Table of ContentsIntroduction2Organization structure, School of ICT, IBTE3A)4B)5Layout of the office12,13C)14Software………………………………………………………………………………………………………………………………………….
14Hardware…………………………………………………………………………………………………………………………………………16Conclusion……………………………………………………………………………………………………………………………………….17References………………………………………………………………………………………………………………………………………18Appendices……………………………………………………………………………………………………………………………….……19Introduction: Students have been tasked by this assignment to conduct a mini research on their school of ICT for IBTE HQ. The students are tasked to research on the school’s organization chart, the programs provided by the school, the number of staff’s, both teaching and non-teaching and how many students learning in the school of ICT. The students were also tasked to research and examine the existing school and office furniture used by both the staff and students and also the cyber threats that may happen or already happened in the hardware and the computers in the classrooms and office. The students will meet the supervising instructor through 3 separate meetings, the first one being to plan the research with the supervising instructor, the second one is to discuss the research findings and the third one to discuss and improve the findings. -96253269507Organization Structure, School of ICT, IBTE Sultan Bolkiah Campus.
5140960248181700-548640829176Dk Siti Hairani Pg BurutProgram LeaderService classCoordinator Norini binti Haji JayaAPL HNTEC IT / HSE Focal personNuralizan binti Abdullah LangkanAPL NTEC ITDr Herbert RajPerianayagamHNTEC 13Mohd Rizal bin Hj HendryFirst aiderMuhammad Yassir bin MananNTEC 11Jalimahtunah binti HJ MuhammadNTEC 12Shahrul Azmi bin TengahIT admin/manager/Fire MarshallRahim bin Hj OmarAssistant technianMd Azbe Hidayatullah bin Zainul AriffinAssistant technician00Dk Siti Hairani Pg BurutProgram LeaderService classCoordinator Norini binti Haji JayaAPL HNTEC IT / HSE Focal personNuralizan binti Abdullah LangkanAPL NTEC ITDr Herbert RajPerianayagamHNTEC 13Mohd Rizal bin Hj HendryFirst aiderMuhammad Yassir bin MananNTEC 11Jalimahtunah binti HJ MuhammadNTEC 12Shahrul Azmi bin TengahIT admin/manager/Fire MarshallRahim bin Hj OmarAssistant technianMd Azbe Hidayatullah bin Zainul AriffinAssistant technicianHEAD OF ICTAbout your school of ICT Jefri Bolkiah/Sultan Saiful Rijal/Sultan Bolkiah Campus.Sultan Bolkiah Campus’s School of ICT comprises of 85 students, which are 38 from the NTEC course and 47 from the HNTEC course. The NTEC are separated into two groups and the HNTEC are also separated into two groups.
One of the instructors from school of ICT are also teaching IT for engineering course students because of the lack of IT instructors for their course. School of ICT also has seconded instructors from other school of ICT to teach the NTEC students due to the shortage of instructors.School of ICT are offering courses which are:Program name Duration of programHNTEC in computer networking 2 Years (21 months in school, 3 months attachment)HNTEC in information and library studies HNTEC in information technology NTEC in information technology 1 year (9 months in school, 3 months attachment)About the office furniture used in the school and make recommendations.4038602505710Figure SEQ Figure * ARABIC 1Figure SEQ Figure * ARABIC 140386022397300In the office, the arrangement of furniture (tables and chairs) are not good, causing the office to look crowded and hard to move around. The recommendation is to make full use of the gaps between tables, maximizing the full use of the space in between the tables, making the space around the office much biggerpoor natural air flow in the office which may be unhealthy for the lungs. The recommendation is to open the office windows once in a while to let the natural air in.46082900041402001333500right234315Figure SEQ Figure * ARABIC 200Figure SEQ Figure * ARABIC 2Poor wire management in the office could cause unwanted events such as electrocution or tripping over the wires. The recommendation is to put wire cover on top of the exposed wires or placing them below the flooring where it is not seen.
The wooden floor in the office may be slippery and may cause people to fall over. The recommendation is to change the wooden flooring to tiles which are less slippery or keeping the floor dry at all times.4864101104900046990019685Figure SEQ Figure * ARABIC 30Figure SEQ Figure * ARABIC 3Too much extra chairs in the class which can be a nuisance during learning hours. The recommendation is by storing the extra chairs in the school store to prevent clustering.47752000047498012065Figure SEQ Figure * ARABIC 4Figure SEQ Figure * ARABIC 4Some class chairs are broken which may cause accidents if not handled soon. The recommendation is to either fix the chairs or to throw the broken chairs away.
Some of the tables in the class are chipped off, showing its insides.The recommendation is to replace the tables with new ones, or not using it.482600133350033813751206500478790139700Figure SEQ Figure * ARABIC 500Figure SEQ Figure * ARABIC 5Some air conditioners in the class and labs are not working and broken because of the heavy usage of it. The recommendation is to find what is wrong and then fix and service the air conditioners, followed by a lessened use of the air conditioners.4908552121535Figure SEQ Figure * ARABIC 6Figure SEQ Figure * ARABIC 6491036390100some of the lights in class and labs are not working or broken which may cause nuisance during class.
The recommendation is to replace it with new, more durable working lights and not to abuse its usage.4514851530350Figure SEQ Figure * ARABIC 7Figure SEQ Figure * ARABIC 74514851270000classrooms are very dusty and not cleaned properly. The recommendation is to organize a cleaning campaign with the students to clean the school of ICT area.4889502413000485140242570Figure SEQ Figure * ARABIC 8Figure SEQ Figure * ARABIC 8The placements of the fire extinguisher in the office are not correctly placed. The recommendation is by placing them at a much better place where it is easily reachable in the events of a fire breakout.fire extinguisher replacements for future school of ICT use.the recommendation is by putting fire extinguisher replacements if the ones put in place are not working.
51344313062800546100133350Figure SEQ Figure * ARABIC 9Figure SEQ Figure * ARABIC 9projector screen holder in the lab broke which may cause unwanted events during class. The recommendation is to fix it as soon as possible.4851401270004699006985Figure SEQ Figure * ARABIC 10Figure SEQ Figure * ARABIC 10The office pantry is very small and hard to move around. The recommendation is to rework the pantry area to give it more space to move around properly and to maybe put in better necessities and facilities such as a better sink and refrigerator.
4965702291715Figure SEQ Figure * ARABIC 11Figure SEQ Figure * ARABIC 114965701397000some of the power sockets in the lab and class are not working in the classrooms and in the office.the recommendation is to fix the broken power sockets or put a “not working” sign on it.Ergonomics:When using a computer, the sitting position and body posture must be correct.
The picture below is an example of a wrong sitting position and body posture. He is also looking to close at the computer screen.center15875000RecommendationSit straight with good body posture by leaning back to the chair and not looking to close to the screen. The eyes must be at least 30 cm from the screen.102933520193000The old layout of Sultan Bolkiah campus’s school of ICT office.4648202286000-381000361950TableChairWallDividerDoorPantry00TableChairWallDividerDoorPantry214156519685Diagram 10Diagram 1This is the old layout of Sultan Bolkiah campus’s school of ICT office.
It shows the placement of the instructor’s tables and chairs within the office. the placement makes the office very small, crowded and confined with not much space to move around followed by a very small path going to the middle of the office, a small pantry area and lack of space for other office necessities such as an office printer, meeting table and much more.The new proposed layout of Sultan Bolkiah campus’s school of ICT office after a few reworks.5659119855980013106405105400032613602354580004248150294005314864730861152641502959107355092286000-213360256540left8890TableChairWallDividerDoorPantryTableChairWallDividerDoorPantry235128636195Diagram 20Diagram 2This is the new proposed layout of Sultan Bolkiah campus’s school of ICT office after a few small reworks to make the office much more spacious and easier to move around. The path going to the middle of the office is a bit bigger now, the pantry area reworked, taking some space from the H.O.
D office and the middle of the are now more spacious to put in office necessities such as an office printer, meeting table and much more.About Cyber Threats issues and their counter measures.Cyber threat is a destructive act of accessing a computer network through a data communications pathway without authorization from the owner. It is executed by hackers who try to access an individual’s information for their own personal gain.
The effects of cyber threats are sometimes not very obvious and are often very deceiving and misleading.Cyber threats come in many forms and function in different ways. It attacks in the form of malware, phishing, ransomware and many more in the form of virus attacks.In the School of ICT, the cyber threat issues are divided into two parts, Software and Hardware:SoftwareLink securityDirect contact is one way to create a vulnerability in the system such as checking an email from an unknown email or website because the objective is to get the user to click on a link.76962063500077754151769Figure SEQ Figure * ARABIC 13Figure SEQ Figure * ARABIC 13RecommendationBy making sure the security settings for the browser the owner is using is secure from all kinds of unwanted attacks.
Unknown devices4343402761615Figure SEQ Figure * ARABIC 140Figure SEQ Figure * ARABIC 14348333884001400Devices such as a pen drive, external hard disk, memory card and many more can be a threat to a computer because the devices are maybe carrying a virus that can corrupt the software inside, causing many more problems.4350664644600Recommendation Installing a powerful antivirus that can immediately detect and remove unwanted viruses.Old technologyOld devices such as computers are easily attacked by viruses because of the security vulnerability in the windows operating systems. Newer computers may not get this problem but with constant flow of newer, much harder viruses, old and new computers alike may be at risk.RecommendationBy tracking the devices, blocking certain software and applications and by constantly checking for software upgrades. Upgrading the computer is also an ideal solution.HardwareMalfunctionComputer peripherals such as keyboard, mouse, monitor, CPU and projector are prone to malfunction because of the constant use by many users at the school.37985702070100044577020701000449580255905Figure SEQ Figure * ARABIC 150Figure SEQ Figure * ARABIC 15RecommendationSetting up a rule where the computer peripherals must be well cared when in use and by constantly checking the peripherals if its broken or not.
Conclusion:In conclusion, this assignment teaches on how to do the research, providing the students doing the report with enough understanding and knowledge on the school of ICT’s organization and programs. The students also learned about the nature of the existing office and classroom furniture, the effect it has on the ergonomics and to prevent unwanted events and the impact of cyber threats in the computer software and hardware and giving recommendations on how to overcome or to counter the problems that arise. 424116545148500227942845104200Appendices:4754245159893000134366014751050054610143065500left869950034036002413000513875421242500318168140976700308496410389610034073437286001499670912400left942400495681020701000206933121316000499948812245140034937701195705001847750108020200185821189800595574946001889960-14364400References:(For more details, see the eschoolnews’s official website)By earl D. laing (2017) The top 5 cybersecurity threats in schools. Retrieved September 3,2018, from eschoolnews website: https://www.
eschoolnews.com/2017/11/29/cybersecurity-threats-schools/(for more details, see the CIO whitepapers review’s official website)By CIO whitepapers review (2018) what is cyber threats. Retrieved September 3, 2018, from CIO whitepapers review website: https://whatis.ciowhitepapersreview.com/definition/cyber-threats/