Securing IT management in organization / Nurmuzlifa Mohamad Munir

Information Technology (IT) deals with the uses of electronic computers and computer software to convert, store, protect, process, transmit and retrieve information. Information exists in many forms, and different types of information have different values to an organization. The impact of threats t...

Full description

Saved in:
Bibliographic Details
Main Author: Mohamad Munir, Nurmuzlifa
Format: Thesis
Language:English
Published: 2008
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/64475/1/64475.PDF
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.64475
record_format uketd_dc
spelling my-uitm-ir.644752023-06-18T10:27:52Z Securing IT management in organization / Nurmuzlifa Mohamad Munir 2008 Mohamad Munir, Nurmuzlifa Information technology. Information systems Information Technology (IT) deals with the uses of electronic computers and computer software to convert, store, protect, process, transmit and retrieve information. Information exists in many forms, and different types of information have different values to an organization. The impact of threats to confidentiality, integrity and availability of information also depends on the information and an organization's mission. As information systems become increasingly interconnected, the opportunities for compromises increase. This paper focuses is to determine secure IT management practices among organizations and their awareness level. It also elaborated on ISO 27001, currently the only auditable international standard that defines the requirements for ISMS. It helps to establish policies, objectives and controls for information security within the context of an organization's overall business. It is based on a methodical business risk approach to establish, implement, operate, monitor, review, maintain and improve information security. The findings concluded that that the awareness level of organization in securing their IT management is moderate. More than half of the respondents agree that insider threat posed more damage (40%) yet only 43% of respondent applies security training to new employee. This is may be because security executives and top management maybe becoming over confident. Even though they are making serious headway in understanding and combating threat, organizations think they have things handled when most of them (70%) only review and update their security policy only as needed. More than half of the respondents agree that insider threat posed more damage (40%) yet only 43% of respondent applies security training to new employee. 2008 Thesis https://ir.uitm.edu.my/id/eprint/64475/ https://ir.uitm.edu.my/id/eprint/64475/1/64475.PDF text en public degree Universiti Teknologi Mara (UiTM) Faculty of Computer and Mathematical Sciences May Lin, Yap (Assoc. Prof.)
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
advisor May Lin, Yap (Assoc. Prof.)
topic Information technology
Information systems
spellingShingle Information technology
Information systems
Mohamad Munir, Nurmuzlifa
Securing IT management in organization / Nurmuzlifa Mohamad Munir
description Information Technology (IT) deals with the uses of electronic computers and computer software to convert, store, protect, process, transmit and retrieve information. Information exists in many forms, and different types of information have different values to an organization. The impact of threats to confidentiality, integrity and availability of information also depends on the information and an organization's mission. As information systems become increasingly interconnected, the opportunities for compromises increase. This paper focuses is to determine secure IT management practices among organizations and their awareness level. It also elaborated on ISO 27001, currently the only auditable international standard that defines the requirements for ISMS. It helps to establish policies, objectives and controls for information security within the context of an organization's overall business. It is based on a methodical business risk approach to establish, implement, operate, monitor, review, maintain and improve information security. The findings concluded that that the awareness level of organization in securing their IT management is moderate. More than half of the respondents agree that insider threat posed more damage (40%) yet only 43% of respondent applies security training to new employee. This is may be because security executives and top management maybe becoming over confident. Even though they are making serious headway in understanding and combating threat, organizations think they have things handled when most of them (70%) only review and update their security policy only as needed. More than half of the respondents agree that insider threat posed more damage (40%) yet only 43% of respondent applies security training to new employee.
format Thesis
qualification_level Bachelor degree
author Mohamad Munir, Nurmuzlifa
author_facet Mohamad Munir, Nurmuzlifa
author_sort Mohamad Munir, Nurmuzlifa
title Securing IT management in organization / Nurmuzlifa Mohamad Munir
title_short Securing IT management in organization / Nurmuzlifa Mohamad Munir
title_full Securing IT management in organization / Nurmuzlifa Mohamad Munir
title_fullStr Securing IT management in organization / Nurmuzlifa Mohamad Munir
title_full_unstemmed Securing IT management in organization / Nurmuzlifa Mohamad Munir
title_sort securing it management in organization / nurmuzlifa mohamad munir
granting_institution Universiti Teknologi Mara (UiTM)
granting_department Faculty of Computer and Mathematical Sciences
publishDate 2008
url https://ir.uitm.edu.my/id/eprint/64475/1/64475.PDF
_version_ 1783735468379078656