Publication:
Transformative cyber security model for Malaysian government agencies

dc.FundingDetailsUniversiti Sains Islam Malaysia: PPP/USG-0115/FST/30/11815
dc.FundingDetailsSimilar to the initiative of Malaysian government that is to have the support from the National Information Technology Council Malaysia, Law Enforcement Agencies and Regulators and the Cyber Security Malaysia, EU focuses on three main pillars that are the network and information security, law enforcement and defence with the incorporation of the academic industry. The difference between Malaysia�s and EU�s cyber security strategy is the EU has proposed integration and dependency of all these three pillars with each other in the national, EU and international level. At the national level, the members are required to state and understand clearly their roles and their responsibilities, share the new trends of attacks and optimize the proposed response actions [22]. At the EU level, collaboration is established to focus on the cyber-attack trend analysis, risk assessment, training and sharing of best practices. European Network and Information Security Agency (ENISA), European Cybercrime Centre (EC3) and EDA cyber defence together with CERT-EU are expected to support the development of trusted community using technical and policy experts. In addition to that, at the international level, the higher officials are aimed to promote a peaceful, open and transparent use of cyber technologies besides engaging themselves in policy dialogues with the international partners and organizations [22]. The EU cyber security strategy clarifies the principles that should be followed by the European Union countries; The EU's core values apply as much in the digital as in the physical world, protecting fundamental rights, freedom of expression, personal data and privacy, access for all, democratic and efficient multi-stakeholder governance, and a shared responsibility to ensure security.
dc.FundingDetailsThis work was supported by the Universiti Sains Islam Malaysia (USIM) [Grant No: PPP/USG-0115/FST/30/11815].
dc.contributor.affiliationsFaculty of Science and Technology
dc.contributor.affiliationsUniversiti Sains Islam Malaysia (USIM)
dc.contributor.affiliationsUniversiti Teknologi Malaysia (UTM)
dc.contributor.affiliationsCharles Darwin University
dc.contributor.authorPerumal S.en_US
dc.contributor.authorPitchay S.A.en_US
dc.contributor.authorSamy G.N.en_US
dc.contributor.authorShanmugam B.en_US
dc.contributor.authorMagalingam P.en_US
dc.contributor.authorAlbakri S.H.en_US
dc.date.accessioned2024-05-28T08:24:35Z
dc.date.available2024-05-28T08:24:35Z
dc.date.issued2018
dc.description.abstractThe growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency's interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies' information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model. � 2018 Authors.
dc.description.natureFinalen_US
dc.identifier.doi10.14419/ijet.v7i4.15.21377
dc.identifier.epage92
dc.identifier.issn2227524X
dc.identifier.issue4
dc.identifier.scopus2-s2.0-85054639246
dc.identifier.spage87
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85054639246&doi=10.14419%2fijet.v7i4.15.21377&partnerID=40&md5=b90dc9be9622085951b2f2103f97a0da
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/8520
dc.identifier.volume7
dc.languageEnglish
dc.language.isoen_USen_US
dc.publisherScience Publishing Corporation Incen_US
dc.relation.ispartofInternational Journal of Engineering and Technology(UAE)
dc.sourceScopus
dc.subjectCyber governance securityen_US
dc.subjectCyber security strategyen_US
dc.subjectSecurity defensive modelen_US
dc.subjectSecurity threatsen_US
dc.titleTransformative cyber security model for Malaysian government agenciesen_US
dc.title.alternativeInt. J. Eng. Technol.en_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Transformative cyber security model for Malaysian government agencies.pdf
Size:
426.56 KB
Format:
Adobe Portable Document Format

Collections