Repository logo
  • English
  • Deutsch
  • Español
  • Français
Log In
New user? Click here to register.
  1. Home
  2. Browse by Author

Browsing by Author "Testing Author1"

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    TESTING 1
    (Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2020, 2020-02-21)
    Testing Author1
    ;
    ;
    Jamaludin Ibrahim, Ph.D
    The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of workflow process is unable to mitigate and contain the sensitive information leaks incident. Arrangement of activities in workflow process is important to facilitate the whole incident response process. Incident handler who are working with incident handling facilitates incident response to accomplish incident workflow process objective. This study explored the perspective of incident handler about the workflow to handle sensitive information leaks incident. Data were collected through incident scenario exercise. The data were analyzed with techniques that include categories, subcategories and summary from incident scenario response. The incident handlers revealed that incident workflow being used in organization has different objective to accomplish incident response. Some of limitation identified include detection and escalation processes of incident in workflow. The result suggested that a new workflow process need to be established as a gatekeeper to coordinate the whole investigation and mitigation process. These improvements of workflow have the implication of detection and escalation process. Several recommendations are given on how to handle sensitive information leaks associated with the present incident workflows. The findings of this study are expected to strengthen the procedure in organization while handling sensitive information leaks incident.
      1
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    undang2 poligami di mudahkan
    (Kuala Lumpur : Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia)
    Testing Author1
    ;
    ;
    hana imam supaat

This site contains copyrighted unpublished research owned by International Islamic University Malaysia (IIUM) and(or) the owner of the research. No part of any material contained in or derived from any unpublished research may be used without written permission of the copyright holders or due acknowledgement.

Contact:
  • Dar al-Hikmah Library
    International Islamic University Malaysia (IIUM)
    P.O Box 10, 50728
    Kuala Lumpur
  • +603-64214829/4813
  • studentrepo@iium.edu.my
Follow Us:
Copyright © 2024: Dar al-Hikmah Library, IIUM
by CDSOL