Transformative Cyber Security Model for Malaysian Government Agencies
-
2018-10-07 https://doi.org/10.14419/ijet.v7i4.15.21377 -
Cyber Governance Security, Cyber Security Strategy, Security Defensive Model, Security Threats. -
Abstract
The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.
Â
Â
-
References
[1] Bailey, A., Minto-Coy, I., & Thakur, D., “IT governance in E-government implementations in the Caribbean: Key characteristics and mechanismsâ€, In L. Rusu, & G. Viscusi (Eds.), Information Technology Governance in Public Organizations. (2017), Cham: Springer, pp. 201-227.
[2] Patrick, H., & Fields, Z., “A need for cyber security creativityâ€, In Z. Fields (Ed.), Collective Creativity for Responsible and Sustainable Business Practice. (2017), Pennsylvania: IGI Global, pp. 42-61.
[3] Albahar, M. (2017), Cyber attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics, 2017, 1-14.
[4] Shafqat, N., & Masood, A. (2016), Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129.
[5] Dhillon, G., Syed, R., & Pedron, C. (2016), Interpreting information security culture: An organizational transformation case study. Computers and Security, 56, 63-69.
[6] Hsu, J. S. C., Shih, S. P., Hung, Y. W., & Lowry, P. B. (2015), The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282-300.
[7] Banfield, J. M., A study of information security awareness program effectiveness in predicting end-user security behavior. Eastern Michigan University, (2016).
[8] Bodeau, D., Boyle, S., & Fabius-Greene, J., Cyber security governance. A component of MITRE’s cyber prep methodology. The MITRE Corporation, (2010).
[9] Bhaduri, S. N., & Selarka, E., Corporate Governance and Corporate Social Responsibility—Introduction. In Corporate Governance and Corporate Social Responsibility of Indian Companies. (2016), Berlin: Springer, pp. 1-10.
[10] Ramtohul, A., & Soyjaudah, K. M. S. (2016), Information security governance for e-services in southern African developing countries e-Government projects. Journal of Science and Technology Policy Management, 7(1), 26-42.
[11] Eling, M., & Schnell, W. (2016), What do we know about cyber risk and cyber risk insurance? Journal of Risk Finance, 17(5), 474-491.
[12] De Bruin, R., & Von Solms, S. H., “Cybersecurity governance: How can we measure it?†Proceedings of the IEEE IST-Africa Week Conference, (2016), pp. 1-9.
[13] Kshetri, N., & Murugesan, S. (2013), EU and US cybersecurity strategies and their impact on businesses and consumers. Computer, 46(10), 84-88.
[14] Machado, M. N. C. (2015). Cyber security governance.
[15] FORCE, C. G. T., “Information security governance: A call to actionâ€, (2004), http://www. cyberpartnership. org/init-governance. html.
[16] Bodeau, D. J., Graubart, R., & Fabius-Greene, J., “Improving cyber security and mission assurance via cyber preparedness (cyber prep) levelsâ€, Proceedings of the IEEE Second International Conference on Social Computing, (2010), pp. 1147-1152.
[17] USA Cyberspace Policy Review, (2009), A.a.T.a.R.I.a.C. Infrastructure.
[18] Government of Australia. (2016), Australia’s cyber security strategy. Enabling innovation, growth and prosperity. Commonwealth of Australia, Department of the Prime Minister and Cabinet.
[19] Government of Malaysia. (2006), M.o.S.T.a.I., National cyber security policy: The way forward. Federal Government Administrative Centre.
[20] Government of Germany. (2011), Cyber security strategy for Germany. https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile.
[21] Sarma, S., (2016), Cyber security mechanism in European Union. https://icwa.in/pdfs/VP/2014/CyberSecurityMechanisminEuropeanUnionVP26042016.pdf
[22] European Commission. (2013). Cybersecurity strategy of the European Union: An open, safe and secure cyberspace.
[23] European Commission, (2013). High representative of the European Union for Foreign Affairs and Security Policy.
[24] Min, K., & Chai, S. W. (2016), An analytic study of cyber security strategies of Japan. International Journal of Security and Its Applications, 10(10), 37-46.
[25] Government of Japan. (2015), National cyber security strategy.
[26] Government of China. (2016), China national cybersecurity strategy.
[27] Malaysian Administrative Modernisation and Management Planning Unit, Prime Minister’s Department, Malaysian public sector management of information and communications technology security handbook (MyMIS), (2002). http://www.mampu.gov.my/images/Orang-Awam/MyMIS.pdf.
[28] Hashim, M. S. B., “Malaysia's national cyber security policy: The country's cyber defence initiativesâ€, Proceedings of the IEEE Second Worldwide Cybersecurity Summit, (2011), pp. 1-7.
-
Downloads
-
How to Cite
Perumal, S., Ali Pitchay, S., Narayana Samy, G., Shanmugam, B., Magalingam, P., & Hasan Albakri, S. (2018). Transformative Cyber Security Model for Malaysian Government Agencies. International Journal of Engineering & Technology, 7(4.15), 87-92. https://doi.org/10.14419/ijet.v7i4.15.21377Received date: 2018-10-09
Accepted date: 2018-10-09
Published date: 2018-10-07