The Research Division of CyberSecurity Malaysia is responsible for developing, coordinating and stimulating a continuous research activity at CyberSecurity Malaysia and for ensuring compliance with all applicable laws and regulations. The Research Division is divided into two types of research i.e. Strategic Policy Research and Cyber Technology Research (Cryptography).
Strategic Policy Research- aims to produce high quality research and policy papers in the field of information security so that these documents will be the source of reference for stakeholders, in order to make well-informed decisions. We also provide strategic advice and feedback to stakeholders' enquiries on cyber security matters. In addition, we spearhead and establish new initiatives - such as collaborations with relevant local and international parties, and implementation of cyber security technologies.
Examples of successful initiatives are:
The project development and management of 'A Study on the Laws of Malaysia To Accommodate the Legal Challenges in the Cyber Environment'
The establishment of the OIC-CERT (Organisation of Islamic Cooperation - Computer Emergency Response Team) - a collaboration to assist OIC member countries establish or strengthen their cyber security capabilities
The establishment of a strategic collaboration between CyberSecurity Malaysia and international agencies such as the Information Technology Promotion Agency (IPA), Japan and the Telecommunication Development Sector of the International Telecommunication Union (ITU-D)
Cyber Technology Research leads and conducts research and development in various aspects of cryptography and its related fields among others are cryptographic algorithm, key management, cryptanalysis and applied cryptography.
Cryptography - can be succinctly defined as the study of how to establish secure communication in an adversarial environment. Due to the numerous technological improvements and advancements, cryptography has become one of the most applied and active disciplines in computer science.
Examples of current and future research includes:
- Improving the security and/or efficiency of cryptographic applications
- Designing new, provable-secure cryptographic primitives and protocols
- Formalizing and analyzing common cryptographic practices
CyberSecurity Malaysia Research Division is headed by a Vice President, who has an overall administrative responsibility to plan, execute and accomplish strategic research directions and framework of CyberSecurity Malaysia. In addition, the Vice President is expected to also oversee all technical departments' research activities within CyberSecurity Malaysia and coordinate research collaborations with other research institutions, higher learning institutions and private sectors. Together, this will create the synergy for a successful Research & Development (R&D) in information security.