International Journal of Academic Research in Business and Social Sciences

search-icon

Information Security Challenges: A Malaysian Context

Open access
Information security sometimes known as Cybersecurity is the practice or action taken to prevent unauthorized access, use, disclosure, disruption, modification or destruction towards information. The cybersecurity is a concern for all. Data centres play important roles in managing data and information of an organization. Digital technology has become most important key to increase the level of innovation, competitiveness and growth. The economy sector is depending on effective measures to protect information in organization. Information plays an important part in giving services to people. At the same time, problems of intruders or attackers that we might not run away from it. In Malaysia, the CyberSecurity Malaysia is the agency dealing with defending the nation from cyber-attacks. Several functions initiated by the body to educate internet users and to prevent from attacks.
Mohsen, A. S. (2017, May 16). WannaCry Ransomware: You Are at a Risk. The Sun
Newspaper, p. 1 & 3.

Computer World Malaysia (2017). CyberSecurity Malaysia Issues New National
Ransomware Warning. Retrieved on 8 May 2017, from https://www.computerworld.com.my/resource/security/cybersecurity-malaysia-issues-new-national-ransomware-warning/

Cybersecurity Malaysia. Statistics: Retrieved on 9 May 2017, from
https://www.mycert.org.my/statistics/2017.php

Digital Detox [Def. 1]. (n.d.). In English Oxford Living Dictionary, Retrieved May 17, 2017,
from https://en.oxforddictionaries.com/definition/digital_detox

Kim, E.B. (2014). Recommendations for Information Security Awareness Training for
College Students. Information Management & Computer Security, 22 (1), 115-126. Retrieved 10 May 2017, from http://dx.doi.org/10.1108/IMCS-01-2013-0005

Stefan F., Johannes, H., Thomas, N & Fabian, P (2014). Current Challenges in Information
Security Risk Management. Information Management & Computer Security, 22 (5), p. 410-430. Retrieved 10 May 2017, from http://dx.doi.org/10.1108/IMCS-07-2013-0053

InNurture (2017). What Makes Information Security Important?. Retrieved on 8 May 2017,
from http://www.inurture.co.in/what-makes-information-security-important/

Labuschagne, L & Eloff, J.,H.,P (2000). Electronic Commerce: The Information-security
Challenge. Information Management & Computer Secuirty, 8 (3), p. 154-157. Retrieved 10 May 2017, from http://dx.doi.org/10.1108/09685220010372582

Malaysia Computer Emergency Response Team. Retrieved on 16 May 2017, from
http://www.mycert.org.my

Malaysia Sixth Most Vulnerable To Cyber Crime. Retrieved 10 May 2017, from
http://says.com/my/news/malaysia-sixth-most-vulnerable-to-cyber-crime

Ruth C.M., Rita. M., & Graeme, B. (1999). Corporate Information Security
Management. New Library World, 100 (5), p. 213-227. Retrieved on 10 May 2017, from http://dx.doi.org/10.1108/03074809910285888

Shahibi, M. S., Ali. J., & Zaini, M. K. (2011). Elements of Trust in E-Commerce Interaction.
Journal of Information and Knowledge Management, 1(1), p. 101-110.

Ahmad, M. (2015). Malaysia’s Approach Against Cyber Threat and Cyber Attacks.
CyberSecurity Malaysia. Retrieved 17 May 2017, from http://ris.org.in/images/RIS_images/presentation-pdf/Mustaffa%20Ahmad.pdf

Norton, R. (2016). 2016 Norton Cybersecurity Insight Report. Retrieved on 9 May 2017, from
https://www.symantec.com/content/dam/symantec/docs/reports/2016-norton-cyber-security-insights-report.pdf+&cd=3&hl=en&ct=clnk

Hannah, N., & Vilasmalar, M. (2014). The Personal Data Protection Act 2010: Challenges to
Comply. eSecurity, 36(1), p. 39-40. Retrieved 17 May 2017, from http:// www.cybersecurity.my/data/content_files/12/1291.pdf

Perceptions of Transnational Security Threats in Malaysia and Singapore: Windows of
Cooperative Opportunities for the United States. Retrieved on 8 May 2017, from http://apcss.org/wp-content/uploads/2012/02/140-153-Perceptions.pdf

Phishing [Def. 1]. (n.d.). In English Oxford Living Dictionary, Retrieved May 17, 2017, from
http://en.oxforddictionaries.com/definition/phishing

Ahmad, R. (2017, May 14). Malaysia also hit by WannaCry ransomware. The Star
Newspaper, 4.

Dzazali, S., & Zolait, A.H. (2011). Assessment of Information Security Maturity: an
Exploration Study of Malaysian Public Service Organizations. Journal of Systems and Information technology, 14 (1), 23-57. Retrieved 16 May 2017, from http://dx.doi.org/10.1108/13287261211221128

University of Staffordshire (2017). Why is Information Secuirty is Important? Retrieved on 8
May 2017, from
http://www.staffs.ac.uk/support_depts/infoservices/rules_and_regulations/Infosecurimp.jsp
Haris@Harib, A. R., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9), 364-370.