Information security sometimes known as Cybersecurity is the practice or action taken to prevent unauthorized access, use, disclosure, disruption, modification or destruction towards information. The cybersecurity is a concern for all. Data centres play important roles in managing data and information of an organization. Digital technology has become most important key to increase the level of innovation, competitiveness and growth. The economy sector is depending on effective measures to protect information in organization. Information plays an important part in giving services to people. At the same time, problems of intruders or attackers that we might not run away from it. In Malaysia, the CyberSecurity Malaysia is the agency dealing with defending the nation from cyber-attacks. Several functions initiated by the body to educate internet users and to prevent from attacks.
Mohsen, A. S. (2017, May 16). WannaCry Ransomware: You Are at a Risk. The Sun
Newspaper, p. 1 & 3.
Computer World Malaysia (2017). CyberSecurity Malaysia Issues New National
Ransomware Warning. Retrieved on 8 May 2017, from https://www.computerworld.com.my/resource/security/cybersecurity-malaysia-issues-new-national-ransomware-warning/
Cybersecurity Malaysia. Statistics: Retrieved on 9 May 2017, from
https://www.mycert.org.my/statistics/2017.php
Digital Detox [Def. 1]. (n.d.). In English Oxford Living Dictionary, Retrieved May 17, 2017,
from https://en.oxforddictionaries.com/definition/digital_detox
Kim, E.B. (2014). Recommendations for Information Security Awareness Training for
College Students. Information Management & Computer Security, 22 (1), 115-126. Retrieved 10 May 2017, from http://dx.doi.org/10.1108/IMCS-01-2013-0005
Stefan F., Johannes, H., Thomas, N & Fabian, P (2014). Current Challenges in Information
Security Risk Management. Information Management & Computer Security, 22 (5), p. 410-430. Retrieved 10 May 2017, from http://dx.doi.org/10.1108/IMCS-07-2013-0053
InNurture (2017). What Makes Information Security Important?. Retrieved on 8 May 2017,
from http://www.inurture.co.in/what-makes-information-security-important/
Labuschagne, L & Eloff, J.,H.,P (2000). Electronic Commerce: The Information-security
Challenge. Information Management & Computer Secuirty, 8 (3), p. 154-157. Retrieved 10 May 2017, from http://dx.doi.org/10.1108/09685220010372582
Malaysia Computer Emergency Response Team. Retrieved on 16 May 2017, from
http://www.mycert.org.my
Malaysia Sixth Most Vulnerable To Cyber Crime. Retrieved 10 May 2017, from
http://says.com/my/news/malaysia-sixth-most-vulnerable-to-cyber-crime
Ruth C.M., Rita. M., & Graeme, B. (1999). Corporate Information Security
Management. New Library World, 100 (5), p. 213-227. Retrieved on 10 May 2017, from http://dx.doi.org/10.1108/03074809910285888
Shahibi, M. S., Ali. J., & Zaini, M. K. (2011). Elements of Trust in E-Commerce Interaction.
Journal of Information and Knowledge Management, 1(1), p. 101-110.
Ahmad, M. (2015). Malaysia’s Approach Against Cyber Threat and Cyber Attacks.
CyberSecurity Malaysia. Retrieved 17 May 2017, from http://ris.org.in/images/RIS_images/presentation-pdf/Mustaffa%20Ahmad.pdf
Norton, R. (2016). 2016 Norton Cybersecurity Insight Report. Retrieved on 9 May 2017, from
https://www.symantec.com/content/dam/symantec/docs/reports/2016-norton-cyber-security-insights-report.pdf+&cd=3&hl=en&ct=clnk
Hannah, N., & Vilasmalar, M. (2014). The Personal Data Protection Act 2010: Challenges to
Comply. eSecurity, 36(1), p. 39-40. Retrieved 17 May 2017, from http:// www.cybersecurity.my/data/content_files/12/1291.pdf
Perceptions of Transnational Security Threats in Malaysia and Singapore: Windows of
Cooperative Opportunities for the United States. Retrieved on 8 May 2017, from http://apcss.org/wp-content/uploads/2012/02/140-153-Perceptions.pdf
Phishing [Def. 1]. (n.d.). In English Oxford Living Dictionary, Retrieved May 17, 2017, from
http://en.oxforddictionaries.com/definition/phishing
Ahmad, R. (2017, May 14). Malaysia also hit by WannaCry ransomware. The Star
Newspaper, 4.
Dzazali, S., & Zolait, A.H. (2011). Assessment of Information Security Maturity: an
Exploration Study of Malaysian Public Service Organizations. Journal of Systems and Information technology, 14 (1), 23-57. Retrieved 16 May 2017, from http://dx.doi.org/10.1108/13287261211221128
University of Staffordshire (2017). Why is Information Secuirty is Important? Retrieved on 8
May 2017, from
http://www.staffs.ac.uk/support_depts/infoservices/rules_and_regulations/Infosecurimp.jsp
Haris@Harib, A. R., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9), 364-370.
Copyright: © 2017 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode