Access over 35 million academic & study documents

UITM Management of Information Security Reflective Case Study

Content type
User Generated
Subject
Business
School
MARA University of Technology Kelantan
Type
Case Study
Rating
Showing Page:
1/30
UNIVERSITI TEKNOLOGI MARA
CAWANGAN KELANTAN
MANAGEMENT OF INFORMATION SECURITY
(ASM655)
INDIVIDUAL PROJECT: REFLECTIVE CASE STUDY
GROUP NAME MEMBERS:
MUHAMAD FARHAKIM B. AWANG 2018437154
MUHAMMAD RIDHWAN B. RIPIN 2018674246
MUHAMMAD WAQIUDDIN B. RAMLI 2018226872
ZAMIR FIRDAUS B. MOHD ZAMANI 2018400412
PREPARED FOR:
MADAM INTAN NURUL 'AIN KOZAKO
CLASS:
D1BA2325C
SUBMISSION DATE:
1 JULY 2020

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/30
Table of Content
NO.
CONTENT
PAGE
1.
Introduction
1
2.
2.1 Computer security incident handling
2.2 Awareness and training
2.3 Security considerations in computer support and operations
2.4 Physical and environmental security
2.5 Identification and authentication
2.6 Logical access control
2.7 Audit trails
2.8 Cryptography
3
6
8
12
14
18
20
21
3.
Conclusions
23
4.
References
24
5.
Appendixes
26

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/30

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 30 pages?
Access Now
Unformatted Attachment Preview
UNIVERSITI TEKNOLOGI MARA CAWANGAN KELANTAN MANAGEMENT OF INFORMATION SECURITY (ASM655) INDIVIDUAL PROJECT: REFLECTIVE CASE STUDY GROUP NAME MEMBERS: MUHAMAD FARHAKIM B. AWANG 2018437154 MUHAMMAD RIDHWAN B. RIPIN 2018674246 MUHAMMAD WAQIUDDIN B. RAMLI 2018226872 ZAMIR FIRDAUS B. MOHD ZAMANI 2018400412 PREPARED FOR: MADAM INTAN NURUL 'AIN KOZAKO CLASS: D1BA2325C SUBMISSION DATE: 1 JULY 2020 Table of Content NO. CONTENT PAGE 1. Introduction 1 2. 2.1 Computer security incident handling 3 2.2 Awareness and training 6 2.3 Security considerations in computer support and operations 8 2.4 Physical and environmental security 12 2.5 Identification and authentication 14 2.6 Logical access control 18 2.7 Audit trails 20 2.8 Cryptography 21 3. Conclusions 23 4. References 24 5. Appendixes 26 ACKNOWLEDGMENTS Assalamualaikum, firstly we would like to express our special thanks of gratitude to Allah S.W.T for giving us strength till completion of this Group Project (Reflective Case Study) Report as one of the requirements for Management of Information Security (ASM655) subject. Secondly, our unlimited appreciation to our lecturer Madam Intan Nurul 'Ain Kozako who helped and assist us during this group project report preparation. All knowledge, advice, and encouragement from her really help us till the end. Because of her, we came to know about so many new things which I am thankful for. Several problems encountered during this project such a ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Goes above and beyond expectations!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents