SlideShare a Scribd company logo
1 of 25
WILLFRID DUIN 
MT1312358T
LAPORAN DAPATAN 
SOAL SELIDIK 
 
TAHAP KESEDARAN & 
PENGETAHUAN KESELAMATAN 
ICT DALAM KALANGAN GURU
LATAR BELAKANG 
 
 Lokasi – SMK Taun Gusi 
 Jumlah sampel – 50 orang
DEMOGRAFI 
(I)JANTINA 

(II) Year of service 

(III) Age 
 
*Note 
A-Below 30 
B-31 years – 40 years 
C-41 years and above
 
ANALISIS ITEM
1.Are you aware whether your institution 
has a formal, documented security 
policy? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
2.Have you read and 
understood the security 
 
policy? 
*Note 
A-Yes 
B-No
3. Has your institution documented in any way 
that you have read and understood the security 
policy? (e.g; a signed document) 
 
*Note 
A-Yes 
B-No 
C-I don’t know
4. Does your institution’s policy make it clear that 
you may be held accountable for your actions, in 
case your actions (or inactions) violate your 
institution’s IT security policies? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
5. Do the systems you use in your institution have automatic logoff 
and/or automatic lock capabilities to terminate a session or lock 
the application or device after a predetermined time of inactivity 
(e.g. screensaver lock)? 
 
*Note 
A-Yes, always 
B-I don’t know 
C-No, never
6. Does your institution require you to use a 
password(s) to access all your user/system 
accounts? 
 
A-Yes 
B-Hard to say, maybe 
C-No
7.How is a password change 
requested? 
 
*Note 
A- Often, 1-2 times per month 
B- The system automatically request users to 
change their passwords once every 
predetermined period of time 
C- The system enforce users to use strong 
password
8. Regarding Antivirus / Antispyware protection, are the systems that 
you use (either personal, of your institutions) protected by an antivirus 
/ anti-spyware software package(s) protecting each desktop and laptop 
 
*Note 
A-Yes 
B-No 
C-I do not know
9. Are the systems you use protected from virus infections 
that arrive via Instant Messaging clients? (ex.: 
MSN/Windows Live Messenger, Yahoo! Messenger, 
Google Talk etc)? 
 
*Note 
A-Yes 
B-No 
C-I do not know
10. Are the systems you use in your institution 
protected by a firewall? Do you use a personal 
firewall for your personal system(s) as well? 
 
*Note 
A-Yes, the system I use is protected by a firewall and I 
am using a personal firewall for my personal system(s) as 
well. 
B-Yes, the system I use is protected by a firewall, but I am 
not using a personal firewall for my persona system(s) 
C-No, The system I use is protected by a firewall and I 
am not using a personal firewall for my personal 
system(s) 
D-I do not know.
11. If the systems you use in your institution provide you 
this option, do you understand when to block and when 
not to block alerts of applications trying to access sensitive 
resources (e.g.: alerts from Microsoft Windows or similar 
 
software firewall)? 
*Note 
A-Yes, I understand when to block and when not to 
block alerts, also I understand how to do this in your 
personal system. 
B-Yes, I understand when to block and when not to 
block. 
C-I do not care.
12. When a member of your personnel leaves the 
company (or when work/task contract of an 
outside entity ends), does your school ensure that; 
 
*Note 
A. Yes 
B. No 
C. My school did not formalize a policy for such 
cases 
D. I do not know
13. Has your institution implemented procedures to control 
and validate a person’s access to facilities based on their 
role or function, including visitor control and control of 
access to software programs for testing and revision? 
 
*Note 
A-Yes 
B-No 
C-I do not know
14. Are you aware whether unnecessary 
services are running on your school’s 
systems? 
 
*Note 
A-Yes 
B-No 
C-I do not know
15. What services does your school you 
expose to the internet? 
 
*Note 
A-Web 
B-Database 
C-FTP 
D-SSH 
E-Other
16. Does your institution perform 
backups of computer systems and 
data? 
 
*Note 
A-Yes, often (everyday) 
B-Yes, but not so often (once per 
month) 
C-I do not care 
D-I do not know 
E-Other
17. On what medium do you think the 
backup should be stored for maximum 
security? 
 
*Note 
A-Tape backups 
B-CDs 
C-External hard drives 
D-Networked backed up system
18. What do you think is the biggest risk for 
IT security? 
 
*Note 
A-Users 
B-Computers 
C-Network 
D-Unknown

More Related Content

What's hot

Pengurusan Sumber Digital Dalam P&P
Pengurusan Sumber Digital Dalam P&PPengurusan Sumber Digital Dalam P&P
Pengurusan Sumber Digital Dalam P&P
Fadzliaton Zainudin
 
Pembentukan persekitaran pembelajaran yang kondusif
Pembentukan persekitaran pembelajaran yang kondusifPembentukan persekitaran pembelajaran yang kondusif
Pembentukan persekitaran pembelajaran yang kondusif
awin awin
 
Dasar pendidikan terbuka
Dasar pendidikan terbukaDasar pendidikan terbuka
Dasar pendidikan terbuka
Azurah Razak
 
Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...
Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...
Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...
محمد أشرف زين الدين
 
PERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARA
PERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARAPERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARA
PERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARA
Wan Nor Faezah
 

What's hot (20)

Cadangan penambahbaikan
Cadangan penambahbaikanCadangan penambahbaikan
Cadangan penambahbaikan
 
Proses pembelajaran
Proses pembelajaranProses pembelajaran
Proses pembelajaran
 
Pengurusan Sumber Digital Dalam P&P
Pengurusan Sumber Digital Dalam P&PPengurusan Sumber Digital Dalam P&P
Pengurusan Sumber Digital Dalam P&P
 
EDUP3033 Murid dan Pembelajaran (Strategi pengajaran berpusatan guru, berpusa...
EDUP3033 Murid dan Pembelajaran (Strategi pengajaran berpusatan guru, berpusa...EDUP3033 Murid dan Pembelajaran (Strategi pengajaran berpusatan guru, berpusa...
EDUP3033 Murid dan Pembelajaran (Strategi pengajaran berpusatan guru, berpusa...
 
Pentaksiran dalam pembelajaran matematik awal kanak kanak
Pentaksiran dalam pembelajaran matematik awal kanak kanakPentaksiran dalam pembelajaran matematik awal kanak kanak
Pentaksiran dalam pembelajaran matematik awal kanak kanak
 
Pembentukan persekitaran pembelajaran yang kondusif
Pembentukan persekitaran pembelajaran yang kondusifPembentukan persekitaran pembelajaran yang kondusif
Pembentukan persekitaran pembelajaran yang kondusif
 
Dasar pendidikan terbuka
Dasar pendidikan terbukaDasar pendidikan terbuka
Dasar pendidikan terbuka
 
Implikasi kepelbagai-sosio-budaya-dalam-bilik-darjah
Implikasi kepelbagai-sosio-budaya-dalam-bilik-darjahImplikasi kepelbagai-sosio-budaya-dalam-bilik-darjah
Implikasi kepelbagai-sosio-budaya-dalam-bilik-darjah
 
Teori pembelajaran
Teori pembelajaranTeori pembelajaran
Teori pembelajaran
 
Budaya sekolah
Budaya sekolahBudaya sekolah
Budaya sekolah
 
contoh rph
contoh rphcontoh rph
contoh rph
 
STANDARD 5 - KEMENJADIAN MURID (Standard Kualiti Pendidikan Malaysia Gelomban...
STANDARD 5 - KEMENJADIAN MURID (Standard Kualiti Pendidikan Malaysia Gelomban...STANDARD 5 - KEMENJADIAN MURID (Standard Kualiti Pendidikan Malaysia Gelomban...
STANDARD 5 - KEMENJADIAN MURID (Standard Kualiti Pendidikan Malaysia Gelomban...
 
Analisis Item Objektif
Analisis Item ObjektifAnalisis Item Objektif
Analisis Item Objektif
 
Mobiliti sosial
Mobiliti sosialMobiliti sosial
Mobiliti sosial
 
Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...
Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...
Peranan dan tanggungjawab guru dalam membina negara bangsa berlandaskan etika...
 
Refleksi Pertengahan Praktikum- Aishah.pptx
Refleksi Pertengahan Praktikum- Aishah.pptxRefleksi Pertengahan Praktikum- Aishah.pptx
Refleksi Pertengahan Praktikum- Aishah.pptx
 
Pendidikan khas kanak kanak prasekolah
Pendidikan khas kanak kanak prasekolahPendidikan khas kanak kanak prasekolah
Pendidikan khas kanak kanak prasekolah
 
PERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARA
PERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARAPERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARA
PERANAN GURU PENDIDIKAN MORAL DALAM MEREALISASIKAN ASPIRASI NEGARA
 
Ciri dan prinsip pentaksiran
Ciri dan prinsip pentaksiranCiri dan prinsip pentaksiran
Ciri dan prinsip pentaksiran
 
Strategi dan Kaedah Pengajaran
Strategi dan Kaedah PengajaranStrategi dan Kaedah Pengajaran
Strategi dan Kaedah Pengajaran
 

Viewers also liked

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
Noor Abidin
 
Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajian
Chon Seong Hoo
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
Zainal Mohd
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
cikgusuepkhas
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & text
Rio Rifani
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklh
umimadihah
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tampar
Hidayatul Hairani
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksb
syidut_77
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan
Berry Adam
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor Husniyah
Husniyah Rashid
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistik
ayottoya
 

Viewers also liked (20)

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICT
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
 
Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajian
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & text
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklh
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaire
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tampar
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksb
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projek
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringan
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hup
 
Rubrik
RubrikRubrik
Rubrik
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor Husniyah
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistik
 

Similar to Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru

ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
JohnRicos
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
hccit
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
mattjtoni51554
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
James Grew
 

Similar to Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru (20)

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Information security management
Information security managementInformation security management
Information security management
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
 
lect01--intro.pdf
lect01--intro.pdflect01--intro.pdf
lect01--intro.pdf
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device Security
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
 

Recently uploaded

Recently uploaded (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru

  • 2. LAPORAN DAPATAN SOAL SELIDIK  TAHAP KESEDARAN & PENGETAHUAN KESELAMATAN ICT DALAM KALANGAN GURU
  • 3. LATAR BELAKANG   Lokasi – SMK Taun Gusi  Jumlah sampel – 50 orang
  • 5. (II) Year of service 
  • 6. (III) Age  *Note A-Below 30 B-31 years – 40 years C-41 years and above
  • 8. 1.Are you aware whether your institution has a formal, documented security policy?  *Note A-Yes B-No C-I don’t know
  • 9. 2.Have you read and understood the security  policy? *Note A-Yes B-No
  • 10. 3. Has your institution documented in any way that you have read and understood the security policy? (e.g; a signed document)  *Note A-Yes B-No C-I don’t know
  • 11. 4. Does your institution’s policy make it clear that you may be held accountable for your actions, in case your actions (or inactions) violate your institution’s IT security policies?  *Note A-Yes B-No C-I don’t know
  • 12. 5. Do the systems you use in your institution have automatic logoff and/or automatic lock capabilities to terminate a session or lock the application or device after a predetermined time of inactivity (e.g. screensaver lock)?  *Note A-Yes, always B-I don’t know C-No, never
  • 13. 6. Does your institution require you to use a password(s) to access all your user/system accounts?  A-Yes B-Hard to say, maybe C-No
  • 14. 7.How is a password change requested?  *Note A- Often, 1-2 times per month B- The system automatically request users to change their passwords once every predetermined period of time C- The system enforce users to use strong password
  • 15. 8. Regarding Antivirus / Antispyware protection, are the systems that you use (either personal, of your institutions) protected by an antivirus / anti-spyware software package(s) protecting each desktop and laptop  *Note A-Yes B-No C-I do not know
  • 16. 9. Are the systems you use protected from virus infections that arrive via Instant Messaging clients? (ex.: MSN/Windows Live Messenger, Yahoo! Messenger, Google Talk etc)?  *Note A-Yes B-No C-I do not know
  • 17. 10. Are the systems you use in your institution protected by a firewall? Do you use a personal firewall for your personal system(s) as well?  *Note A-Yes, the system I use is protected by a firewall and I am using a personal firewall for my personal system(s) as well. B-Yes, the system I use is protected by a firewall, but I am not using a personal firewall for my persona system(s) C-No, The system I use is protected by a firewall and I am not using a personal firewall for my personal system(s) D-I do not know.
  • 18. 11. If the systems you use in your institution provide you this option, do you understand when to block and when not to block alerts of applications trying to access sensitive resources (e.g.: alerts from Microsoft Windows or similar  software firewall)? *Note A-Yes, I understand when to block and when not to block alerts, also I understand how to do this in your personal system. B-Yes, I understand when to block and when not to block. C-I do not care.
  • 19. 12. When a member of your personnel leaves the company (or when work/task contract of an outside entity ends), does your school ensure that;  *Note A. Yes B. No C. My school did not formalize a policy for such cases D. I do not know
  • 20. 13. Has your institution implemented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision?  *Note A-Yes B-No C-I do not know
  • 21. 14. Are you aware whether unnecessary services are running on your school’s systems?  *Note A-Yes B-No C-I do not know
  • 22. 15. What services does your school you expose to the internet?  *Note A-Web B-Database C-FTP D-SSH E-Other
  • 23. 16. Does your institution perform backups of computer systems and data?  *Note A-Yes, often (everyday) B-Yes, but not so often (once per month) C-I do not care D-I do not know E-Other
  • 24. 17. On what medium do you think the backup should be stored for maximum security?  *Note A-Tape backups B-CDs C-External hard drives D-Networked backed up system
  • 25. 18. What do you think is the biggest risk for IT security?  *Note A-Users B-Computers C-Network D-Unknown