The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by ariff.170611, 2022-07-16 14:53:23

IMS656 Group Assignment

Group assignment of IMS656

PRODUCT BENEFITS
SYSTEM SCREENSHOT

49

SYSTEM SCREENSHOT

50

IT / IS MANUAL /
PROCEDURE /
STANDARD IN THE
ORGANIZATION

51

ICT SECURITY POLICY

MOH ICT Security Policy was established to:
• Ensure the continuity of MOH affairs by minimizing the

impact of incidents ICT security;
• Facilitate information sharing;
• Protect the interests of parties who rely on information

systems from the effect of failure or weakness in terms of
confidentiality, integrity, availability, authenticity of
information and communication; and
• Prevent misuse or theft of Government ICT assets.

52

ICT SECURITY POLICY

ICT security means a situation where all matters provide and
provide services based on ICT systems running smoothly
continuous without interruption that could compromise safety. ICT
security is related close to the protection of ICT assets. There are
four (4) basic components of ICT security namely:
• Protect official confidential information and official Government

information from unauthorized access legal authority;
• Guarantees every piece of information is accurate and

complete;
• Ensure the availability of information when required by users;

and
• Ensure access to only authorized or receiving users information

from legitimate sources.

53

ICT SECURITY POLICY

Policy Implementation
The Secretary General of the MOH is responsible for the
implementation of instructions with the assistance of the ICT
Security Management Team consisting of the Chief Information
Officer
(CIO), ICT Security Officer (ICTSO) and other appointed officers.

Basic Dissemination
This policy should be disseminated to all MOH users including
suppliers, consultants and others who deal with the MOH.

Basic Maintenance
MOH ICT Security Policy is subject to review and amendment from
time to time in line with changes in technology, applications,
procedures, legislation and social interests.

The following are the procedures related to the maintenance of the
MOH ICT Security Policy:
• Review this policy at least once a year or as needed to identify

and determine the changes needed;
• Submit change proposals to the CIO for presentation and

approval of the MOH ICT Steering Committee Meeting (JPICT);
and
• Inform the policy changes that have been agreed by JPICT to all
MOH users.

Policy Exceptions
The MOH ICT Security Policy must be read, understood and
complied with by all MOH staff. MOH ICT Security Policy is
applicable to all MOH ICT users and no exceptions are given

54

ISSUES AND CHALLENGES
OF IT/IS

There are 2 issues and 2 challenges that are often face by Information
Technology or Information System Department:

Issues #1 Rapid increasing demands for digital transformation

Businesses increasingly demand more agile hybrid IT services and agile
networking capability and getting the user experience right is a critical part
of business transformation. This goes beyond just the usability of
applications for employees or external customers and includes the
experience of working with the IT team and tools.

Issues #2 Cybersecurity and data privacy threats

The human factor is often the hardest to control and predict when it comes
to data protection. Some companies invest in employee training in hopes
that a well-educated workforce, aware of the financial and reputational
consequences of data breaches, will be enough to increase vigilance and
deter poor security practices. However, the truth is, in many cases,
organizations are only one careless employee away from a damaging security
incident. There is also always the potential danger of malicious insiders
and disgruntled employees that want to damage a company’s reputation or s
teal data on their way out of an organization.

55

• Challenges #1 Project Management

Companies with certified project managers are more likely to have projects that are
completed on time and within budget. It takes experience and strategic thinking to
align projects with departmental and organizational goals. A strong project manager
keeps projects on track, so deadlines are met, resources are available, and leadership
is in the loop. Without someone to steer the ship, projects lack direction and risk
increases. A business that fails to recognize these risks probably doesn’t value
project management highly.
• Challenges #2 Budget
Budget is often the major roadblock impeding professional development and hiring.
IT departments need to ensure they are communicating the right messages to
organizational leadership to help them understand the value of ongoing training.
Here’s a place to start revenue growth, low employee turnover and new product
development are signs of a skilled workforce

56

When considering the rapid demand of digital transformation, it is very
important to understand the system that helps improve the flow of value
generated from the development and delivery of a software product and
the resources involved while simultaneously providing end-to-end visibility
of the entire process. The increased focus on mobile apps, as a result of
business digitization and consumer demands, is driving interest in value
stream management that focuses solely on mobile.

It is essential that progressive businesses implement a security strategy
consistently across all networks, applications and data, whatever services
or service providers are being used.
To allow the effects of digital transformation to be truly transformative,
CIOs should surround themselves with both business and technology
partners that understand the broader business objectives and can operate
honestly and transparently to achieve these goals.

RECOMMENDATION
AND CONCLUSION

57

A recent study found that two out of five projects don’t meet their
original goals due to ineffective communications. Nowadays most
companies provide laptops to staff, so from there IT staff can
monitor staff for work or not by monitoring the laptop's hours on
and off using the system.

Good planning, great communication, staying on budget, clear objectives,
increased employee productivity – all of these are powered by realistic
expectations. The budget priority should be to a project or any expenses
that will useful and bring benefits to the organization where return of
investment (ROI) is guarantee.

RECOMMENDATION
AND CONCLUSION

58

REFERENCES

ManageEngine. (2021). ServiceDesk Plus. Retrieved July 16,
2022, from ManageEngine ServiceDesk Plus website:
https://www.manageengine.com/products/service-desk/

mampu-support. (2022, July). Home - Laman Web Rasmi
MAMPU. Retrieved July 16, 2022, from Laman Web Rasmi
MAMPU website: https://www.mampu.gov.my/en/

Portal Rasmi Jabatan Perkhidmatan Awam (JPA) - Utama. (2018).
Retrieved July 16, 2022, from Jpa.gov.my website:
https://www.jpa.gov.my/

Laman Web Hospital Sungai Buloh. (2022). Retrieved July 16,
2022, from Laman Web Rasmi Hospital Sungai Buloh
website: https://hsgbuloh.moh.gov.my/ms/

Wipro | Digital, Technology, Business Solutions. (2022).
Retrieved July 16, 2022, from Wipro.com website:
https://www.wipro.com/

NGAF - Next Generation Firewall (NGFW). (2022). Retrieved
July 16, 2022, from SANGFOR website:
https://www.sangfor.com/cybersecurity/products/ngaf-next-
generation-firewall

59

REFERENCES

Home. (2022, June 21). Retrieved July 16, 2022, from LGMS -
Penetration Testing (Pen Test) Expert Malaysia & Asia
website:
https://lgms.global/?gclid=CjwKCAjww8mWBhABEiwAl6-
2RQ8Jeaq2QPEwtyk5YU9eM0-
7y6OQrp1xqX1az6hEJ_Ly4iwJDwpVZRoC5R4QAvD_BwE

Laman Utama – MyGovUC 2.0. (2022, July 5). Retrieved July 16,
2022, from Mygovuc.gov.my website:
https://mygovuc.gov.my/myGovUc/

Ddms 2.0 Login. (2018). Retrieved July 16, 2022, from

Malaysia.gov.my website:

https://ddms.malaysia.gov.my/share/page/

Database Backup and Recovery Software — Acronis. (2017).
Retrieved July 16, 2022, from Acronis website:
https://www.acronis.com/en-eu/blog/posts/database-recovery/

12 Challenges Facing IT Professionals. (2020). Retrieved July 16,
2022, from Globalknowledge.com website:
https://www.globalknowledge.com/us-en/resources/resource-
library/articles/12-challenges-facing-it-professionals/#gref

60


Click to View FlipBook Version