SlideShare a Scribd company logo
WILLFRID DUIN 
MT1312358T
LAPORAN DAPATAN 
SOAL SELIDIK 
 
TAHAP KESEDARAN & 
PENGETAHUAN KESELAMATAN 
ICT DALAM KALANGAN GURU
LATAR BELAKANG 
 
 Lokasi – SMK Taun Gusi 
 Jumlah sampel – 50 orang
DEMOGRAFI 
(I)JANTINA 

(II) Year of service 

(III) Age 
 
*Note 
A-Below 30 
B-31 years – 40 years 
C-41 years and above
 
ANALISIS ITEM
1.Are you aware whether your institution 
has a formal, documented security 
policy? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
2.Have you read and 
understood the security 
 
policy? 
*Note 
A-Yes 
B-No
3. Has your institution documented in any way 
that you have read and understood the security 
policy? (e.g; a signed document) 
 
*Note 
A-Yes 
B-No 
C-I don’t know
4. Does your institution’s policy make it clear that 
you may be held accountable for your actions, in 
case your actions (or inactions) violate your 
institution’s IT security policies? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
5. Do the systems you use in your institution have automatic logoff 
and/or automatic lock capabilities to terminate a session or lock 
the application or device after a predetermined time of inactivity 
(e.g. screensaver lock)? 
 
*Note 
A-Yes, always 
B-I don’t know 
C-No, never
6. Does your institution require you to use a 
password(s) to access all your user/system 
accounts? 
 
A-Yes 
B-Hard to say, maybe 
C-No
7.How is a password change 
requested? 
 
*Note 
A- Often, 1-2 times per month 
B- The system automatically request users to 
change their passwords once every 
predetermined period of time 
C- The system enforce users to use strong 
password
8. Regarding Antivirus / Antispyware protection, are the systems that 
you use (either personal, of your institutions) protected by an antivirus 
/ anti-spyware software package(s) protecting each desktop and laptop 
 
*Note 
A-Yes 
B-No 
C-I do not know
9. Are the systems you use protected from virus infections 
that arrive via Instant Messaging clients? (ex.: 
MSN/Windows Live Messenger, Yahoo! Messenger, 
Google Talk etc)? 
 
*Note 
A-Yes 
B-No 
C-I do not know
10. Are the systems you use in your institution 
protected by a firewall? Do you use a personal 
firewall for your personal system(s) as well? 
 
*Note 
A-Yes, the system I use is protected by a firewall and I 
am using a personal firewall for my personal system(s) as 
well. 
B-Yes, the system I use is protected by a firewall, but I am 
not using a personal firewall for my persona system(s) 
C-No, The system I use is protected by a firewall and I 
am not using a personal firewall for my personal 
system(s) 
D-I do not know.
11. If the systems you use in your institution provide you 
this option, do you understand when to block and when 
not to block alerts of applications trying to access sensitive 
resources (e.g.: alerts from Microsoft Windows or similar 
 
software firewall)? 
*Note 
A-Yes, I understand when to block and when not to 
block alerts, also I understand how to do this in your 
personal system. 
B-Yes, I understand when to block and when not to 
block. 
C-I do not care.
12. When a member of your personnel leaves the 
company (or when work/task contract of an 
outside entity ends), does your school ensure that; 
 
*Note 
A. Yes 
B. No 
C. My school did not formalize a policy for such 
cases 
D. I do not know
13. Has your institution implemented procedures to control 
and validate a person’s access to facilities based on their 
role or function, including visitor control and control of 
access to software programs for testing and revision? 
 
*Note 
A-Yes 
B-No 
C-I do not know
14. Are you aware whether unnecessary 
services are running on your school’s 
systems? 
 
*Note 
A-Yes 
B-No 
C-I do not know
15. What services does your school you 
expose to the internet? 
 
*Note 
A-Web 
B-Database 
C-FTP 
D-SSH 
E-Other
16. Does your institution perform 
backups of computer systems and 
data? 
 
*Note 
A-Yes, often (everyday) 
B-Yes, but not so often (once per 
month) 
C-I do not care 
D-I do not know 
E-Other
17. On what medium do you think the 
backup should be stored for maximum 
security? 
 
*Note 
A-Tape backups 
B-CDs 
C-External hard drives 
D-Networked backed up system
18. What do you think is the biggest risk for 
IT security? 
 
*Note 
A-Users 
B-Computers 
C-Network 
D-Unknown

More Related Content

What's hot

Pembelajaran Masteri
Pembelajaran MasteriPembelajaran Masteri
Pembelajaran Masteri
SabreenaKamal
 
Teori – teori motivasi
Teori – teori motivasiTeori – teori motivasi
Teori – teori motivasi
Ida Hasniza
 
Kejutan budaya
Kejutan budayaKejutan budaya
Kejutan budaya
eyyub91
 
1 present bola tampar
1 present bola tampar1 present bola tampar
1 present bola tampar
Noor Fariza AR
 
budaya dalam pembelajaran
budaya dalam pembelajaranbudaya dalam pembelajaran
budaya dalam pembelajaranNur Fateha
 
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisLampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Teacher Nasrah
 
Pendemokrasian Pendidikan
Pendemokrasian PendidikanPendemokrasian Pendidikan
Pendemokrasian Pendidikan
Rosnaliza07
 
Model penilaian cipp
Model penilaian cippModel penilaian cipp
Model penilaian cipp
Sumitra Kan
 
Latihan pendidikan seni visual
Latihan pendidikan seni visualLatihan pendidikan seni visual
Latihan pendidikan seni visual
annaliew
 
Kemahiran sumber pengajaran dan pembelajaran
Kemahiran sumber pengajaran dan pembelajaranKemahiran sumber pengajaran dan pembelajaran
Kemahiran sumber pengajaran dan pembelajaran
Pak Yob
 
Profesionalisme guru
Profesionalisme guru Profesionalisme guru
Profesionalisme guru
Azizi Ahmad
 
Analisis swot
Analisis swotAnalisis swot
Analisis swot
dissman
 
Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...
Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...
Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...Rosdi Ramli
 
Kerangka konseptual kajian
Kerangka konseptual kajianKerangka konseptual kajian
Kerangka konseptual kajian
airenahmad
 
PEMBELAJARAN BERASASKAN INKUIRI
PEMBELAJARAN BERASASKAN INKUIRIPEMBELAJARAN BERASASKAN INKUIRI
PEMBELAJARAN BERASASKAN INKUIRI
Aiisy Afifah
 
Panduan Penulisan Objektif PJ
Panduan Penulisan Objektif PJPanduan Penulisan Objektif PJ
Panduan Penulisan Objektif PJ
Wan Suhaimi Wan Setapa
 
Kaedah penyelidikan-etnografi
Kaedah penyelidikan-etnografiKaedah penyelidikan-etnografi
Kaedah penyelidikan-etnografi
wmkfirdaus
 
Inovasi dalam pengajaran dan pembelajaran
Inovasi dalam pengajaran dan pembelajaranInovasi dalam pengajaran dan pembelajaran
Inovasi dalam pengajaran dan pembelajaran
Syahrul Nizam Junaini
 

What's hot (20)

Pembelajaran Masteri
Pembelajaran MasteriPembelajaran Masteri
Pembelajaran Masteri
 
Teori – teori motivasi
Teori – teori motivasiTeori – teori motivasi
Teori – teori motivasi
 
Kejutan budaya
Kejutan budayaKejutan budaya
Kejutan budaya
 
1 present bola tampar
1 present bola tampar1 present bola tampar
1 present bola tampar
 
budaya dalam pembelajaran
budaya dalam pembelajaranbudaya dalam pembelajaran
budaya dalam pembelajaran
 
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisLampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
 
Pendemokrasian Pendidikan
Pendemokrasian PendidikanPendemokrasian Pendidikan
Pendemokrasian Pendidikan
 
Model penilaian cipp
Model penilaian cippModel penilaian cipp
Model penilaian cipp
 
Proposal bab 2
Proposal bab 2Proposal bab 2
Proposal bab 2
 
Latihan pendidikan seni visual
Latihan pendidikan seni visualLatihan pendidikan seni visual
Latihan pendidikan seni visual
 
Gaya pembelajaran
Gaya pembelajaran Gaya pembelajaran
Gaya pembelajaran
 
Kemahiran sumber pengajaran dan pembelajaran
Kemahiran sumber pengajaran dan pembelajaranKemahiran sumber pengajaran dan pembelajaran
Kemahiran sumber pengajaran dan pembelajaran
 
Profesionalisme guru
Profesionalisme guru Profesionalisme guru
Profesionalisme guru
 
Analisis swot
Analisis swotAnalisis swot
Analisis swot
 
Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...
Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...
Pengurusan Pembelajaran ( Tajuk : Kajian Tindakan mengenai disiplin pelajar s...
 
Kerangka konseptual kajian
Kerangka konseptual kajianKerangka konseptual kajian
Kerangka konseptual kajian
 
PEMBELAJARAN BERASASKAN INKUIRI
PEMBELAJARAN BERASASKAN INKUIRIPEMBELAJARAN BERASASKAN INKUIRI
PEMBELAJARAN BERASASKAN INKUIRI
 
Panduan Penulisan Objektif PJ
Panduan Penulisan Objektif PJPanduan Penulisan Objektif PJ
Panduan Penulisan Objektif PJ
 
Kaedah penyelidikan-etnografi
Kaedah penyelidikan-etnografiKaedah penyelidikan-etnografi
Kaedah penyelidikan-etnografi
 
Inovasi dalam pengajaran dan pembelajaran
Inovasi dalam pengajaran dan pembelajaranInovasi dalam pengajaran dan pembelajaran
Inovasi dalam pengajaran dan pembelajaran
 

Viewers also liked

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
Rosnani Ghazali
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikNoor Abidin
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Nuraini Ismail
 
Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajian
Chon Seong Hoo
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikZainal Mohd
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUcikgusuepkhas
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
skullverine
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textRio Rifani
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklh
umimadihah
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaire
SMK NARINANG
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tampar
Hidayatul Hairani
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksb
syidut_77
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projek
izazihazirah
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan
Berry Adam
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringan
velisya NT
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hup
dannysulimin
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahHusniyah Rashid
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikayottoya
 
Penyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiPenyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadi
Mohd Saufi
 

Viewers also liked (20)

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
 
Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajian
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & text
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklh
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaire
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tampar
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksb
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projek
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringan
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hup
 
Rubrik
RubrikRubrik
Rubrik
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor Husniyah
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistik
 
Penyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiPenyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadi
 

Similar to Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
Priyanka Aash
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
infosec train
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
JohnRicos
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
hccit
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Mahdi_Fahmideh
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
Deepak Solanki
 
lect01--intro.pdf
lect01--intro.pdflect01--intro.pdf
lect01--intro.pdf
Andy Sutherland
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
mattjtoni51554
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
Slick Cyber Systems
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
SMKCreations
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device Security
Witekio
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
DavisMurphyA97
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
James Grew
 

Similar to Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru (20)

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Information security management
Information security managementInformation security management
Information security management
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
 
lect01--intro.pdf
lect01--intro.pdflect01--intro.pdf
lect01--intro.pdf
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device Security
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
 

Recently uploaded

How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru

  • 2. LAPORAN DAPATAN SOAL SELIDIK  TAHAP KESEDARAN & PENGETAHUAN KESELAMATAN ICT DALAM KALANGAN GURU
  • 3. LATAR BELAKANG   Lokasi – SMK Taun Gusi  Jumlah sampel – 50 orang
  • 5. (II) Year of service 
  • 6. (III) Age  *Note A-Below 30 B-31 years – 40 years C-41 years and above
  • 8. 1.Are you aware whether your institution has a formal, documented security policy?  *Note A-Yes B-No C-I don’t know
  • 9. 2.Have you read and understood the security  policy? *Note A-Yes B-No
  • 10. 3. Has your institution documented in any way that you have read and understood the security policy? (e.g; a signed document)  *Note A-Yes B-No C-I don’t know
  • 11. 4. Does your institution’s policy make it clear that you may be held accountable for your actions, in case your actions (or inactions) violate your institution’s IT security policies?  *Note A-Yes B-No C-I don’t know
  • 12. 5. Do the systems you use in your institution have automatic logoff and/or automatic lock capabilities to terminate a session or lock the application or device after a predetermined time of inactivity (e.g. screensaver lock)?  *Note A-Yes, always B-I don’t know C-No, never
  • 13. 6. Does your institution require you to use a password(s) to access all your user/system accounts?  A-Yes B-Hard to say, maybe C-No
  • 14. 7.How is a password change requested?  *Note A- Often, 1-2 times per month B- The system automatically request users to change their passwords once every predetermined period of time C- The system enforce users to use strong password
  • 15. 8. Regarding Antivirus / Antispyware protection, are the systems that you use (either personal, of your institutions) protected by an antivirus / anti-spyware software package(s) protecting each desktop and laptop  *Note A-Yes B-No C-I do not know
  • 16. 9. Are the systems you use protected from virus infections that arrive via Instant Messaging clients? (ex.: MSN/Windows Live Messenger, Yahoo! Messenger, Google Talk etc)?  *Note A-Yes B-No C-I do not know
  • 17. 10. Are the systems you use in your institution protected by a firewall? Do you use a personal firewall for your personal system(s) as well?  *Note A-Yes, the system I use is protected by a firewall and I am using a personal firewall for my personal system(s) as well. B-Yes, the system I use is protected by a firewall, but I am not using a personal firewall for my persona system(s) C-No, The system I use is protected by a firewall and I am not using a personal firewall for my personal system(s) D-I do not know.
  • 18. 11. If the systems you use in your institution provide you this option, do you understand when to block and when not to block alerts of applications trying to access sensitive resources (e.g.: alerts from Microsoft Windows or similar  software firewall)? *Note A-Yes, I understand when to block and when not to block alerts, also I understand how to do this in your personal system. B-Yes, I understand when to block and when not to block. C-I do not care.
  • 19. 12. When a member of your personnel leaves the company (or when work/task contract of an outside entity ends), does your school ensure that;  *Note A. Yes B. No C. My school did not formalize a policy for such cases D. I do not know
  • 20. 13. Has your institution implemented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision?  *Note A-Yes B-No C-I do not know
  • 21. 14. Are you aware whether unnecessary services are running on your school’s systems?  *Note A-Yes B-No C-I do not know
  • 22. 15. What services does your school you expose to the internet?  *Note A-Web B-Database C-FTP D-SSH E-Other
  • 23. 16. Does your institution perform backups of computer systems and data?  *Note A-Yes, often (everyday) B-Yes, but not so often (once per month) C-I do not care D-I do not know E-Other
  • 24. 17. On what medium do you think the backup should be stored for maximum security?  *Note A-Tape backups B-CDs C-External hard drives D-Networked backed up system
  • 25. 18. What do you think is the biggest risk for IT security?  *Note A-Users B-Computers C-Network D-Unknown