SlideShare a Scribd company logo
1 of 25
WILLFRID DUIN 
MT1312358T
LAPORAN DAPATAN 
SOAL SELIDIK 
 
TAHAP KESEDARAN & 
PENGETAHUAN KESELAMATAN 
ICT DALAM KALANGAN GURU
LATAR BELAKANG 
 
 Lokasi – SMK Taun Gusi 
 Jumlah sampel – 50 orang
DEMOGRAFI 
(I)JANTINA 

(II) Year of service 

(III) Age 
 
*Note 
A-Below 30 
B-31 years – 40 years 
C-41 years and above
 
ANALISIS ITEM
1.Are you aware whether your institution 
has a formal, documented security 
policy? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
2.Have you read and 
understood the security 
 
policy? 
*Note 
A-Yes 
B-No
3. Has your institution documented in any way 
that you have read and understood the security 
policy? (e.g; a signed document) 
 
*Note 
A-Yes 
B-No 
C-I don’t know
4. Does your institution’s policy make it clear that 
you may be held accountable for your actions, in 
case your actions (or inactions) violate your 
institution’s IT security policies? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
5. Do the systems you use in your institution have automatic logoff 
and/or automatic lock capabilities to terminate a session or lock 
the application or device after a predetermined time of inactivity 
(e.g. screensaver lock)? 
 
*Note 
A-Yes, always 
B-I don’t know 
C-No, never
6. Does your institution require you to use a 
password(s) to access all your user/system 
accounts? 
 
A-Yes 
B-Hard to say, maybe 
C-No
7.How is a password change 
requested? 
 
*Note 
A- Often, 1-2 times per month 
B- The system automatically request users to 
change their passwords once every 
predetermined period of time 
C- The system enforce users to use strong 
password
8. Regarding Antivirus / Antispyware protection, are the systems that 
you use (either personal, of your institutions) protected by an antivirus 
/ anti-spyware software package(s) protecting each desktop and laptop 
 
*Note 
A-Yes 
B-No 
C-I do not know
9. Are the systems you use protected from virus infections 
that arrive via Instant Messaging clients? (ex.: 
MSN/Windows Live Messenger, Yahoo! Messenger, 
Google Talk etc)? 
 
*Note 
A-Yes 
B-No 
C-I do not know
10. Are the systems you use in your institution 
protected by a firewall? Do you use a personal 
firewall for your personal system(s) as well? 
 
*Note 
A-Yes, the system I use is protected by a firewall and I 
am using a personal firewall for my personal system(s) as 
well. 
B-Yes, the system I use is protected by a firewall, but I am 
not using a personal firewall for my persona system(s) 
C-No, The system I use is protected by a firewall and I 
am not using a personal firewall for my personal 
system(s) 
D-I do not know.
11. If the systems you use in your institution provide you 
this option, do you understand when to block and when 
not to block alerts of applications trying to access sensitive 
resources (e.g.: alerts from Microsoft Windows or similar 
 
software firewall)? 
*Note 
A-Yes, I understand when to block and when not to 
block alerts, also I understand how to do this in your 
personal system. 
B-Yes, I understand when to block and when not to 
block. 
C-I do not care.
12. When a member of your personnel leaves the 
company (or when work/task contract of an 
outside entity ends), does your school ensure that; 
 
*Note 
A. Yes 
B. No 
C. My school did not formalize a policy for such 
cases 
D. I do not know
13. Has your institution implemented procedures to control 
and validate a person’s access to facilities based on their 
role or function, including visitor control and control of 
access to software programs for testing and revision? 
 
*Note 
A-Yes 
B-No 
C-I do not know
14. Are you aware whether unnecessary 
services are running on your school’s 
systems? 
 
*Note 
A-Yes 
B-No 
C-I do not know
15. What services does your school you 
expose to the internet? 
 
*Note 
A-Web 
B-Database 
C-FTP 
D-SSH 
E-Other
16. Does your institution perform 
backups of computer systems and 
data? 
 
*Note 
A-Yes, often (everyday) 
B-Yes, but not so often (once per 
month) 
C-I do not care 
D-I do not know 
E-Other
17. On what medium do you think the 
backup should be stored for maximum 
security? 
 
*Note 
A-Tape backups 
B-CDs 
C-External hard drives 
D-Networked backed up system
18. What do you think is the biggest risk for 
IT security? 
 
*Note 
A-Users 
B-Computers 
C-Network 
D-Unknown

More Related Content

What's hot

Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajianChon Seong Hoo
 
Presentation pbs
Presentation pbsPresentation pbs
Presentation pbsmamaradin
 
1. konsep pengukuran dan skala pengukuran
1. konsep pengukuran dan skala pengukuran1. konsep pengukuran dan skala pengukuran
1. konsep pengukuran dan skala pengukuranmadiah jaafar
 
Kaedah dan teknik pengajaran masa kini
Kaedah dan teknik pengajaran masa kiniKaedah dan teknik pengajaran masa kini
Kaedah dan teknik pengajaran masa kiniNur Syazwani
 
Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)
Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)
Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)Fatimah Shukur
 
Pendidikan Inklusif
Pendidikan InklusifPendidikan Inklusif
Pendidikan InklusifVince Here
 
Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)
Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)
Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)ikhwankmk92
 
Huraian sukatan pelajaran
Huraian sukatan pelajaranHuraian sukatan pelajaran
Huraian sukatan pelajarannurul amyeza
 
Penggunaan teknologi dalam pengajaran dan pembelajaran
Penggunaan teknologi dalam pengajaran dan pembelajaranPenggunaan teknologi dalam pengajaran dan pembelajaran
Penggunaan teknologi dalam pengajaran dan pembelajaranMuhammad Affrini Azim Zahari
 
PBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan Kajian
PBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan KajianPBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan Kajian
PBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan KajianNur Farahin Samsudin
 
Pengajaran pembelajaran matematik dan teknologi
Pengajaran pembelajaran matematik dan teknologiPengajaran pembelajaran matematik dan teknologi
Pengajaran pembelajaran matematik dan teknologiTee Teh
 
Pembangunan Lestari Pengertian Dan Pengukur
Pembangunan Lestari Pengertian Dan PengukurPembangunan Lestari Pengertian Dan Pengukur
Pembangunan Lestari Pengertian Dan Pengukurmandalina landy
 
Falsafah pendidikan barat
Falsafah pendidikan baratFalsafah pendidikan barat
Falsafah pendidikan baratsyafiq hussin
 
Aplikasi Ict Dalam PnP
Aplikasi Ict Dalam PnPAplikasi Ict Dalam PnP
Aplikasi Ict Dalam PnPAzmi Sulaiman
 
Kajian kualitatif analisis kandungan
Kajian kualitatif   analisis kandunganKajian kualitatif   analisis kandungan
Kajian kualitatif analisis kandunganSivabala Naidu
 
3 saluran komunikasi berkesan
3 saluran komunikasi berkesan3 saluran komunikasi berkesan
3 saluran komunikasi berkesanIsmail Hashim
 
Gejala sosial
Gejala sosialGejala sosial
Gejala sosialZRxhman
 
ICT & MULTIMEDIA P&P/ICT IN EDUCATION
ICT & MULTIMEDIA P&P/ICT IN EDUCATIONICT & MULTIMEDIA P&P/ICT IN EDUCATION
ICT & MULTIMEDIA P&P/ICT IN EDUCATIONEddy Terinisip
 

What's hot (20)

Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajian
 
Presentation pbs
Presentation pbsPresentation pbs
Presentation pbs
 
1. konsep pengukuran dan skala pengukuran
1. konsep pengukuran dan skala pengukuran1. konsep pengukuran dan skala pengukuran
1. konsep pengukuran dan skala pengukuran
 
Kaedah dan teknik pengajaran masa kini
Kaedah dan teknik pengajaran masa kiniKaedah dan teknik pengajaran masa kini
Kaedah dan teknik pengajaran masa kini
 
Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)
Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)
Tugasan KPD 3016: PENGAJARAN, TEKNOLOGI & PENAKSIRAN 1 (TAJUK : PORTFOLIO)
 
Pendidikan Inklusif
Pendidikan InklusifPendidikan Inklusif
Pendidikan Inklusif
 
Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)
Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)
Isu Yang Berkaitan Dengan Kemahiran Berfikir Aras Tinggi (KBAT)
 
Model sosial
Model sosialModel sosial
Model sosial
 
Huraian sukatan pelajaran
Huraian sukatan pelajaranHuraian sukatan pelajaran
Huraian sukatan pelajaran
 
Penggunaan teknologi dalam pengajaran dan pembelajaran
Penggunaan teknologi dalam pengajaran dan pembelajaranPenggunaan teknologi dalam pengajaran dan pembelajaran
Penggunaan teknologi dalam pengajaran dan pembelajaran
 
Kajian Tindakan Bahasa Melayu
Kajian Tindakan Bahasa MelayuKajian Tindakan Bahasa Melayu
Kajian Tindakan Bahasa Melayu
 
PBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan Kajian
PBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan KajianPBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan Kajian
PBS STPM Contoh Soal Selidik dan Penyusunan Data Dapatan Kajian
 
Pengajaran pembelajaran matematik dan teknologi
Pengajaran pembelajaran matematik dan teknologiPengajaran pembelajaran matematik dan teknologi
Pengajaran pembelajaran matematik dan teknologi
 
Pembangunan Lestari Pengertian Dan Pengukur
Pembangunan Lestari Pengertian Dan PengukurPembangunan Lestari Pengertian Dan Pengukur
Pembangunan Lestari Pengertian Dan Pengukur
 
Falsafah pendidikan barat
Falsafah pendidikan baratFalsafah pendidikan barat
Falsafah pendidikan barat
 
Aplikasi Ict Dalam PnP
Aplikasi Ict Dalam PnPAplikasi Ict Dalam PnP
Aplikasi Ict Dalam PnP
 
Kajian kualitatif analisis kandungan
Kajian kualitatif   analisis kandunganKajian kualitatif   analisis kandungan
Kajian kualitatif analisis kandungan
 
3 saluran komunikasi berkesan
3 saluran komunikasi berkesan3 saluran komunikasi berkesan
3 saluran komunikasi berkesan
 
Gejala sosial
Gejala sosialGejala sosial
Gejala sosial
 
ICT & MULTIMEDIA P&P/ICT IN EDUCATION
ICT & MULTIMEDIA P&P/ICT IN EDUCATIONICT & MULTIMEDIA P&P/ICT IN EDUCATION
ICT & MULTIMEDIA P&P/ICT IN EDUCATION
 

Viewers also liked

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikNoor Abidin
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMNuraini Ismail
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikZainal Mohd
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUcikgusuepkhas
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICTskullverine
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textRio Rifani
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklhumimadihah
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaireSMK NARINANG
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparHidayatul Hairani
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksbsyidut_77
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projekizazihazirah
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Berry Adam
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanvelisya NT
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupdannysulimin
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahHusniyah Rashid
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikayottoya
 
Penyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiPenyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiMohd Saufi
 
Bab 7 alat penilaian
Bab 7 alat penilaianBab 7 alat penilaian
Bab 7 alat penilaianDURGA DEVI
 

Viewers also liked (20)

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & text
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklh
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaire
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tampar
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksb
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projek
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringan
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hup
 
Rubrik
RubrikRubrik
Rubrik
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor Husniyah
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistik
 
Penyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiPenyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadi
 
Bab 7 alat penilaian
Bab 7 alat penilaianBab 7 alat penilaian
Bab 7 alat penilaian
 

Similar to SMK Taun Gusi teacher cybersecurity survey findings

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnairePriyanka Aash
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfJohnRicos
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
6 computer systems
6 computer systems6 computer systems
6 computer systemshccit
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY Deepak Solanki
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device SecurityWitekio
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.comDavisMurphyA97
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015James Grew
 

Similar to SMK Taun Gusi teacher cybersecurity survey findings (20)

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Information security management
Information security managementInformation security management
Information security management
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
 
lect01--intro.pdf
lect01--intro.pdflect01--intro.pdf
lect01--intro.pdf
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device Security
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

SMK Taun Gusi teacher cybersecurity survey findings

  • 2. LAPORAN DAPATAN SOAL SELIDIK  TAHAP KESEDARAN & PENGETAHUAN KESELAMATAN ICT DALAM KALANGAN GURU
  • 3. LATAR BELAKANG   Lokasi – SMK Taun Gusi  Jumlah sampel – 50 orang
  • 5. (II) Year of service 
  • 6. (III) Age  *Note A-Below 30 B-31 years – 40 years C-41 years and above
  • 8. 1.Are you aware whether your institution has a formal, documented security policy?  *Note A-Yes B-No C-I don’t know
  • 9. 2.Have you read and understood the security  policy? *Note A-Yes B-No
  • 10. 3. Has your institution documented in any way that you have read and understood the security policy? (e.g; a signed document)  *Note A-Yes B-No C-I don’t know
  • 11. 4. Does your institution’s policy make it clear that you may be held accountable for your actions, in case your actions (or inactions) violate your institution’s IT security policies?  *Note A-Yes B-No C-I don’t know
  • 12. 5. Do the systems you use in your institution have automatic logoff and/or automatic lock capabilities to terminate a session or lock the application or device after a predetermined time of inactivity (e.g. screensaver lock)?  *Note A-Yes, always B-I don’t know C-No, never
  • 13. 6. Does your institution require you to use a password(s) to access all your user/system accounts?  A-Yes B-Hard to say, maybe C-No
  • 14. 7.How is a password change requested?  *Note A- Often, 1-2 times per month B- The system automatically request users to change their passwords once every predetermined period of time C- The system enforce users to use strong password
  • 15. 8. Regarding Antivirus / Antispyware protection, are the systems that you use (either personal, of your institutions) protected by an antivirus / anti-spyware software package(s) protecting each desktop and laptop  *Note A-Yes B-No C-I do not know
  • 16. 9. Are the systems you use protected from virus infections that arrive via Instant Messaging clients? (ex.: MSN/Windows Live Messenger, Yahoo! Messenger, Google Talk etc)?  *Note A-Yes B-No C-I do not know
  • 17. 10. Are the systems you use in your institution protected by a firewall? Do you use a personal firewall for your personal system(s) as well?  *Note A-Yes, the system I use is protected by a firewall and I am using a personal firewall for my personal system(s) as well. B-Yes, the system I use is protected by a firewall, but I am not using a personal firewall for my persona system(s) C-No, The system I use is protected by a firewall and I am not using a personal firewall for my personal system(s) D-I do not know.
  • 18. 11. If the systems you use in your institution provide you this option, do you understand when to block and when not to block alerts of applications trying to access sensitive resources (e.g.: alerts from Microsoft Windows or similar  software firewall)? *Note A-Yes, I understand when to block and when not to block alerts, also I understand how to do this in your personal system. B-Yes, I understand when to block and when not to block. C-I do not care.
  • 19. 12. When a member of your personnel leaves the company (or when work/task contract of an outside entity ends), does your school ensure that;  *Note A. Yes B. No C. My school did not formalize a policy for such cases D. I do not know
  • 20. 13. Has your institution implemented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision?  *Note A-Yes B-No C-I do not know
  • 21. 14. Are you aware whether unnecessary services are running on your school’s systems?  *Note A-Yes B-No C-I do not know
  • 22. 15. What services does your school you expose to the internet?  *Note A-Web B-Database C-FTP D-SSH E-Other
  • 23. 16. Does your institution perform backups of computer systems and data?  *Note A-Yes, often (everyday) B-Yes, but not so often (once per month) C-I do not care D-I do not know E-Other
  • 24. 17. On what medium do you think the backup should be stored for maximum security?  *Note A-Tape backups B-CDs C-External hard drives D-Networked backed up system
  • 25. 18. What do you think is the biggest risk for IT security?  *Note A-Users B-Computers C-Network D-Unknown