Publication: Transformative cyber security model for Malaysian government agencies
dc.FundingDetails | Universiti Sains Islam Malaysia: PPP/USG-0115/FST/30/11815 | |
dc.FundingDetails | Similar to the initiative of Malaysian government that is to have the support from the National Information Technology Council Malaysia, Law Enforcement Agencies and Regulators and the Cyber Security Malaysia, EU focuses on three main pillars that are the network and information security, law enforcement and defence with the incorporation of the academic industry. The difference between Malaysia�s and EU�s cyber security strategy is the EU has proposed integration and dependency of all these three pillars with each other in the national, EU and international level. At the national level, the members are required to state and understand clearly their roles and their responsibilities, share the new trends of attacks and optimize the proposed response actions [22]. At the EU level, collaboration is established to focus on the cyber-attack trend analysis, risk assessment, training and sharing of best practices. European Network and Information Security Agency (ENISA), European Cybercrime Centre (EC3) and EDA cyber defence together with CERT-EU are expected to support the development of trusted community using technical and policy experts. In addition to that, at the international level, the higher officials are aimed to promote a peaceful, open and transparent use of cyber technologies besides engaging themselves in policy dialogues with the international partners and organizations [22]. The EU cyber security strategy clarifies the principles that should be followed by the European Union countries; The EU's core values apply as much in the digital as in the physical world, protecting fundamental rights, freedom of expression, personal data and privacy, access for all, democratic and efficient multi-stakeholder governance, and a shared responsibility to ensure security. | |
dc.FundingDetails | This work was supported by the Universiti Sains Islam Malaysia (USIM) [Grant No: PPP/USG-0115/FST/30/11815]. | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.affiliations | Universiti Teknologi Malaysia (UTM) | |
dc.contributor.affiliations | Charles Darwin University | |
dc.contributor.author | Perumal S. | en_US |
dc.contributor.author | Pitchay S.A. | en_US |
dc.contributor.author | Samy G.N. | en_US |
dc.contributor.author | Shanmugam B. | en_US |
dc.contributor.author | Magalingam P. | en_US |
dc.contributor.author | Albakri S.H. | en_US |
dc.date.accessioned | 2024-05-28T08:24:35Z | |
dc.date.available | 2024-05-28T08:24:35Z | |
dc.date.issued | 2018 | |
dc.description.abstract | The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency's interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies' information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model. � 2018 Authors. | |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.14419/ijet.v7i4.15.21377 | |
dc.identifier.epage | 92 | |
dc.identifier.issn | 2227524X | |
dc.identifier.issue | 4 | |
dc.identifier.scopus | 2-s2.0-85054639246 | |
dc.identifier.spage | 87 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054639246&doi=10.14419%2fijet.v7i4.15.21377&partnerID=40&md5=b90dc9be9622085951b2f2103f97a0da | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/8520 | |
dc.identifier.volume | 7 | |
dc.language | English | |
dc.language.iso | en_US | en_US |
dc.publisher | Science Publishing Corporation Inc | en_US |
dc.relation.ispartof | International Journal of Engineering and Technology(UAE) | |
dc.source | Scopus | |
dc.subject | Cyber governance security | en_US |
dc.subject | Cyber security strategy | en_US |
dc.subject | Security defensive model | en_US |
dc.subject | Security threats | en_US |
dc.title | Transformative cyber security model for Malaysian government agencies | en_US |
dc.title.alternative | Int. J. Eng. Technol. | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Transformative cyber security model for Malaysian government agencies.pdf
- Size:
- 426.56 KB
- Format:
- Adobe Portable Document Format