Ensuring Network Security through Hazard Recognition in the Office of the President

I pursued opportunities for upgrading the network security system of the Office of the President, the Private Office in particular, and creating safer environment in the cyberspace that will protect confidential government assets or information. By focusing my study to the Private Office, my colleag...

Full description

Saved in:
Bibliographic Details
Main Author: Saquido, Michelle Loise C.
Format: text
Language:English
Published: Animo Repository 2015
Online Access:https://animorepository.dlsu.edu.ph/etd_masteral/4978
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Description
Summary:I pursued opportunities for upgrading the network security system of the Office of the President, the Private Office in particular, and creating safer environment in the cyberspace that will protect confidential government assets or information. By focusing my study to the Private Office, my colleagues and I realized greater potentials for anti-hacking. We pursued these opportunities by providing the necessary structures, processes, and resources to raise awareness and support action to the Office of the President. I performed insider action research, guided by Coghlan and Brannicks (2010) Doing Action Research in Your Own Organization. My group completed a single main cycle of the four-step action research process of constructing, planning, taking action, and evaluating action. I used Jones (2007) framework for the management of information security risks to complement action research and aid in understanding of the concept of hazard recognition and its importance in ensuring network security. In this paper, my colleagues and I in the Office of the President identified issues encountered in achieving the desired state of zero hacking incidents and discussed the strategies adopted to resolve them. We generated knowledge about personal learning and inquiry process, about the capability of the workforce and current firewall used in protecting the network, about experiential learning and the actual performance of action research, about information of national concerns, about upgrading technology, and about identifying and managing risks in the computer network. My colleagues and I also identified inputs for the next step of action research. Finally, I identified the features of the next generation firewall that can replace the current software-based firewall to mitigate or treat the risk exposure of the network for the future.