Writing on the Wall: A Case of State Colleges and Universities

Judith Barlaan

Abstract


Information security is imperative for state colleges and universities (SUCs) to have a sound information security in protecting their information assets, enhancing institutional reputation and ensuring compliance with the law. This paper presents the level of implementation of information security in the state colleges and universities (SUCs) in the Philippines. Data  used  was  based  on questionnaire adapted from the Information Security Governance (ISG) Assessment Tool for Higher Education(EDUCAUSE/Internet2 Security Task 2004) and was  distributed  to  a  total  of  30  individuals  who  are  responsible  in managing and keeping  the  information assets of the SUCS. Findings revealed that information security is not yet fully implemented among the SUCS, this is a clear indication of failure or disaster, and these institutions are vulnerable to information security threats. SUCs are encouraged to implement comprehensive information security program at a strategic level involving the board of regents and top executives for safety and security.

Full Text:

PDF

References


L. Graham, Cybercrime costs the global economy $450 billion: CEO, CNBC, 07-Feb-2017. [Online]. Available: http://www.cnbc.com/2017/02/07/cybercrime-costs-theglobal-economy-450-billion-ceo.html. Jun-2017.

J. Desjardins, The $74 Trillion Global Economy in One Chart, Available: http://www.visualcapitalist.com/74-trillion-globaleconomy-one-chart/. Accessed: 01-Jun-2017.

Hopper, D.2000.”ILOVEYOU”computer bug bites hard, spreads fast,.CNN. http://archives.cnn.com/2000/TECH/computing/05/04/ilovyou.01/

Allen, Julia & Westby, Jody R, Characteristics of Effective Security Governance, Governing for Enterprise Security (GEs) Implementation Guide Software, Software Engineering Institute, Carnegie Mellon University

IT Governance Institute, 2005. COBIT 4.0, USA. www.itgi.org., Available June 2017.

EDUCAUSE/Internet2 Security Task 2004. Information Security Governance (ISG) Assessment Tool for Higher Education . https://www.educause.edu/ir/library/pdf/SEC0421.pdf

Elky, Estve.2006.An Introduction to Information Risk Management. SANS Institute InfoSec Reading Room https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204


Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.