Secured Information Technology Infrastructure Maintenance Framework

Security maintenance of information technology (IT) infrastructure has gained tremendous popularity in recent years according to the diversity of the types of organizations involved from a small company to the government. However, the requirements of flexibility, scalability, and inexpensive initial...

Full description

Saved in:
Bibliographic Details
Main Author: Firkhan Ali Hamid Ali
Format: Thesis
Language:en_US
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/194ad792-283c-4c77-91ed-f8c751cabc9f/download
https://oarep.usim.edu.my/bitstreams/a40c6327-c593-4400-b818-123554de3435/download
https://oarep.usim.edu.my/bitstreams/48650c42-adc3-413b-95c1-0ce85b7fff54/download
https://oarep.usim.edu.my/bitstreams/9a4c2ff4-491c-472a-ad0f-2027e12fda57/download
https://oarep.usim.edu.my/bitstreams/1bf27a7e-f775-4105-826d-cc425f7898c4/download
https://oarep.usim.edu.my/bitstreams/ecf9432b-fa4e-4cd5-9145-028878afc5c4/download
https://oarep.usim.edu.my/bitstreams/c5fd847f-f777-43d9-a97b-5cb3fe470aaf/download
https://oarep.usim.edu.my/bitstreams/9ac905ff-4ac2-4dff-841f-fa525c9c9cce/download
https://oarep.usim.edu.my/bitstreams/5be2b462-97ea-4b54-b821-0b70a8eb83fa/download
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-13089
record_format uketd_dc
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language en_US
topic Information technology--Security measures
Computer security--Management.
Information Technology Infrastructure
spellingShingle Information technology--Security measures
Computer security--Management.
Information Technology Infrastructure
Firkhan Ali Hamid Ali
Secured Information Technology Infrastructure Maintenance Framework
description Security maintenance of information technology (IT) infrastructure has gained tremendous popularity in recent years according to the diversity of the types of organizations involved from a small company to the government. However, the requirements of flexibility, scalability, and inexpensive initial investment in the usage of IT infrastructure are eclipsed by security concerns that stymie adoption. The information technology infrastructure, in particular, is highly adaptable but complicated, and it has been vulnerable to a variety of security threats, ranging from simple issues such as incorrect configuration to an IT security incident. Then, most of the existing IT security maintenance frameworks had lack of implementation because of complexity, no standard of action, and just for gathering information only. Moreover, a limited scholarly investigation has been undertaken to present a need for properly defined steps of the process approach in which a structured way of managing the IT security maintenance framework within any organization is provided. As a result, the primary goal of this study is to create a framework for IT infrastructure security maintenance. To attain the objectives, the study used a mixed-method technique in an explanatory sequential research. Firstly, an extensive literature review had been done. Then, the quantitative method begins with a descriptive study in order to determine components of the IT security maintenance framework. A total of 271 respondents were involved through a simple random sampling method to participate in the quantitative data collection. Likert structured type of closed questionnaire was distributed and the finding had been analyzed by using statistical analysis methods like Keiser-Meyer-and Bartlett’s Test. The suggested framework is validated using a qualitative method to ensure that it conforms to the current state of IT security infrastructure and is relevant to the targeted organization. Six experts in the disciplines of IT security and infrastructure participated in an in-depth semi-structured interview. Then, doing content and statistical analysis on the results of the findings. The results from this research managed to develop an IT security maintenance framework for IT infrastructure. (1) IT asset identification, (2) IT security breach identification, (3) IT security offensive protection, (4) IT security defensive protection, and (5) IT security objective protection are all part of the suggested framework. The proposed framework contributes to the field of IT security maintenance in the organization. The proposed framework provides awareness on knowing beforehand what to do and to what extent they are already conquering in the action of practical holistic information security management. Lastly, the proposed framework provides quality information for getting direction in the implementation of security maintenance for IT infrastructure.
format Thesis
author Firkhan Ali Hamid Ali
author_facet Firkhan Ali Hamid Ali
author_sort Firkhan Ali Hamid Ali
title Secured Information Technology Infrastructure Maintenance Framework
title_short Secured Information Technology Infrastructure Maintenance Framework
title_full Secured Information Technology Infrastructure Maintenance Framework
title_fullStr Secured Information Technology Infrastructure Maintenance Framework
title_full_unstemmed Secured Information Technology Infrastructure Maintenance Framework
title_sort secured information technology infrastructure maintenance framework
granting_institution Universiti Sains Islam Malaysia
url https://oarep.usim.edu.my/bitstreams/194ad792-283c-4c77-91ed-f8c751cabc9f/download
https://oarep.usim.edu.my/bitstreams/a40c6327-c593-4400-b818-123554de3435/download
https://oarep.usim.edu.my/bitstreams/48650c42-adc3-413b-95c1-0ce85b7fff54/download
https://oarep.usim.edu.my/bitstreams/9a4c2ff4-491c-472a-ad0f-2027e12fda57/download
https://oarep.usim.edu.my/bitstreams/1bf27a7e-f775-4105-826d-cc425f7898c4/download
https://oarep.usim.edu.my/bitstreams/ecf9432b-fa4e-4cd5-9145-028878afc5c4/download
https://oarep.usim.edu.my/bitstreams/c5fd847f-f777-43d9-a97b-5cb3fe470aaf/download
https://oarep.usim.edu.my/bitstreams/9ac905ff-4ac2-4dff-841f-fa525c9c9cce/download
https://oarep.usim.edu.my/bitstreams/5be2b462-97ea-4b54-b821-0b70a8eb83fa/download
_version_ 1812444741342593024
spelling my-usim-ddms-130892024-05-29T18:53:37Z Secured Information Technology Infrastructure Maintenance Framework Firkhan Ali Hamid Ali Security maintenance of information technology (IT) infrastructure has gained tremendous popularity in recent years according to the diversity of the types of organizations involved from a small company to the government. However, the requirements of flexibility, scalability, and inexpensive initial investment in the usage of IT infrastructure are eclipsed by security concerns that stymie adoption. The information technology infrastructure, in particular, is highly adaptable but complicated, and it has been vulnerable to a variety of security threats, ranging from simple issues such as incorrect configuration to an IT security incident. Then, most of the existing IT security maintenance frameworks had lack of implementation because of complexity, no standard of action, and just for gathering information only. Moreover, a limited scholarly investigation has been undertaken to present a need for properly defined steps of the process approach in which a structured way of managing the IT security maintenance framework within any organization is provided. As a result, the primary goal of this study is to create a framework for IT infrastructure security maintenance. To attain the objectives, the study used a mixed-method technique in an explanatory sequential research. Firstly, an extensive literature review had been done. Then, the quantitative method begins with a descriptive study in order to determine components of the IT security maintenance framework. A total of 271 respondents were involved through a simple random sampling method to participate in the quantitative data collection. Likert structured type of closed questionnaire was distributed and the finding had been analyzed by using statistical analysis methods like Keiser-Meyer-and Bartlett’s Test. The suggested framework is validated using a qualitative method to ensure that it conforms to the current state of IT security infrastructure and is relevant to the targeted organization. Six experts in the disciplines of IT security and infrastructure participated in an in-depth semi-structured interview. Then, doing content and statistical analysis on the results of the findings. The results from this research managed to develop an IT security maintenance framework for IT infrastructure. (1) IT asset identification, (2) IT security breach identification, (3) IT security offensive protection, (4) IT security defensive protection, and (5) IT security objective protection are all part of the suggested framework. The proposed framework contributes to the field of IT security maintenance in the organization. The proposed framework provides awareness on knowing beforehand what to do and to what extent they are already conquering in the action of practical holistic information security management. Lastly, the proposed framework provides quality information for getting direction in the implementation of security maintenance for IT infrastructure. Universiti Sains Islam Malaysia 2022-06 Thesis en_US https://oarep.usim.edu.my/handle/123456789/13089 https://oarep.usim.edu.my/bitstreams/84bb7d5e-4c58-448c-af5b-d07ef1018c07/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/194ad792-283c-4c77-91ed-f8c751cabc9f/download 99e7a2a44484af2bb65462361ee5540d https://oarep.usim.edu.my/bitstreams/a40c6327-c593-4400-b818-123554de3435/download e625d0c8ef4ea5602af215b262939f11 https://oarep.usim.edu.my/bitstreams/48650c42-adc3-413b-95c1-0ce85b7fff54/download a169692be13c032db247235b42e2b4d3 https://oarep.usim.edu.my/bitstreams/9a4c2ff4-491c-472a-ad0f-2027e12fda57/download 201286f35fa31cb72a6c7033b96d5c01 https://oarep.usim.edu.my/bitstreams/1bf27a7e-f775-4105-826d-cc425f7898c4/download 29cedffcf6ceed189cc32df21378380c https://oarep.usim.edu.my/bitstreams/ecf9432b-fa4e-4cd5-9145-028878afc5c4/download 8c6bfe8f768d9a92435c358ad35c68e2 https://oarep.usim.edu.my/bitstreams/c5fd847f-f777-43d9-a97b-5cb3fe470aaf/download d994b545d97b03d94cd77b1b577a6250 https://oarep.usim.edu.my/bitstreams/9ac905ff-4ac2-4dff-841f-fa525c9c9cce/download 7c02c583c806c12d65ef24f0191ed506 https://oarep.usim.edu.my/bitstreams/5be2b462-97ea-4b54-b821-0b70a8eb83fa/download 8ecb2c0683917669c48b6de5cd9aed98 https://oarep.usim.edu.my/bitstreams/9f53d898-d1e4-4ed8-912b-511a438536e8/download 68b329da9893e34099c7d8ad5cb9c940 https://oarep.usim.edu.my/bitstreams/bf70debb-bb95-41fb-ad3e-53fb279988d7/download a1a9e13091ccf19dd9d09cc397e04b40 https://oarep.usim.edu.my/bitstreams/ecc2a523-e848-4a48-b8c0-5466f1abfae8/download a1b6ec8facd3c54ffa2ce81d52709691 https://oarep.usim.edu.my/bitstreams/02261250-ea0b-408a-a63b-6c5355bd71ab/download 7514d18b83c3653f05e317011e1be41c https://oarep.usim.edu.my/bitstreams/096b6c74-2e96-4b36-bda9-3ba9894e0ae9/download b31d06eb34bb6b36b8808c217d31c59c https://oarep.usim.edu.my/bitstreams/1c93670e-648e-47dc-9bca-fbe9034a9a31/download 5fb41fc70feccc298bb50383a9e877ce https://oarep.usim.edu.my/bitstreams/5b82427b-cc93-4495-adea-d2abf6f3e5a1/download 63e38439c0970dce9fa1ca5d3cbbab9c https://oarep.usim.edu.my/bitstreams/6b8df5bf-736b-49b5-b10d-099f01bba4bd/download b1d6f719a36df54778c538d32c292f68 https://oarep.usim.edu.my/bitstreams/edf03e04-2cfe-40a9-a9a1-768728be7831/download bce68642012c2cf1626d26c83896edee Information technology--Security measures Computer security--Management. Information Technology Infrastructure