Professional Documents
Culture Documents
A Research
Presented to the
College of Technology
CEBU TECHNOLOGICAL UNIVERSITY
Danao City, Cebu
In Partial Fulfillment
of the Requirements for the Course
RESEARCH 2
RESEARCHERS
Candol, Jhon Paulo
Dayday, Jaybe R.
Sarte, Eglecerio Jr.
Batucan, Verniel
INSTRUCTOR
Dr. Jeson A. Bustamante
June 2021
ACKNOWLEDGEMENT
The researcher’s wishes to express their deepest gratitude to the special people
who have extended their assistance for the success of this study,
The Almighty God, who is the source of life, strength of knowledge and wisdom.
To the fellow classmates, for sharing their knowledge and idea in helping the
researchers in the construction of the project.
To the respondents, for giving their full cooperation and for answering the
questions honestly.
To the beloved parents and guardians for untiring love and support especially
to the researcher financial aspects.
The Lord and Savior Jesus Christ, this piece of work was heartily offered.
And lastly, to Mr. Jeson A. Bustamante, Our instructor in this subject, for his
genuine apprehension, encouragement, patient and guidance and whose expertise and
knowledge were generously shared.
ABSTRACT
Through this research study, the researcher will find out if the computer security
management of CTU Danao campus satisfied students. The researcher will also explore
the ideas of the students based on their actual experience, observations and insights as
well. The respondents of this study are the 25 CTU Danao Campus students who take
up any courses under the school year 2020-2021. In order to come up answers from the
problem statements, the researcher used survey questionnaires and interview guide
questions to gather data. Finally, the researcher used random sampling in choosing its
respondents. Based on the findings, the researcher concludes that the performance of
satisfactory of Computer Security Management in CTU Danao Campus needs
improvement. This Study reveals that the students suffer some issues in computer
security where it can affect to do their task like editing, programs and etc. Thus, the
designed instructional material is recommended for implementation.
TABLE OF CONTENTS
Page
TITLE PAGE i
ACKNOWLEDGEMENT ii
ABSTRACT iii
TABLE OF CONTENTS iv
CHAPTER
INTRODUCTION
Rationale 1
THE PROBLEM
Definition of Terms 5
Studies 7
3 RESEARCH METHODOLOGY
Research Design 9
Research Environment 9
Research Instruments 10
Summary of Findings 16
Conclusion 18
Recommendation 18
BIBLIOGRAPHY 18
APPENDICES
Appendix A
Approval Letter
Appendix B
Research instrument
Appendix C
Documentation
Appendix D
Curriculum Vitae
CHAPTER ONE
INTRODUCTION
RATIONALE
Establishes a Computer System Security and Privacy Advisory Board within the
Department of Commerce to identify and advise the Bureau and the Secretary of
Commerce on, issues relating to computer systems security and privacy, and report
findings to the Secretary, the Director of the Office of Management and Budget, the
Director of the National Security Agency, and the appropriate congressional
committees.
Amends the Federal Property and Administrative Services Act of 1949 to require the
Secretary to promulgate standards and guidelines pertaining to Federal computer
systems based on standards developed by the Bureau. Authorizes the President to
disapprove or modify such standards and guidelines if such action would be in the
public interest. Requires that notice of such disapproval or modification be submitted to
the House Committee on Government Operations and the Senate Committee on
Governmental Affairs and published in the Federal Register. Directs the Secretary to
rescind or modify such standards or guidelines as directed by the President.
Requires each agency with a federal computer system to establish a plan for the
security and privacy of sensitive information. Requires the submission of such plans to
the Bureau and the National Security Agency for advice and comment. Subjects such
plans to disapproval by the Office of Management and Budget.
Provides that nothing in this Act shall be construed to: constitute authority to
withhold information sought under the Freedom of Information Act; or authorize any
Federal agency to limit, restrict, regulate, or control the collection, maintenance,
disclosure, use, transfer, or sale of any information that is privately-owned information,
information disclosable under the Freedom of Information Act or other law requiring or
authorizing the public disclosure of information, or information in the public
domain.Schools and universities face a number of challenges that businesses and other
organizations don't have to encounter. Whereas companies have their employees to
monitor and grant access to, schools must worry about teachers and students, who can
range anywhere from five-year-olds to full adults. In the case of schools with young
children, those kids often do not have the same legal obligations or face the same legal
ramifications if they should, intentionally or accidentally, access a network without
authorization. Students also tend to not understand the security threats out there related
to the internet and are more likely to use unsecured networks, download infected files,
or expose devices to malware. School structure can also be a major problem, with many
institutions of higher learning using a decentralized approach that creates multiple
networks that need protection. Schools are also dealing with students bringing more of
their own mobile devices to class, which itself can present many security issues. Couple
all these challenges with shrinking budgets, and it is easy to see how things can quickly
get out of control. All of this underscores the need for an effective network security
strategy.
For many schools, network security is not just an option, it is a necessity. We are
long past the days where each classroom had a single computer; students now
regularly have smartphones and tablets. Online access has also turned into a crucial
tool for learning. To make sure important school data and files are protected,
administrators need a stable security environment, which is where network security
comes in. A well-managed network security system will feature measures where
administrators can efficiently control and monitor what students and teachers access
while online. While web filters can certainly play a role in restricting certain websites,
network security can go much further by taking a more proactive approach in monitoring
online activity and blocking sites that may lead to security compromises.
This blocking action can go beyond the internet. Mobile devices have shown
to be a major source for malware, and oftentimes, students will be using an infected
device without even knowing it. Network security, often through network access control,
can detect when a device has been infected. When this happens, the device is then
blocked from connecting to the network and alerts IT about the infection. IT workers can
then go and clean the infected part of the device, which not only protects the network
but the user as well. Network security systems can also be robust and flexible, allowing
for various types of devices to connect provided they are able to pass the standards set
by administrators.
A good network security system found in schools will feature other security
measures such as anti-virus protection, firewalls, encryption, password protection, and
the latest upgrades and patches. All of these allow administrators to better monitor
individual devices and authenticate them for use on the network. This evaluation before
a device is granted access can be crucial for preventing attacks on network systems.
With so many sensitive records and files, administrators need to know exactly who and
what is accessing the network, which is why network access control is such a vital part
of network security.
The purpose of this study is to check the satisfactory of computer security in CTU
Danao campus.
The main objective of the study is to check the satisfactory of computer security
management in CTU Danao Campus.
The purpose of this study is to present several ways benefitting the following:
Students.
To have them guide and prevent them from the viruses, that may result of hacking
there accounts also to prevent malware, which allows programs to run quicker and
smoother.
Teachers.
To have an idea on how to make their computer security more effective and to prevent,
detect, contain, correct, and recover from security breaches and other information
assurance failures.
School Management
This may result of less computer security risk and helps the management to make their
computer security management more effective and efficient.
Future Researchers.
The result of this study will give a positive and negative result that future generations
may use to their study to develop more effective Computer security management and to
improve their strategy and knowledge in engaging research studies.
Satisfaction - The act of fulfilling a need, desire, or appetite, or the feeling gained from
such fulfillment.
CHAPTER TWO
The task of keeping a business network secure can be a daunting one, full of its
own challenges and setbacks. Now imagine the added complexities of network security
when the organization involved is a school or university.
CHAPTER THREE
RESEARCH METHODOLOGY
Research Design
The study will use an online survey using google docs. This type of research is a
qualitative research which aims to know and explain further the satisfactory of computer
security management in CTU Danao Campus. This method is suited to identify the
opinion of the respondents as regards to the level of performance of the computer and
the insights of the students.
Research Environment
The researchers will conduct the survey at CTU Danao Campus. This is located in
Sabang, Danao City along the Central Nautical Highway, with beyond 3,000 students.
Source: Google Map
Research Respondents
The respondents of the study include twenty-five (25) college students enrolled in Cebu
Technological University Danao Campus year 2020-2021. The random sampling as a
sampling technique was utilized.
Research Instruments
CHAPTER FOUR
This chapter presented, analyzed and interpreted all the data interpreted all the data
gathered in this study. Presentation was done using table and graphs.
GRAPH 1.
. There are 48% of students who answered that sometimes they are satisfied about the
computer security management in CTU Danao Campus, 36% of students feel satisfied,
the 12% of students answered very satisfied and 4% feels not at all satisfied.
GRAPH 2.
80%
70%
60%
50%
40%
30%
20%
10%
0%
STUDENTS PREFFERED ABOVE AVERAGE LEVEL GUARANTEE 100% OF PRACTICE OF
TO USE CTU GMAIL OF COMPUTER SAFENESS IN DEFENDING COMPUTER
ACCOUNT SECURITY COMPUTER SECURITY OR ELECTRONICS
SYSTEMS HELP
STUDENTS AVOID FROM
MALICIOUS ATTACKS OR
YES NO MAYBE SOMETIMES VIRUSES
STUDENT’S INSIGHTS AND RECOMMENDATION OF COMPUTER SECURITY
MANAGEMENT IN CTU DANAO CAMPUS
STATEMENT ANSWERS
Summary of Findings
The study is about the "Satisfactory of Computer Security Management in CTU Danao
Campus. Specifically, it seeks the answer to the main problem of determining the
insights of the students and the level of performance of the computer security
management in CTU Danao Campus.
GRAPH 1. Based on the findings, majority of the students answered that sometimes
they are satisfied about the computer security management in CTU Danao Campus
which is 48%, 36% of students feel satisfied, the 12% of students answered very
satisfied and 4% feels not at all satisfied.
GRAPH 2. Based on the findings, 36% of students saying that the challenges they face
in implementing an application security program is the lack of support or management
buy-in, 24% of students said that it is the lack of budget, lack of skills is what the 20% of
students said, lack of human resources is the challenges of the 16% of students and the
4% said there is no challenges.
GRAPH 3. In this area, 68% of the students answered "Yes", that they preferred to
make an account using the CTU Gmail, 12% of students who answered "Maybe" and
"Sometimes", both choices got 12% whom students are still undecided. The lowest
percentage is 8%, those are the students who answered "No" or who do not prefer to
make an account using the CTU Gmail.
There are 58.3% of students who answered maybe that the security level of CTU
Danao Campus is above average. 29.2% who said Yes that it is above average, 12.5%
answered no it is not above average. 62.5% of students said that maybe the computer
security in CTU Danao Campus is guaranteed 100% safeness, 25% of students who
said, " No it is not 100% safe" and the 12.5% of students answered "yes, it is 100%
safe".
In browsing the internet, there are 64% of students who feels neutral about the security
of their devices, 20% of the students who feels not secure at all, 16% of students who
somewhat feel secure and 0% of students who does feel very secure.
There are 44% who answered "Yes", that the practice of defending computers
servers, mobile devices, electronic systems, networks, and data helps students to avoid
from malicious attacks or viruses, and 32% of students who answered "Maybe", 20% of
students who answered "Sometimes" and 4% of students who answered "No".
Based on the lived experiences and observations of the students, Computer Security
Management in CTU Danao Campus should enhance their abilities to protect the
computer from malicious attacks and breaches. They tend to recommend some ways to
help like be cautious all the time, do not to access websites that are new to you. Those
websites that will give you uncertainties and compromise your security. Be more
cautious in handling personal information and accounts.
There are lots of ways to enhance student’s cyber security and one example of this is
the Web Application Protector this is a powerfully simple website protection against
DDoS and web application attacks. It reduces risks of downtime, data theft, and website
defacement. Protects against web attacks and DDoS. And Implements rule updates
automatically.
CONCLUSION
Based on the findings of the study, it can be drawn that the performance of
satisfactory of Computer Security Management in CTU Danao Campus needs
improvement.
This Study reveals that the students suffer some issues in computer security
where it can affect to do their task like editing, programs etc. Thus, the designed
instructional material is recommended for implementation.
RECOMMENDATION
Based on the findings and conclusion presented, the following recommendations are
suggested:
1. The researchers recommend that the CTU Danao Campus should take steps to
ensure that students are completely confident in their computer security when
accessing and browsing the internet.
2. The researchers recommend that the CTU Danao Campus should guarantee 100%
assurance in addressing network security system in school.
3. The researchers recommend that the CTU Danao Campus should install or develop
tools to identify cyber security breaches. This will cause a prompt to appear on the
computer that the student is using, alerting them to the attempted cyber security breach.
BIBLIOGRAPHY
Source: https://scholar.google.com.ph/scholar?
q=computer+security+research+articles&hl=en&as_sdt=0&as_vis=1&oi=scholart
#d=gs_qabs&u=%23p%3DUNA5SC0pMHUJ
Source: https://scholar.google.com.ph/scholar?
q=computer+security+research+articles&hl=en&as_sdt=0&as_vis=1&oi=scholart
#d=gs_qabs&u=%23p%3Dkm9n6jxEgwwJ
Donn B Parker Reston (1981) The text describes types of information systems.
Source: https://scholar.google.com.ph/scholar?
q=computer+security+research+articles&hl=en&as_sdt=0&as_vis=1&oi=scholart
#d=gs_qabs&u=%23p%3DUNA5SC0pMHUJ
APPENDICES
Appendix A
APPROVAL LETTER
Appendix B
INFORMANT CONSENT
Appendix C
RESEARCH INSTRUMENT
Appendix D
DOCUMENTATION
Appendix E