Policies “Based on IT objects, UI’s policies are regulating about laboratories, Wi-Fi, computers and laptops”
Computers in
Computer Laboratories
Some policies exist in computer laboratories are prohibition of bringing food
and beverages, unplugging computer’s cables, and browsing improper non-academic
materials. Other policies that should be enforced are laboratories should only
be used by staffs and students of the faculty, limitation of computer
laboratory usage in which the writers suggest 5 hours/day would be enough,
forbidding anyone to use computer for criminal intentions like hacking or other forms of cyber attacks, and users of
laboratories should be responsible for the safety of their own
belongings.
Benefits of
proposed policies are improvement of both physical and virtual security of
computers, users will prioritize computer usage for academic matters, and
improve users’ sense of belonging.
Wi-Fi
Other than existing
policies in Keputusan Rektor, there should be policies to enforce
presence of antivirus and firewall to ensure security in each laptop, and users
should only access and download from credible websites. Benefit of proposed
policies are assurance that Universitas Indonesia’ networks attacks from
malware and others will be at minimal level. Computer in
Classrooms Up to now, no policy
exists for computer in classrooms so thewriters propose some policies that might help
improve security in those computers. Every flash disk that is going to be used
in the computer should be scanned first to ensure no malware will
be injected by
those flash disks. Additionally, no change in computer settings should be
applied without approval of IT Fasilkom or helpdesk unit. In another case, a
login mechanism might be useful to limiting computer usage just for rightful
people like lecturers.
Benefits of proposed policies are improving data security, minimize probability
of injection of malware to the computer, and ensuring computer access just for
limited rightful people. Laptops in Laptop
Laboratory Some policies should
be applied to this IT object are prohibition of bringing foods and beverages
into the laboratory, limitation of those who might enter the laboratory
–limited to staffs and students of the faculty-, users are recommended not to
leave their laptop for more than 15 minutes, and the faculty isn’t taking blame
for lost laptop or other belongings that have been left for long time without
supervision. Benefits of proposed policies are improvement of physical security
of users’ belongings and prevent any physical harm to laptops in the laboratory. Lack of proposed policies
could result in adverse effects for each mentioned IT objects. Although on the
contrary, enforcement of security policies will reduce comfortability and ease
of use for users. Importance of IT Security If it is considered as
a burden, then why should we obey those complex rules in IT security? The main
reason is our dependence to IT has been so immense that even a little IT
disruption might affect our daily life. IT security exists to ensure those
disruption are at minimal level and users can use IT for their needs
fulfillment safely and properly.
fantastic submit, very informative. I wonder why the opposite specialists of this sector do not realize this. You must continue your writing. I'm sure, you have a huge readers' base already! Also see my webpage: GPS Systems
fantastic submit, very informative. I wonder
ReplyDeletewhy the opposite specialists of this sector do not realize this.
You must continue your writing. I'm sure, you have a huge readers' base
already!
Also see my webpage: GPS Systems
Wah.. Blognya cevi ternyata.. Iseng nyari nama sendiri n nyasar kesini :-o
ReplyDeletehahaha iya siska, ini tugas MKI dulu kelas kita. Jadi saya posting di blog buat nambah ilmu hehe :D
ReplyDelete