Table of Contents Introduction2 Organization structure

Table of Contents
Introduction2
Organization structure, School of ICT, IBTE3
A)4
B)5
Layout of the office12,13
C)14
Software………………………………………………………………………………………………………………………………………….14
Hardware…………………………………………………………………………………………………………………………………………16
Conclusion……………………………………………………………………………………………………………………………………….17
References………………………………………………………………………………………………………………………………………18
Appendices……………………………………………………………………………………………………………………………….……19
Introduction:

Students have been tasked by this assignment to conduct a mini research on their school of ICT for IBTE HQ. The students are tasked to research on the school’s organization chart, the programs provided by the school, the number of staff’s, both teaching and non-teaching and how many students learning in the school of ICT. The students were also tasked to research and examine the existing school and office furniture used by both the staff and students and also the cyber threats that may happen or already happened in the hardware and the computers in the classrooms and office. The students will meet the supervising instructor through 3 separate meetings, the first one being to plan the research with the supervising instructor, the second one is to discuss the research findings and the third one to discuss and improve the findings.
-96253269507Organization Structure, School of ICT, IBTE Sultan Bolkiah Campus.

5140960248181700-548640829176Dk Siti Hairani Pg Burut
Program Leader
Service class
Coordinator
Norini binti Haji Jaya
APL HNTEC IT / HSE Focal person
Nuralizan binti Abdullah Langkan
APL NTEC IT
Dr Herbert Raj
Perianayagam
HNTEC 13
Mohd Rizal bin Hj Hendry
First aider
Muhammad Yassir bin Manan
NTEC 11
Jalimahtunah binti HJ Muhammad
NTEC 12
Shahrul Azmi bin Tengah
IT admin/manager/
Fire Marshall
Rahim bin Hj Omar
Assistant technianMd Azbe Hidayatullah bin Zainul AriffinAssistant technician
00Dk Siti Hairani Pg Burut
Program Leader
Service class
Coordinator
Norini binti Haji Jaya
APL HNTEC IT / HSE Focal person
Nuralizan binti Abdullah Langkan
APL NTEC IT
Dr Herbert Raj
Perianayagam
HNTEC 13
Mohd Rizal bin Hj Hendry
First aider
Muhammad Yassir bin Manan
NTEC 11
Jalimahtunah binti HJ Muhammad
NTEC 12
Shahrul Azmi bin Tengah
IT admin/manager/
Fire Marshall
Rahim bin Hj Omar
Assistant technianMd Azbe Hidayatullah bin Zainul AriffinAssistant technician
HEAD OF ICT
About your school of ICT Jefri Bolkiah/Sultan Saiful Rijal/Sultan Bolkiah Campus.

Sultan Bolkiah Campus’s School of ICT comprises of 85 students, which are 38 from the NTEC course and 47 from the HNTEC course. The NTEC are separated into two groups and the HNTEC are also separated into two groups. One of the instructors from school of ICT are also teaching IT for engineering course students because of the lack of IT instructors for their course. School of ICT also has seconded instructors from other school of ICT to teach the NTEC students due to the shortage of instructors.

School of ICT are offering courses which are:
Program name Duration of program
HNTEC in computer networking 2 Years (21 months in school, 3 months attachment)
HNTEC in information and library studies HNTEC in information technology NTEC in information technology 1 year (9 months in school, 3 months attachment)
About the office furniture used in the school and make recommendations.

4038602505710Figure SEQ Figure * ARABIC 1
Figure SEQ Figure * ARABIC 1
40386022397300
In the office, the arrangement of furniture (tables and chairs) are not good, causing the office to look crowded and hard to move around.
The recommendation is to make full use of the gaps between tables, maximizing the full use of the space in between the tables, making the space around the office much bigger
poor natural air flow in the office which may be unhealthy for the lungs.
The recommendation is to open the office windows once in a while to let the natural air in.

46082900041402001333500
right234315Figure SEQ Figure * ARABIC 2
00Figure SEQ Figure * ARABIC 2

Poor wire management in the office could cause unwanted events such as electrocution or tripping over the wires.
The recommendation is to put wire cover on top of the exposed wires or placing them below the flooring where it is not seen.

The wooden floor in the office may be slippery and may cause people to fall over.
The recommendation is to change the wooden flooring to tiles which are less slippery or keeping the floor dry at all times.

48641011049000
46990019685Figure SEQ Figure * ARABIC 3
0Figure SEQ Figure * ARABIC 3

Too much extra chairs in the class which can be a nuisance during learning hours.

The recommendation is by storing the extra chairs in the school store to prevent clustering.

477520000
47498012065Figure SEQ Figure * ARABIC 4
Figure SEQ Figure * ARABIC 4

Some class chairs are broken which may cause accidents if not handled soon.
The recommendation is to either fix the chairs or to throw the broken chairs away.

Some of the tables in the class are chipped off, showing its insides.

The recommendation is to replace the tables with new ones, or not using it.

482600133350033813751206500
478790139700Figure SEQ Figure * ARABIC 5
00Figure SEQ Figure * ARABIC 5

Some air conditioners in the class and labs are not working and broken because of the heavy usage of it.
The recommendation is to find what is wrong and then fix and service the air conditioners, followed by a lessened use of the air conditioners.

4908552121535Figure SEQ Figure * ARABIC 6
Figure SEQ Figure * ARABIC 6
491036390100
some of the lights in class and labs are not working or broken which may cause nuisance during class.
The recommendation is to replace it with new, more durable working lights and not to abuse its usage.

4514851530350Figure SEQ Figure * ARABIC 7
Figure SEQ Figure * ARABIC 7
4514851270000
classrooms are very dusty and not cleaned properly.

The recommendation is to organize a cleaning campaign with the students to clean the school of ICT area.

4889502413000
485140242570Figure SEQ Figure * ARABIC 8
Figure SEQ Figure * ARABIC 8

The placements of the fire extinguisher in the office are not correctly placed.

The recommendation is by placing them at a much better place where it is easily reachable in the events of a fire breakout.

fire extinguisher replacements for future school of ICT use.

the recommendation is by putting fire extinguisher replacements if the ones put in place are not working.

51344313062800
546100133350Figure SEQ Figure * ARABIC 9
Figure SEQ Figure * ARABIC 9

projector screen holder in the lab broke which may cause unwanted events during class.
The recommendation is to fix it as soon as possible.

485140127000
4699006985Figure SEQ Figure * ARABIC 10
Figure SEQ Figure * ARABIC 10

The office pantry is very small and hard to move around.
The recommendation is to rework the pantry area to give it more space to move around properly and to maybe put in better necessities and facilities such as a better sink and refrigerator.
4965702291715Figure SEQ Figure * ARABIC 11
Figure SEQ Figure * ARABIC 11
4965701397000
some of the power sockets in the lab and class are not working in the classrooms and in the office.

the recommendation is to fix the broken power sockets or put a “not working” sign on it.

Ergonomics:
When using a computer, the sitting position and body posture must be correct. The picture below is an example of a wrong sitting position and body posture. He is also looking to close at the computer screen.

center15875000
Recommendation
Sit straight with good body posture by leaning back to the chair and not looking to close to the screen. The eyes must be at least 30 cm from the screen.

102933520193000
The old layout of Sultan Bolkiah campus’s school of ICT office.

4648202286000
-381000361950Table
Chair
Wall
Divider
Door
Pantry
00Table
Chair
Wall
Divider
Door
Pantry

214156519685Diagram 1
0Diagram 1

This is the old layout of Sultan Bolkiah campus’s school of ICT office. It shows the placement of the instructor’s tables and chairs within the office. the placement makes the office very small, crowded and confined with not much space to move around followed by a very small path going to the middle of the office, a small pantry area and lack of space for other office necessities such as an office printer, meeting table and much more.

The new proposed layout of Sultan Bolkiah campus’s school of ICT office after a few reworks.

565911985598001310640510540003261360235458000424815029400531486473086115264150295910
7355092286000
-213360256540
left8890Table
Chair
Wall
Divider
Door
Pantry
Table
Chair
Wall
Divider
Door
Pantry

235128636195Diagram 2
0Diagram 2

This is the new proposed layout of Sultan Bolkiah campus’s school of ICT office after a few small reworks to make the office much more spacious and easier to move around. The path going to the middle of the office is a bit bigger now, the pantry area reworked, taking some space from the H.O.D office and the middle of the are now more spacious to put in office necessities such as an office printer, meeting table and much more.

About Cyber Threats issues and their counter measures.

Cyber threat is a destructive act of accessing a computer network through a data communications pathway without authorization from the owner. It is executed by hackers who try to access an individual’s information for their own personal gain. The effects of cyber threats are sometimes not very obvious and are often very deceiving and misleading.

Cyber threats come in many forms and function in different ways. It attacks in the form of malware, phishing, ransomware and many more in the form of virus attacks.

In the School of ICT, the cyber threat issues are divided into two parts, Software and Hardware:
Software
Link security
Direct contact is one way to create a vulnerability in the system such as checking an email from an unknown email or website because the objective is to get the user to click on a link.

769620635000
77754151769Figure SEQ Figure * ARABIC 13
Figure SEQ Figure * ARABIC 13

Recommendation
By making sure the security settings for the browser the owner is using is secure from all kinds of unwanted attacks.

Unknown devices
4343402761615Figure SEQ Figure * ARABIC 14
0Figure SEQ Figure * ARABIC 14
348333884001400Devices such as a pen drive, external hard disk, memory card and many more can be a threat to a computer because the devices are maybe carrying a virus that can corrupt the software inside, causing many more problems.

4350664644600Recommendation
Installing a powerful antivirus that can immediately detect and remove unwanted viruses.

Old technology
Old devices such as computers are easily attacked by viruses because of the security vulnerability in the windows operating systems. Newer computers may not get this problem but with constant flow of newer, much harder viruses, old and new computers alike may be at risk.

Recommendation
By tracking the devices, blocking certain software and applications and by constantly checking for software upgrades. Upgrading the computer is also an ideal solution.

Hardware
Malfunction
Computer peripherals such as keyboard, mouse, monitor, CPU and projector are prone to malfunction because of the constant use by many users at the school.

37985702070100044577020701000
449580255905Figure SEQ Figure * ARABIC 15
0Figure SEQ Figure * ARABIC 15

Recommendation
Setting up a rule where the computer peripherals must be well cared when in use and by constantly checking the peripherals if its broken or not.

Conclusion:
In conclusion, this assignment teaches on how to do the research, providing the students doing the report with enough understanding and knowledge on the school of ICT’s organization and programs. The students also learned about the nature of the existing office and classroom furniture, the effect it has on the ergonomics and to prevent unwanted events and the impact of cyber threats in the computer software and hardware and giving recommendations on how to overcome or to counter the problems that arise.
424116545148500227942845104200Appendices:
4754245159893000134366014751050054610143065500left8699500
34036002413000
513875421242500
318168140976700308496410389610034073437286001499670912400left942400
495681020701000206933121316000
499948812245140034937701195705001847750108020200185821189800
59557494600
1889960-14364400
References:
(For more details, see the eschoolnews’s official website)
By earl D. laing (2017) The top 5 cybersecurity threats in schools. Retrieved September 3,2018, from eschoolnews website: https://www.eschoolnews.com/2017/11/29/cybersecurity-threats-schools/(for more details, see the CIO whitepapers review’s official website)
By CIO whitepapers review (2018) what is cyber threats. Retrieved September 3, 2018, from CIO whitepapers review website: https://whatis.ciowhitepapersreview.com/definition/cyber-threats/