for creating a security awareness program that help will boost security effectiveness overall. Organizations that have achieved a high level of security effectiveness are better able to identify major security breaches, secure confidential information, limit physical access to government assets, and achieve compliance with legal and self-regulatory frameworks. Organizations that maximize the efficacy of their security awareness programs stand to benefit not only from better incident prevention, but many other benefits as well, including improved reputation and customer loyalty. | ||
596 | |a 1 | ||
650 | |a Administrative agencies |x Security measure |z Malaysia | ||
650 | |a Computer security | ||
650 | |a Security systems |z Malaysia | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Centre for IT Advancement (CITA) |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Centre for IT Advancement (CITA) | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/5516 | |
900 | |a sbh-lfr | ||
999 | |c 436469 |d 469298 | ||
952 | |0 0 |6 T JQ 001062 A56 S4 M697P 2016 |7 0 |8 THESES |9 761550 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t JQ 1062 A56 S4 M697P 2016 |p 11100355191 |r 2018-05-02 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF JQ 1062 A56 S4 M697P 2016 |7 0 |8 THESES |9 855528 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf JQ 1062 A56 S4 M697P 2016 |p 11100355192 |r 2018-05-02 |t 1 |v 0.00 |y THESISDIG |