2,993 research outputs found

    Corporate Services

    Get PDF
    2003 corporate services brochure, printed to provide a brief description of each area of the Corporate Service Group. Includes February 17, 2003 Blue Cross and Blue Shield of Florida at a Glance

    Implementing an effective information security awareness program

    Get PDF
    The aim of this project and dissertation is to develop an effective information security awareness program that can be implemented within an organization. The project starts with a literature study that focuses on the requirements for an information security awareness program, research that has already been done in this area and behavioural issues that need to be considered during the implementation of such a program. A secondary deliverable of this project is to develop a web-based security awareness program that can be used to make employees more security aware and that should compliment a total security awareness program within an organization. Chapter 1 provides an overview of the problem statement, the objectives and structure of the project and dissertation, and the approach that was followed to solve the problem. In chapter 2 the concept of security awareness and the different components it consists of, are defined. The difference between awareness, training, and education, and the importance of implementing a security awareness environment within an organization, will be explained. Chapter 3 discusses the ISO 17799 security standard and what it says about security awareness and the importance of employee training. The security awareness prototype that was developed as part of this study plays a role in achieving the training objective. The Attitude problem is the focus of chapter 4. In order for a security awareness program to be effective, people’s attitude towards change must be changed. It is also important to measure the behavioural change to make sure that the attitude towards change did change. The security awareness prototype is introduced in this chapter and mentioned that this can be used to assist an organization to achieve their security awareness goals. Chapter 5 introduces the security awareness prototype in more detail. This prototype is an example of a web environment that can be used to train users to a higher degree of security awareness. Chapter 6 goes into more detail about the structure of the security awareness web environment. Access control and how it is achieved is explained. The objectives of the 10 modules and the test at the end of each module are also mentioned. Links and reports can also form part of this prototype to make it a more comprehensive solution. Chapter 7 provides an overview of a case study that I researched. It focuses on research done by Hi-Performance Learning about the human factor that is involved in any training program. I explain how they succeeded in addressing this and people’s sensitivity towards change. Chapter 8 explains the importance of choosing the right course content, learning media and course structure and how this led me to develop a web-based security awareness prototype. Other mechanisms like posters and brochures that can be used as part of a comprehensive security awareness program are discussed in chapter 9. Chapter 10 concludes the dissertation by providing an overview of how the security awareness program can be implemented and managed within an organization. A summary of how the objectives of this project and dissertation were met, are given at the end of this chapter.Von Solms, S.H., Prof

    2004 LTER Network Office Annual Report

    Get PDF
    A Report from the Network Office of the U.S. Long Term Ecological Research Network for work accomplished in Year 2 of DEB-0236154 December 16, 200

    Integration of CompTIA Cloud+ into Universiti Teknologi MARA’s Computer Engineering Special Topics Syllabus

    Get PDF
    Cloud computing is one of the frontier technologies in computer engineering. Therefore, it is important to prepare the students with the knowledge and skills required in this field. This paper describes the integration of the renowned CompTIA Cloud+ professional training course into the ECE648: Special Topics in Computer Networking subject. The subject is a final year elective for the Faculty of Electrical Engineering, Universiti Teknologi MARA, Malaysia undergraduate computer engineering students. We first begin by assessing the current teaching syllabus of a variety of international universities to establish fundamental topics that should be covered in a cloud computing course. We then proceed to describe our implementation, which is done in accordance with the CompTIA Cloud+ certification syllabus. Among the items described are how the Cloud+ course contents are adjusted to be more suitable for the course, as well as additional practical elements (not originally available in the Cloud+ course) added to the course syllabus. Implementation results are described

    IT Infrastructure

    Get PDF
    The role of “IT infrastructure” covers all the knowledge and framework linked with IT in term of software, hardware, and security (Physical and IT) of an organization. During the internship period the main course is to evaluate the existing structure (Applications, Infrastructure management tools and services, servers, storage, network, and facilities as shown in the figure), day to day IT structural methodology and based on the initial investigation provide the recommendations. Also, implement the changes to meet business goals. During the internship, will perform meetings with service providers (hardware and software) and vendors in term to facilitate the budget for any enhancement in the existing structure

    Information Outlook, September 1998

    Get PDF
    Volume 2, Issue 9https://scholarworks.sjsu.edu/sla_io_1998/1008/thumbnail.jp
    • …
    corecore