SlideShare a Scribd company logo
1 of 25
WILLFRID DUIN 
MT1312358T
LAPORAN DAPATAN 
SOAL SELIDIK 
 
TAHAP KESEDARAN & 
PENGETAHUAN KESELAMATAN 
ICT DALAM KALANGAN GURU
LATAR BELAKANG 
 
 Lokasi – SMK Taun Gusi 
 Jumlah sampel – 50 orang
DEMOGRAFI 
(I)JANTINA 

(II) Year of service 

(III) Age 
 
*Note 
A-Below 30 
B-31 years – 40 years 
C-41 years and above
 
ANALISIS ITEM
1.Are you aware whether your institution 
has a formal, documented security 
policy? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
2.Have you read and 
understood the security 
 
policy? 
*Note 
A-Yes 
B-No
3. Has your institution documented in any way 
that you have read and understood the security 
policy? (e.g; a signed document) 
 
*Note 
A-Yes 
B-No 
C-I don’t know
4. Does your institution’s policy make it clear that 
you may be held accountable for your actions, in 
case your actions (or inactions) violate your 
institution’s IT security policies? 
 
*Note 
A-Yes 
B-No 
C-I don’t know
5. Do the systems you use in your institution have automatic logoff 
and/or automatic lock capabilities to terminate a session or lock 
the application or device after a predetermined time of inactivity 
(e.g. screensaver lock)? 
 
*Note 
A-Yes, always 
B-I don’t know 
C-No, never
6. Does your institution require you to use a 
password(s) to access all your user/system 
accounts? 
 
A-Yes 
B-Hard to say, maybe 
C-No
7.How is a password change 
requested? 
 
*Note 
A- Often, 1-2 times per month 
B- The system automatically request users to 
change their passwords once every 
predetermined period of time 
C- The system enforce users to use strong 
password
8. Regarding Antivirus / Antispyware protection, are the systems that 
you use (either personal, of your institutions) protected by an antivirus 
/ anti-spyware software package(s) protecting each desktop and laptop 
 
*Note 
A-Yes 
B-No 
C-I do not know
9. Are the systems you use protected from virus infections 
that arrive via Instant Messaging clients? (ex.: 
MSN/Windows Live Messenger, Yahoo! Messenger, 
Google Talk etc)? 
 
*Note 
A-Yes 
B-No 
C-I do not know
10. Are the systems you use in your institution 
protected by a firewall? Do you use a personal 
firewall for your personal system(s) as well? 
 
*Note 
A-Yes, the system I use is protected by a firewall and I 
am using a personal firewall for my personal system(s) as 
well. 
B-Yes, the system I use is protected by a firewall, but I am 
not using a personal firewall for my persona system(s) 
C-No, The system I use is protected by a firewall and I 
am not using a personal firewall for my personal 
system(s) 
D-I do not know.
11. If the systems you use in your institution provide you 
this option, do you understand when to block and when 
not to block alerts of applications trying to access sensitive 
resources (e.g.: alerts from Microsoft Windows or similar 
 
software firewall)? 
*Note 
A-Yes, I understand when to block and when not to 
block alerts, also I understand how to do this in your 
personal system. 
B-Yes, I understand when to block and when not to 
block. 
C-I do not care.
12. When a member of your personnel leaves the 
company (or when work/task contract of an 
outside entity ends), does your school ensure that; 
 
*Note 
A. Yes 
B. No 
C. My school did not formalize a policy for such 
cases 
D. I do not know
13. Has your institution implemented procedures to control 
and validate a person’s access to facilities based on their 
role or function, including visitor control and control of 
access to software programs for testing and revision? 
 
*Note 
A-Yes 
B-No 
C-I do not know
14. Are you aware whether unnecessary 
services are running on your school’s 
systems? 
 
*Note 
A-Yes 
B-No 
C-I do not know
15. What services does your school you 
expose to the internet? 
 
*Note 
A-Web 
B-Database 
C-FTP 
D-SSH 
E-Other
16. Does your institution perform 
backups of computer systems and 
data? 
 
*Note 
A-Yes, often (everyday) 
B-Yes, but not so often (once per 
month) 
C-I do not care 
D-I do not know 
E-Other
17. On what medium do you think the 
backup should be stored for maximum 
security? 
 
*Note 
A-Tape backups 
B-CDs 
C-External hard drives 
D-Networked backed up system
18. What do you think is the biggest risk for 
IT security? 
 
*Note 
A-Users 
B-Computers 
C-Network 
D-Unknown

More Related Content

What's hot

Kerja berpasukan
Kerja berpasukanKerja berpasukan
Kerja berpasukankaizen2012
 
25 Sample Aktiviti Dan Permainan Kreatif Islami
25 Sample   Aktiviti Dan Permainan Kreatif Islami25 Sample   Aktiviti Dan Permainan Kreatif Islami
25 Sample Aktiviti Dan Permainan Kreatif IslamiYusry Yusopp
 
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisLampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisTeacher Nasrah
 
Borang markah pembentangan _appendix_5
Borang markah pembentangan _appendix_5Borang markah pembentangan _appendix_5
Borang markah pembentangan _appendix_5Puteri Asmida
 
Contoh Laporan Latihan Industri (FULL)
Contoh Laporan Latihan Industri (FULL)Contoh Laporan Latihan Industri (FULL)
Contoh Laporan Latihan Industri (FULL)Rizalshah Zulkifli
 
Membina dan memilih alternatif kerjaya
Membina dan memilih alternatif kerjayaMembina dan memilih alternatif kerjaya
Membina dan memilih alternatif kerjayaNoor Faizah Fharizan
 
Refleksi individu lawatan persatuan
Refleksi  individu lawatan persatuanRefleksi  individu lawatan persatuan
Refleksi individu lawatan persatuannorainihjdaud
 
Nota AutoCAD 3D
Nota AutoCAD 3DNota AutoCAD 3D
Nota AutoCAD 3DMISDEC
 
Report Latihan Industri JKE PSAS
Report Latihan Industri JKE PSASReport Latihan Industri JKE PSAS
Report Latihan Industri JKE PSASMuhammad Hamizan
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikNoor Abidin
 
Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...
Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...
Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...mandalina landy
 
Etika penggunaan teknologi maklumat dan komunikasi secara beretika
Etika penggunaan teknologi maklumat dan komunikasi secara beretikaEtika penggunaan teknologi maklumat dan komunikasi secara beretika
Etika penggunaan teknologi maklumat dan komunikasi secara beretikaMISS ESTHER
 

What's hot (20)

Kerja berpasukan
Kerja berpasukanKerja berpasukan
Kerja berpasukan
 
MODUL 10 MINIT UBK.pdf
MODUL 10 MINIT UBK.pdfMODUL 10 MINIT UBK.pdf
MODUL 10 MINIT UBK.pdf
 
25 Sample Aktiviti Dan Permainan Kreatif Islami
25 Sample   Aktiviti Dan Permainan Kreatif Islami25 Sample   Aktiviti Dan Permainan Kreatif Islami
25 Sample Aktiviti Dan Permainan Kreatif Islami
 
Unit 8 lukisan isometrik
Unit 8   lukisan isometrikUnit 8   lukisan isometrik
Unit 8 lukisan isometrik
 
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisLampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
 
Borang markah pembentangan _appendix_5
Borang markah pembentangan _appendix_5Borang markah pembentangan _appendix_5
Borang markah pembentangan _appendix_5
 
Contoh Laporan Latihan Industri (FULL)
Contoh Laporan Latihan Industri (FULL)Contoh Laporan Latihan Industri (FULL)
Contoh Laporan Latihan Industri (FULL)
 
Gaya kepimpinan
Gaya kepimpinanGaya kepimpinan
Gaya kepimpinan
 
Get logik
Get logikGet logik
Get logik
 
Model komunikasi
Model komunikasiModel komunikasi
Model komunikasi
 
Membina dan memilih alternatif kerjaya
Membina dan memilih alternatif kerjayaMembina dan memilih alternatif kerjaya
Membina dan memilih alternatif kerjaya
 
Refleksi individu lawatan persatuan
Refleksi  individu lawatan persatuanRefleksi  individu lawatan persatuan
Refleksi individu lawatan persatuan
 
Bab 4 analisis data
Bab 4 analisis dataBab 4 analisis data
Bab 4 analisis data
 
Nota AutoCAD 3D
Nota AutoCAD 3DNota AutoCAD 3D
Nota AutoCAD 3D
 
Report Latihan Industri JKE PSAS
Report Latihan Industri JKE PSASReport Latihan Industri JKE PSAS
Report Latihan Industri JKE PSAS
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Modul ldk
Modul ldkModul ldk
Modul ldk
 
Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...
Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...
Borang Soal Kaji Selidik,Pengetahuan Dan Penerimaan Mahasiswa Cina Terhadap C...
 
Efikasi kendiri
Efikasi kendiriEfikasi kendiri
Efikasi kendiri
 
Etika penggunaan teknologi maklumat dan komunikasi secara beretika
Etika penggunaan teknologi maklumat dan komunikasi secara beretikaEtika penggunaan teknologi maklumat dan komunikasi secara beretika
Etika penggunaan teknologi maklumat dan komunikasi secara beretika
 

Viewers also liked

SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTHuda Wahab
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMNuraini Ismail
 
Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajianChon Seong Hoo
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUcikgusuepkhas
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICTskullverine
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textRio Rifani
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklhumimadihah
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaireSMK NARINANG
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparHidayatul Hairani
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksbsyidut_77
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projekizazihazirah
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Berry Adam
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanvelisya NT
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupdannysulimin
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahHusniyah Rashid
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikayottoya
 
Penyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiPenyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiMohd Saufi
 
Bab 7 alat penilaian
Bab 7 alat penilaianBab 7 alat penilaian
Bab 7 alat penilaianDURGA DEVI
 

Viewers also liked (20)

Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICT
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
 
Panduan menulis laporan kajian
Panduan menulis laporan kajianPanduan menulis laporan kajian
Panduan menulis laporan kajian
 
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKUCONTOH LAPORAN KAJIAN KES TINGKAH LAKU
CONTOH LAPORAN KAJIAN KES TINGKAH LAKU
 
Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
 
Kk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & textKk12 melakukan inst sistem gui & text
Kk12 melakukan inst sistem gui & text
 
Plan strategik-ict-sklh
Plan strategik-ict-sklhPlan strategik-ict-sklh
Plan strategik-ict-sklh
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaire
 
Borang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tamparBorang soal selidik m.teching b.tampar
Borang soal selidik m.teching b.tampar
 
Contoh perancangan strategik ict sksb
Contoh  perancangan strategik ict sksbContoh  perancangan strategik ict sksb
Contoh perancangan strategik ict sksb
 
Pelaksanaan projek
Pelaksanaan projekPelaksanaan projek
Pelaksanaan projek
 
Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan Inovasi dan Teknologi Laporan
Inovasi dan Teknologi Laporan
 
materi kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringanmateri kk11 teknik komputer jaringan
materi kk11 teknik komputer jaringan
 
Tatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hupTatacara pengumpulan dan memasukkan data soal selidik hup
Tatacara pengumpulan dan memasukkan data soal selidik hup
 
Rubrik
RubrikRubrik
Rubrik
 
Kaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor HusniyahKaji selidik kpt6044_Nor Husniyah
Kaji selidik kpt6044_Nor Husniyah
 
Bab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistikBab 1 pengenalan terhadap statistik
Bab 1 pengenalan terhadap statistik
 
Penyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadiPenyelidikan tindakan asri hadi
Penyelidikan tindakan asri hadi
 
Bab 7 alat penilaian
Bab 7 alat penilaianBab 7 alat penilaian
Bab 7 alat penilaian
 

Similar to Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnairePriyanka Aash
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfJohnRicos
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
6 computer systems
6 computer systems6 computer systems
6 computer systemshccit
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY Deepak Solanki
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device SecurityWitekio
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.comDavisMurphyA97
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015James Grew
 

Similar to Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru (20)

Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Information security management
Information security managementInformation security management
Information security management
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
6 computer systems
6 computer systems6 computer systems
6 computer systems
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
 
lect01--intro.pdf
lect01--intro.pdflect01--intro.pdf
lect01--intro.pdf
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
IoT Device Security
IoT Device SecurityIoT Device Security
IoT Device Security
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru

  • 2. LAPORAN DAPATAN SOAL SELIDIK  TAHAP KESEDARAN & PENGETAHUAN KESELAMATAN ICT DALAM KALANGAN GURU
  • 3. LATAR BELAKANG   Lokasi – SMK Taun Gusi  Jumlah sampel – 50 orang
  • 5. (II) Year of service 
  • 6. (III) Age  *Note A-Below 30 B-31 years – 40 years C-41 years and above
  • 8. 1.Are you aware whether your institution has a formal, documented security policy?  *Note A-Yes B-No C-I don’t know
  • 9. 2.Have you read and understood the security  policy? *Note A-Yes B-No
  • 10. 3. Has your institution documented in any way that you have read and understood the security policy? (e.g; a signed document)  *Note A-Yes B-No C-I don’t know
  • 11. 4. Does your institution’s policy make it clear that you may be held accountable for your actions, in case your actions (or inactions) violate your institution’s IT security policies?  *Note A-Yes B-No C-I don’t know
  • 12. 5. Do the systems you use in your institution have automatic logoff and/or automatic lock capabilities to terminate a session or lock the application or device after a predetermined time of inactivity (e.g. screensaver lock)?  *Note A-Yes, always B-I don’t know C-No, never
  • 13. 6. Does your institution require you to use a password(s) to access all your user/system accounts?  A-Yes B-Hard to say, maybe C-No
  • 14. 7.How is a password change requested?  *Note A- Often, 1-2 times per month B- The system automatically request users to change their passwords once every predetermined period of time C- The system enforce users to use strong password
  • 15. 8. Regarding Antivirus / Antispyware protection, are the systems that you use (either personal, of your institutions) protected by an antivirus / anti-spyware software package(s) protecting each desktop and laptop  *Note A-Yes B-No C-I do not know
  • 16. 9. Are the systems you use protected from virus infections that arrive via Instant Messaging clients? (ex.: MSN/Windows Live Messenger, Yahoo! Messenger, Google Talk etc)?  *Note A-Yes B-No C-I do not know
  • 17. 10. Are the systems you use in your institution protected by a firewall? Do you use a personal firewall for your personal system(s) as well?  *Note A-Yes, the system I use is protected by a firewall and I am using a personal firewall for my personal system(s) as well. B-Yes, the system I use is protected by a firewall, but I am not using a personal firewall for my persona system(s) C-No, The system I use is protected by a firewall and I am not using a personal firewall for my personal system(s) D-I do not know.
  • 18. 11. If the systems you use in your institution provide you this option, do you understand when to block and when not to block alerts of applications trying to access sensitive resources (e.g.: alerts from Microsoft Windows or similar  software firewall)? *Note A-Yes, I understand when to block and when not to block alerts, also I understand how to do this in your personal system. B-Yes, I understand when to block and when not to block. C-I do not care.
  • 19. 12. When a member of your personnel leaves the company (or when work/task contract of an outside entity ends), does your school ensure that;  *Note A. Yes B. No C. My school did not formalize a policy for such cases D. I do not know
  • 20. 13. Has your institution implemented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision?  *Note A-Yes B-No C-I do not know
  • 21. 14. Are you aware whether unnecessary services are running on your school’s systems?  *Note A-Yes B-No C-I do not know
  • 22. 15. What services does your school you expose to the internet?  *Note A-Web B-Database C-FTP D-SSH E-Other
  • 23. 16. Does your institution perform backups of computer systems and data?  *Note A-Yes, often (everyday) B-Yes, but not so often (once per month) C-I do not care D-I do not know E-Other
  • 24. 17. On what medium do you think the backup should be stored for maximum security?  *Note A-Tape backups B-CDs C-External hard drives D-Networked backed up system
  • 25. 18. What do you think is the biggest risk for IT security?  *Note A-Users B-Computers C-Network D-Unknown