Browsing by Author "Syaril Nizam Omar"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Countermeasures of Unintentional Insider Threats: A Systematic Review(Penerbit USIM, Universiti Sains Islam Malaysia, 2020-12-25) ;Zainab A.A.Abdelsadeq ;Nurlida Basir ;Syaril Nizam OmarNur Fatin Nabila Binti Mohd Rafei HengThe majority of the organizations see technical controls as the solution to their problems around information security. Moreover, it was obviously proved with providing all of these technological techniques that errors of human are not avoidable Unintentional Insider Threats (UIT) are the biggest insider risk of all, which defined as an employee former/current, business partner or contractor who had/ has access authority to the network, system or data of an organization and who, without malicious intent, damages the organization's information or information systems through action or inaction. Thus the objective of this paper is to; determine the countermeasures of UITs have been reported in the literature. This paper achieves a structured literature review of a wide collection of existing literature on UITs countermeasures. The review of literature identified a group of significant countermeasures against UITs which Can be used for improve organizations’ security policy for reducing and minimizing reducing the risks connected to UITs. - Some of the metrics are blocked by yourconsent settings
Publication DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution(International Journal of Computer Science Issues, 2011) ;Abdulrahman H. Altalhi ;Md Asri Ngadi ;Syaril Nizam OmarZailani Mohamed SidekThe covert channel is a method used to send secret data within a communication channel in unauthorized ways. This is performed by exploiting the weaknesses in packet or network communications with the intention to hide the existence of a covert communication. The DNS identification (DNS ID) method has been exploited by Thyer. However, the major problem in Thyers implementation is that the encrypted cipher was directly inserted as a DNS ID value, which is abnormal, compared to the normal DNS ID distribution. We have overcome this problem through the application of Steganography to insert the cipher value into the DNS ID. The data set test for normal DNS ID is taken from MAWI. We tested four different message lengths and plotted the distribution graph. We found that the proposed result is normal compared to normal distribution of the DNS ID. Therefore, this method produces a normal distribution for DNS ID covert channel. - Some of the metrics are blocked by yourconsent settings
Publication Forensic Evidence As A Mean Of Proof In Developing Prima Facie Case In Takhbib Criminal Offence(UUM PRESS, 2022) ;Muhammad Hazim Ahmad; ;Hasnizam Hashim ;Ruqayyah Razak ;Nurul Syahirah SaharudinSyaril Nizam OmarA third party’s intervention has been one of the most significant factors in Malaysian divorce cases. Third parties may come from family members and non-family members. This interference is called takhbīb. Within the scope of Malaysian Syariah criminal law, tahkbib is regarded as a criminal offence. However, it is difficult to prove this criminal offence. None of the Syariah law journals reported cases that could be used as reference or case studies. This article proposes a method of proof, which is practical and can be carried out in the Syariah courts to prove the criminal offence of takhbīb. In gathering and compiling the necessary data and related materials, this qualitative study embraced document analysis as a research method. These data are inductively evaluated by implementing qualitative content analysis. This study showed several obstacles in the development of a prima facie prosecution by the Syarie Public Prosecutor, including the absence of eyewitnesses present as evidence. Third-party intrusion is commonly committed through social networks such as WhatsApp, Telegram, WeChat, and Facebook Messenger. The use of such media networks as a medium of contact may also be brought as part of the evidence before the Syariah courts. The best mechanism to be implemented in this case is by using digital forensics and expert opinion. The digital forensic investigator will track or archive the communications from the social media, and deliver them in the form of a written text. In terms of proving the commission of takhbīb criminal offence, this study contributes to the improvement of the Syariah legal system. In short, the law still provides a method of proving criminal offences. Any legal practitioner should make good use of statutory provisions instead of suggesting amendments to it. - Some of the metrics are blocked by yourconsent settings
Publication IoT-based botnet attacks systematic mapping study of literature(Springer International Publishing, 2021) ;Habiba Hamid ;Rafidah Md Noor ;Syaril Nizam Omar ;Ismail Ahmedy ;Shaik Shabana Anjum ;Syed Adeel Ali Shah ;Sheena Kaur ;Fazidah OthmanEmran Mohd TamilThe rapid escalation in the usage of the Internet of Things (IoT) devices is threatened by botnets. The expected increase in botnet attacks has seen numerous botnet detection/mitigation proposals from academia and industry. This paper conducts a systematic mapping study of the literature so as to distinguish, sort, and synthesize research in this domain. The investigation is guided by various research questions that are relevant to the botnet studies. In this research, a total of 3,645 studies were gotten from our preliminary pursuit outcomes. Seventy four (74) studies were recognized based on importance, of which 52 were at last picked dependent on our characterized Incorporation and Elimination criteria. A classification for the mapping study with the following components: key contribution, research aspect, validation methods, network forensic methods, datasets and evaluation metric was proposed. Likewise, in this study, we identified eleven (11) key contributions which include evaluation, approach, model, system, software architecture, method, technique, framework, mechanism, algorithm and dataset. The findings of this systematic mapping investigation demonstrate that exploration of IoT-based botnet attacks is picking up more consideration in the past three years with steady distribution yield. Finally, this investigation can be a beginning point in examining researches on botnet assaults in IoT devices and finding better ways to detect and mitigate such assaults. - Some of the metrics are blocked by yourconsent settings
Publication The New Approach Of Understanding Hadiths Kawni Through Scientific Facts(Human Resource Management Academic Research Society, 2020) ;Helimy Aris ;Syaril Nizam OmarNazri MuslimNabawi Hadith is the second source of Islamic Shari’a revealed by Allah s.w.t to MuHammad s.a.w. Other than explaining the laws, it also elaborates on matters related to the universe and humans (hadith kawni). Some of the hadiths include the group of mushkil al-hadith. In line with the exponential development of scientific fields, some of the scholars have benefited from scientific research in their understanding of the hadith texts. In most of the circumstances, scientific interpretations and iʿjaz ʿilmi are seen to highlight the image of Islam as the religion of knowledge and science, sometimes causing some parties to make scientific interpretation blindly and carelessly. This study seeks to explain the guideline (dawabit) in understanding kawni hadiths through scientific research. The study outcome shows that scientific facts can be benefited as the wasilah in understanding kawni hadiths. - Some of the metrics are blocked by yourconsent settings
Publication A Review On Wireless Sensor Networks Routing Protocol:Challenge In Energy Perspective(Academic Journals, 2011) ;Ismail Ahmedy ;Md. Asri Ngadi, ;Syaril Nizam OmarJunaid ChaudhryWireless sensor networks (WSNs) technology consists of a number of sensor nodes that are dispersed in a geographically distributed area usually for monitoring purposes. The widespread applications of WSN have fueled the emergence and acceptance of this technology as a frontrunner. However, the success of the wireless sensor network applications highly depends on the reliable communication among the sensor nodes. One of the major problems in wireless sensor network environments is the limitation of the physical resource that is energy resources. The node energy is a critical constraint that needs addressing in order to achieve the demanding goals of wireless sensor network applications. High energy consumption in the sensor node occurs when data is disseminated to the other nodes in wireless sensor networks. Data delivery in specific time slot holds the key position for the successful completion of tasks assigned to sensor nodes and hence the application those sensors are serving. The wireless sensor network applications are in high demand nowadays. Time delay in packet delivery can save lives. The data in WSN hops from one node to another in order to reach the destination if the receiver node is not in a direct radio range of the sender. This paper provides a critical analysis on the impact of the previous methods on the reliability and energy efficiency for routing protocol in multi-hop wireless sensor networks. At the end of this paper, a characterized comparison has been forwarded on these methods based on the analysis outcome.