13 December 2011

Policies “Based on IT objects, UI’s policies are regulating about laboratories, Wi-Fi, computers and laptops”

Computers in Computer Laboratories

Some policies exist in computer laboratories are prohibition of bringing food and beverages, unplugging computer’s cables, and browsing improper non-academic materials. Other policies that should be enforced are laboratories should only be used by staffs and students of the faculty, limitation of computer laboratory usage in which the writers suggest 5 hours/day would be enough, forbidding anyone to use computer for criminal intentions like hacking or other forms of cyber attacks, and users of laboratories should be responsible for the safety of their own belongings.

Benefits of proposed policies are improvement of both physical and virtual security of computers, users will prioritize computer usage for academic matters, and improve users’ sense of belonging.

Other than existing policies in Keputusan Rektor, there should be policies to enforce presence of antivirus and firewall to ensure security in each laptop, and users should only access and download from credible websites. Benefit of proposed policies are assurance that Universitas Indonesia’ networks attacks from malware and others will be at minimal level.

Computer in Classrooms
Up to now, no policy exists for computer in classrooms so the writers propose some policies that might help improve security in those computers. Every flash disk that is going to be used in the computer should be scanned first to ensure no malware will be injected by those flash disks. Additionally, no change in computer settings should be applied without approval of IT Fasilkom or helpdesk unit. In another case, a login mechanism might be useful to limiting computer usage just for rightful people like lecturers. Benefits of proposed policies are improving data security, minimize probability of injection of malware to the computer, and ensuring computer access just for limited rightful people.

Laptops in Laptop Laboratory
Some policies should be applied to this IT object are prohibition of bringing foods and beverages into the laboratory, limitation of those who might enter the laboratory –limited to staffs and students of the faculty-, users are recommended not to leave their laptop for more than 15 minutes, and the faculty isn’t taking blame for lost laptop or other belongings that have been left for long time without supervision. Benefits of proposed policies are improvement of physical security of users’ belongings and prevent any physical harm to laptops in the laboratory.

Lack of proposed policies could result in adverse effects for each mentioned IT objects. Although on the contrary, enforcement of security policies will reduce comfortability and ease of use for users.

Importance of IT Security
If it is considered as a burden, then why should we obey those complex rules in IT security? The main reason is our dependence to IT has been so immense that even a little IT disruption might affect our daily life. IT security exists to ensure those disruption are at minimal level and users can use IT for their needs fulfillment safely and properly.

Oleh kelompok Manajemen Keamanan Informasi:
Yessica Sari        (0806316921)
Rizqy Puspitasari    (0806339660)
Siska Eka Putriani    (0806339673)
Stella Tantra Setyady    (0806339686)
Putri Khusnul Khotimah    (0806460074)


  1. fantastic submit, very informative. I wonder
    why the opposite specialists of this sector do not realize this.
    You must continue your writing. I'm sure, you have a huge readers' base
    Also see my webpage: GPS Systems

  2. Wah.. Blognya cevi ternyata.. Iseng nyari nama sendiri n nyasar kesini :-o

  3. hahaha iya siska, ini tugas MKI dulu kelas kita. Jadi saya posting di blog buat nambah ilmu hehe :D