4 Polisi Keselamatan Siber – Jabatan Perkhidmatan Awam | Versi 2.0 3.7 Clear Desk and Clear Screen .....................................................................................................75 3.8 Penempatan dan Perlindungan aset ICT ................................................................................75 3.9 Keselamatan Aset di Luar Pejabat ...........................................................................................76 3.10 Media Storan ..................................................................................................................................77 3.11 Perkhidmatan Sokongan ............................................................................................................78 3.12 Keselamatan Pengkabelan .........................................................................................................79 3.13 Penyelenggaraan Peralatan .......................................................................................................79 3.14 Pelupusan atau Penggunaan Semula Peralatan ...................................................................80 BAB 4 : KAWALAN TEKNOLOGI.............................................................................................................82 4.1 Aset ICT Pengguna .......................................................................................................................83 4.2 Kebenaran Hak Akses..................................................................................................................85 4.3 Kawalan Akses Maklumat ...........................................................................................................86 4.4 Akses Kepada Kod Sumber .......................................................................................................87 4.5 Pengesahan Selamat (Secure Authentication) .....................................................................88 4.6 Pengurusan Kapasiti ....................................................................................................................89 4.7 Perlindungan Terhadap Perisian Hasad (Malware) ..............................................................90 4.8 Pengurusan Teknikal Ke Atas Kerentanan ............................................................................91 4.9 Pengurusan Konfigurasi .............................................................................................................93 4.10 Penghapusan Maklumat ..............................................................................................................94 4.11 Penyembunyian Data (Data Masking) ......................................................................................95 4.12 Pencegahan Kebocoran Data (Data Leakage Prevention) .................................................96 4.13 Sandaran Maklumat (Information Backup) .............................................................................97 4.14 Redundancy bagi Kemudahan Pemprosesan Maklumat ....................................................98 4.15 Merekodkan Log (Logging) ........................................................................................................98 4.16 Aktiviti Pemantauan ...................................................................................................................100 4.17 Penyelarasan Jam .......................................................................................................................102 4.18 Penggunaan Program Utiliti Khas ..........................................................................................102 4.19 Instalasi Perisian .........................................................................................................................103 4.20 Keselamatan Rangkaian ...........................................................................................................103 4.21 Keselamatan Perkhidmatan Rangkaian ................................................................................105 4.22 Pengasingan Rangkaian ..........................................................................................................106 4.23 Kawalan Penapisan Web .........................................................................................................107 4.24 Penggunaan Kriptografi ...........................................................................................................107 4.25 Kitaran Hayat Pembangunan Yang Selamat ......................................................................109 4.26 Keperluan Keselamatan Sistem Aplikasi ............................................................................110 4.27 Prinsip Kejuruteraan dan Arkitektur Sistem yang Selamat (Secure System ..................
RkJQdWJsaXNoZXIy MTc1NDAy