Implementing IT security penetration testing in higher education institute: A case of University Teknologi MARA (UiTM) Pahang / Zulazeze Sahri ...[et al.]
The higher educational industry has unique information security requirements as the organization holds critical data and information of students, employees, research findings as well as other university's main agenda information. This paper proposed an enhanced process flow for web deployment b...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Book |
Published: |
2013.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repouitm_39771 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Sahri, Zulazeze |e author |
700 | 1 | 0 | |a Abdul Malek, Mohamad Affendi |e author |
700 | 1 | 0 | |a Abd Aziz, Muhd Eizan Shafiq |e author |
700 | 1 | 0 | |a Jamaludin, Roslan |e author |
700 | 1 | 0 | |a Canda, Roger |e author |
245 | 0 | 0 | |a Implementing IT security penetration testing in higher education institute: A case of University Teknologi MARA (UiTM) Pahang / Zulazeze Sahri ...[et al.] |
260 | |c 2013. | ||
500 | |a https://ir.uitm.edu.my/id/eprint/39771/1/39771.PDF | ||
520 | |a The higher educational industry has unique information security requirements as the organization holds critical data and information of students, employees, research findings as well as other university's main agenda information. This paper proposed an enhanced process flow for web deployment by implementing IT security penetration testing practices in University Teknologi MARA (UiTM) Pahang, Campus Jengka, as a way to early detection, reduce and prevent the institution's information security and services. This empirical research is based on qualitative data analysis which applied action research and interviews that requires researcher to study the existing university's IT security policy, infrastructure and available services. The development of the penetration testing process flow is guided by various industry standard penetration testing frameworks and literature review. | ||
546 | |a en | ||
690 | |a Higher Education | ||
690 | |a Research | ||
690 | |a Technology. Information technology. Internet in higher education | ||
655 | 7 | |a Conference or Workshop Item |2 local | |
655 | 7 | |a PeerReviewed |2 local | |
787 | 0 | |n https://ir.uitm.edu.my/id/eprint/39771/ | |
856 | 4 | 1 | |u https://ir.uitm.edu.my/id/eprint/39771/ |z Link Metadata |