Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley

Computer security incident is any activities or events that potentially harm the computer systems or networks. These activities could be due to various vulnerabilities and threats either intentionally or unintentionally attempted such as unauthorized actions in a computer system, hardware or soft...

Full description

Saved in:
Bibliographic Details
Main Author: Nor Hidayah Mohd Jawawi
Format: Thesis
Language:English
Published: 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48133/1/NorHidayahMohdJawawiMFC2012.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.48133
record_format uketd_dc
spelling my-utm-ep.481332017-08-16T07:04:56Z Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley 2012 Nor Hidayah Mohd Jawawi, QA76 Computer software Computer security incident is any activities or events that potentially harm the computer systems or networks. These activities could be due to various vulnerabilities and threats either intentionally or unintentionally attempted such as unauthorized actions in a computer system, hardware or software failure, denial of service attempts and other events that could be threatens the computer system. As computer security incident cannot fully avoided or mitigated, organizations should have a procedure in handling such incidents to mitigate the incident, control the situation during the incident or recover the system affected by the incident. This study has been conducted to identify the components of user’s behaviors in handling computer security incident. Here we found six components of user’s behaviors in handling computer security incident which are aware of assurance, responsibility, perceived skills and knowledge, general security orientation, motivation and perceived barriers. An analysis of these behaviors has been done which covered the 13 financial institutions in Klang Valley. The result of analysis shows more than half of users are agree with all these components of users’ behaviors in handling computer security incident except for perceived skills and knowledge. The study shown that most of users are concern with the common information security practices and sharing the detected problem with others by seeking assistance with other colleagues. However, the users are not really care with the security practices in handling computer security incident which need their effort technically. Therefore, the organizations need to note this issue to find appropriate solution 2012 Thesis http://eprints.utm.my/id/eprint/48133/ http://eprints.utm.my/id/eprint/48133/1/NorHidayahMohdJawawiMFC2012.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81839?queryType=vitalDismax&query=Evaluation+of+user%27s+behaviours+handling+computer+security+incident+in+financial+institution+in+Klang+Valley&public=true masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Nor Hidayah Mohd Jawawi,
Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
description Computer security incident is any activities or events that potentially harm the computer systems or networks. These activities could be due to various vulnerabilities and threats either intentionally or unintentionally attempted such as unauthorized actions in a computer system, hardware or software failure, denial of service attempts and other events that could be threatens the computer system. As computer security incident cannot fully avoided or mitigated, organizations should have a procedure in handling such incidents to mitigate the incident, control the situation during the incident or recover the system affected by the incident. This study has been conducted to identify the components of user’s behaviors in handling computer security incident. Here we found six components of user’s behaviors in handling computer security incident which are aware of assurance, responsibility, perceived skills and knowledge, general security orientation, motivation and perceived barriers. An analysis of these behaviors has been done which covered the 13 financial institutions in Klang Valley. The result of analysis shows more than half of users are agree with all these components of users’ behaviors in handling computer security incident except for perceived skills and knowledge. The study shown that most of users are concern with the common information security practices and sharing the detected problem with others by seeking assistance with other colleagues. However, the users are not really care with the security practices in handling computer security incident which need their effort technically. Therefore, the organizations need to note this issue to find appropriate solution
format Thesis
qualification_level Master's degree
author Nor Hidayah Mohd Jawawi,
author_facet Nor Hidayah Mohd Jawawi,
author_sort Nor Hidayah Mohd Jawawi,
title Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
title_short Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
title_full Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
title_fullStr Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
title_full_unstemmed Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
title_sort evaluation of user's behaviours handling computer security incident in financial institution in klang valley
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2012
url http://eprints.utm.my/id/eprint/48133/1/NorHidayahMohdJawawiMFC2012.pdf
_version_ 1747817315795206144