Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Tizon, Joshua M."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Network security policies and procedure based on the threat-driven approach for Ilocos Sur Polytechnic State College
    (Don Mariano Marcos Memorial State University – Mid La Union Campus, 2021-04) Tizon, Joshua M.; Patacsil, Joseph A.; Malicdem, Alvin R.; Cabading, Jose Mari N.; Ledda, Mark Kristian C.
    Avoiding the numerous consequences that may result from a cyber-attack, the colleges and universities should take affirmative steps to strengthen their networks and defend their data. This paper primarily aimed to help strengthen the privacy, security, and safety of information of Ilocos Sur Polytechnic State College by designing a Network Security Policy and Procedure for ISPSC using a threat-driven approach. The descriptive research design to analyze the data gathered from the testing of the security and accuracy of the design policy of a network was used. The findings show that the crafted policy and standard operational procedure for network security of the said institution shall be approved by the Board of Trustees of the institution with the integration of the additional policies provided by the researcher. The designed policy and standard operational procedures for the network security of the institution has been successfully evaluated by the technical experts and can be utilized to reinforce the compliance of ISO 27001 and ISO 9001:2015 Certification. The network security has proven to be very much good in the three aspects of validation as to functionality, efficiency, and benefits as felt need of institution.

DSpace software copyright © 2002-2026 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback