Knowledge Banks
Articles
0-9 | Download |
13 Security Tips To Safe Online Banking Author : CyberSecurity Malaysia | Click Here |
A | Download |
An Overview of Disk Imaging Tool In Computer Forensics Author : Madihah Mohd. Saudi | Click Here |
An Overview of SecureIIS - Are We Really Secured Now? Author : Zul Azhan Suhaimi | Click Here |
Ancaman Siber: Mitos atau Realiti? Author : NISER | Click Here |
Anti-SPAM Framework Of Best Practices And Technical Guidelines Author : NISER | Click Here |
B | Download |
Building Cybersecurity Competency through Global ACE Certification Author : Wan Shafiuddin Zainudin, Razana Bt Md Salleh, Mohd Haleem Bin Abdul Sidek |
Click Here |
Buli Siber : Mangsa Buli Mengalami Gangguan Mental Dan Emosi Author : Benny Lim |
Click Here |
Beware the Hidden Danger Author : Ahmad Nasir Mohd Zin & Zahri Yunos | Click Here |
Business Continuity Planning for All Author : Nazhalina Nazri | Click Here |
Business Continuity Not Just About Business Author : Zahri Yunos & Ahmad Nasir Mohd Zin | Click Here |
Benefits of ISO/IEC 27005:2011 to SMEs Author : Noor Aida Idris & Lt. Col Asmuni Yusof (Rtd) | Click Here |
C | Download |
CyberThreats - Myths or Reality? Author : Zahri Yunos & Ahmad Nasir Mohd Zin | Click Here |
Cyberspace The New War Frontier Author : Shaharudin Ismail & Zahri Yunos | Click Here |
D | Download |
Dunia Digital : Identiti Dalam Talian Dan Penyamaran Author : Sandra Isnaji |
Click Here |
Dealing With Dangers From Within Author : Siti Suharti Abu Sujak & Zahri Yunos | Click Here |
Defending CyberSpace:Agenda for Action Author : Zahri Yunos & Ahmad Nasir Mohd Zin | Click Here |
Dontphishme Add-On Author : Majalah PC | Click Here |
E | Download |
Ethics In Information Security Author : Yati Yassin and Zahri Yunos |
Click Here |
Ensuring Business Continuity in the Digital Age Author : Wan Shafiuddin Zainudin, Nahzatulshima Binti Zainuddin, Mohd Haleem Bin Abdul Sidek |
Click Here |
F | Download |
Future Cyber Weapons Author : Ahmad Nasir Mohd Zin & Zahri Yunos | Click Here |
G | Download |
GSMA 5G CyberSecurity Framework Knowledgebase & Nesas White Paper Author : Mohamed Anwer Bin Mohamed Yusoff, Chin Ngee Ming, Muhammad Ikhwan Bin Mohammad Faisal | Click Here |
Going the dotcom way Author : Izwan Iskandar Ishak | Click Here |
H | Download |
Home PC Security Author : Sharifah Roziah | Click Here |
How To Make Online Banking Secure Author : Ahmad Nasir Mohd Zin & Zahri Yunos | Click Here |
I | Download |
Is Cyber Crime Reigning on a No Man's Land? Author : NISER | Click Here |
Inculcating The "Culture of ICT Security" Author : Lt Col Husin Hj Jazri & Noormawati Mohd Nawi | Click Here |
Insecurity of Inputs to CGI Program Author : Suhairi Mohd Jawi @ Said | Click Here |
ISMS Implementation: Examining Roles and Responsibilities Author : Rafidah Abdul Hamid | Click Here |
ISMS Pilot Programme Experiences: Benefits, Challenges & Recommendations Author : Shamsuddin Abdul Jalil and Rafidah Abdul Hamid | Click Here |
K | Download |
Kesan Aplikasi Rangkaian Sosial Terhadap Pengguna Internet Author : Syahrir Mat Ali dan Fatin Hasnan | Click Here |
Ketagihan Internet Satu Penyakit Mental? Author : Redy Jeffry Mohamad Ramli | Click Here |
Keeping Kids safe online Author : Zahri Yunos & Sharifah Sajidah | Click Here |
L | Download |
Leveraging MyCC Certification to Boost Malaysia’s ICT Exports Author : Wan Shafiuddin, Hasnida, Mohd Haleem |
Click Here |
Let Us Put A Full Stop To Cyber-Bullying Author : Benny Lim |
Click Here |
M | Download |
Malware Trend Report (Monthly) - Feb 2020 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report (Monthly) - Jan 2020 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report (Monthly) - Dec 2019 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report H2/2019 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report H1/2019 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report H2/2018 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report H1/2018 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report H2/2017 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Malware Trend Report H1/2017 Author : The OIC-CERT Permanent Secretariat | Click Here |
Malware Trend Report H2/2016 Author : The OIC-CERT Permanent Secretariat |
Click Here |
Managing the Advancement of Documents Going Digital Author : Zahri Yunos & Ahmad Nasir Mohd Zin | Click Here |
Measures to Combat Spam Author : Maslina Daud & Zahri Yunos | Click Here |
Melindungi Anak-anak di Alam Siber Author : Redy Jeffry Mohamad Ramli | Click Here |
Mitigating Advanced Persistent Threats Author : Noor Azwa Azreen Abd Aziz & Zahri Yunos | Click Here |
Mitigating Negative Content On The Net Author : Ahmad Nasir Mohd Zin & Zahri Yunos | Click Here |
Much Ado About Malware Author : Zahri Yunos and Sharmila Mohamad Salleh | Click Here |
N | Download |
NISER's ISMS Pilot Programme Experiences: Common Shortcomings in ISMS Implementation (Article) Author : Shamsuddin Abdul Jalil, Rafidah Abdul Hamid & Ariffuddin Aizuddin | Click Here |
NISER's ISMS Pilot Programme Experiences: Common Shortcomings in ISMS Implementation (Paper) Author : Shamsuddin Abdul Jalil, Rafidah Abdul Hamid & Ariffuddin Aizuddin | Click Here |
P | Download |
Power of ISMS: Driving Value & Growth for SMEs in Malaysia Author : Wan Shafiuddin Zainudin, Noor Aida Binti Idris, Mohd Haleem Bin Abdul Sidek | Click Here |
Phishing for Information Author : Sandra Isnaji | Click Here |
Perang Siber Hanya Ilusi Maya? Author : Redy Jeffry Mohamad Ramli & Nadia Salwa Mohamad | Click Here |
Putting Cyber Terrosim Into Context Author : Zahri Yunos | Click Here |
Pengiklanan Internet : Efektif Tapi Mengancam Author : Azila Alya bt Dahalan | Click Here |
R | Download |
Raising Business Continuity Management Awareness in Malaysia Author : Shamsuddin Abdul Jalil | Click Here |
Regulating Online Content Author : Izwan Iskandar Ishak | Click Here |
Rootkit: Attacker undercover tools Author : Saliman Manap | Click Here |
S | Download |
Securing Applications From Hackers Author : Norhazimah bt Abd Malek | Click Here |
Securing e-mail Author : Sharipah Setapa | Click Here |
Securing IP Routing and Remote Access on Cisco Routers Author : Mohammed Shafri Hatta | Click Here |
Security Policy: Enforcement and Compliance Author : Rafidah Abdul Hamid | Click Here |
Selamatkah Facebook Anda Author : Sandra Isnaji |
Click Here |
Shop Online in Peace Author : Izwan Iskandar Ishak | Click Here |
Smart Card- An Alternative to Password Authentication Author : Ahmad Ismadi Yazid B. Sukaimi | Click Here |
Social Networks Posing Security Threat Author : Syahrir Mat Ali |
Click Here |
Storage Security Design - A Method to Help Embrace Cloud Computing Author : Ahmed Abdel-Aziz - GSE, CISSP | Click Here |
T | Download |
The Seduction of the Virtual City Author : Sandra Isnaji |
Click Here |
The Reality of Cyber-Threats Today Author : Zahri Yunos | Click Here |
The Common Criteria ISO/IEC 15408 - The Insight, Some Thoughts, Questions & Issues Author : Ariffuddin Aizuddin | Click Here |
The Importance of Setting Up an Information Security Management Committee Author : Rafidah Abdul Hamid | Click Here |
The New Frontier for Terrorists Author : Zahri Yunos | Click Here |
The Regulatory Environment in Information Security Author : Husin Jazri | Click Here |
Trusted Computer Systems: Understanding and Issues Author : Ahmad Ubaidah Omar | Click Here |
U | Download |
Understanding the Various Types of Denial of Service Attack Author : Raja Azrina Raja Othman | Click Here |
W | Download |
Weathering a Crisis Author : Maslina Daud & Zahri Yunos | Click Here |
What You Need to Know About Security Policy Author : Rafidah Abdul Hamid | Click Here |
Worms and Trojans Go Mobile Author : Shaharudin Ismail & Zahri Yunos | Click Here |