Protective security management in critical sectors of Malaysian government agencies /

The crime, opportunities for rule breaking violations, weakness or gap in a security program include structural, procedural, policy, electronic, human and other elements would provide opportunities to attack government assets and critical information. Statistics and case study shows that the vulnera...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd Saiful Hisham bin Md. Salleh
Format: Thesis
Language:English
Published: Gombak, Selangor : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2016
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5516
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 032800000a22003370004500
008 170223t2016 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
043 |a a-my--- 
050 |a JQ1062.A56S4 
100 0 |a Mohd Saiful Hisham bin Md. Salleh 
245 1 |a Protective security management in critical sectors of Malaysian government agencies /  |c by Mohd Saiful Hisham bin Md. Salleh 
260 |a Gombak, Selangor :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2016 
300 |a xiii, 50 leaves :  |b ill. ;  |c 30cm. 
500 |a Abstracts in English and Arabic. 
500 |a "A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management."--On t.p. 
502 |a Thesis (MPSM)--International Islamic University Malaysia, 2016. 
504 |a Includes bibliographical references (leaves 47-48). 
520 |a The crime, opportunities for rule breaking violations, weakness or gap in a security program include structural, procedural, policy, electronic, human and other elements would provide opportunities to attack government assets and critical information. Statistics and case study shows that the vulnerable area need to improve soon. Thus, the government must do a systematic approach used to assess a government department's security posture, analyze the effectiveness of the existing security program and tools, and identify security weaknesses. To implement protective security standards, agencies are required to clearly identify internal security governance structures and delineate responsibilities. The follow up and follow through movement across level of public servant are most required. There are many benefits an organization will enjoy when it makes those improvements, not the least of which is the budget justification for creating a security awareness program that help will boost security effectiveness overall. Organizations that have achieved a high level of security effectiveness are better able to identify major security breaches, secure confidential information, limit physical access to government assets, and achieve compliance with legal and self-regulatory frameworks. Organizations that maximize the efficacy of their security awareness programs stand to benefit not only from better incident prevention, but many other benefits as well, including improved reputation and customer loyalty. 
596 |a 1 
650 |a Administrative agencies  |x Security measure  |z Malaysia 
650 |a Computer security 
650 |a Security systems  |z Malaysia 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Centre for IT Advancement (CITA)  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Centre for IT Advancement (CITA) 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5516 
900 |a sbh-lfr 
999 |c 436469  |d 469298 
952 |0 0  |6 T JQ 001062 A56 S4 M697P 2016  |7 0  |8 THESES  |9 761550  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t JQ 1062 A56 S4 M697P 2016  |p 11100355191  |r 2018-05-02  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF JQ 1062 A56 S4 M697P 2016  |7 0  |8 THESES  |9 855528  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf JQ 1062 A56 S4 M697P 2016  |p 11100355192  |r 2018-05-02  |t 1  |v 0.00  |y THESISDIG