Browsing by Author "Sundresan Perumal,"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Industrial Internet of Things (IIoT) of Forensic and Vulnerabilities(Universiti Sains Islam Malaysia, 2020-01) ;Venkata Venugopal Rao Gudlur, ;Vikneswara Abirama Shanmugan, ;Sundresan Perumal,Radin Maya Saphira Radin MohammedThe Industrial Internet-of-Things (IIoT) have changed the present world and future technology-based Industry 4.0, however the understanding of Industrial Internet of things (IIoT) has turned out to be big challenge as far as security concern. The main purpose of adopting and going with new technologies will bring new challenges with cybersecurity and will have more expose uncertain vulnerabilities in terms of AI and BI applications and usage with forensic investigation and accuracy of information sharing between smart devices. This paper composed on the utilization of Artificial Intelligence in securing required evidence for forensic investigation process. The legal methods are different as per region and industry, but the back-frame work and case-based thinking are similar. This framework is made from Intelligence systems such as AI and BI too dependent on the digital information from cloud server. The information from Business Intelligence (BI) and Artificial Intelligence (AI) intersects with data on cloud-based server requires more secure network process and firewall to prevent cyber intruders. This paper has discovered a few gaps on security issues and vulnerabilities where as it will cater proper IIoT based procedure for the Digital Forensic Investigation process. - Some of the metrics are blocked by yourconsent settings
Publication Influencing factors identification in smart society for insider threat in law enforcement agency using a mixed method approach(Springer Nature, 2021) ;Karthiggaibalan Kisenasamy, ;Sundresan Perumal, ;Valliappan RamanBalveer Singh Mahindar SinghOne of the main principle goals for threat protection is to understand the behavior of the employee. An employee who is trusted will have the potential to cause more harm to the organization by collapsing the stability of the computing systems. Thus, insider threat is one of the major security flaws and is very hard to overcome. Currently, in Royal Malaysian Police (RMP) organization, there is a lack of a framework to access such insider threats in their daily operations as well as no data dissemination Standard Operation Policies. Hence, the objective of this research study is to identify the insider threat factors in order to propose best practices, guidelines, policies and security procedures to effectively manage them. This research adapted a mix method approach which is the quantitative methodology in phase one followed by the qualitative method accomplished through semi-structured interviews in a second phase. In the quantitative phase, all the factors were verified and validated by distributing the survey questionnaire to 384 participants from different locations which include the RMP officer, security specialist and administrative officers. The outcome of quantitative data collection was categorized into eight specific influencing factors. These eight factors were further validated through an interview session with 50 participants. The identified factors will be used for design and development of information security best design practices and also as mitigation methods to reduce insider threat risk in the RMP organization.