Knowledge Banks
Principles Guidelines
MySEAL - National Trusted Cryptographic Algorithm List (Senarai Algoritma Kriptografi Terpercaya Negara) | |||
MySEAL 2.0 Nomination Criteria | Download : | pdf (878 KB) | |
Guideline on the Usage of AKSA MySEAL Recommended Cryptographic Algorithms | Download : | pdf (581 KB) | |
New Cryptographic Algorithm (AKBA) Nomination Form | Download : | doc (649 KB) | |
AKSA-Non Inclusive Cryptographic Algorithms | Download : | pdf (315 KB) |
Common Criteria Collaboration Program | |||
Common Criteria Collaboration Program | Download : | pdf (1.12 MB) | |
Application Form MyCC Certification Programme | Download : | pdf (1 MB) |
General Information Security Best Practices | |||
10 Langkah Mudah Kesedaran Keselamatan Siber | Download : | pdf (2.3 MB) | |
Wi-Fi: Nothing is Private When Done in Public | Download : | pdf (11.1 MB) | |
Information Security Best Practice : Securing Blackberry | Download : | pdf (4.12 MB) | |
Social Network Sites | Download : | pdf (1.75MB) | |
Online Identity Theft | Download : | (4.3MB) | |
Web Browsing: Play It Smart, Don't Be Played! | Download : | pdf (3.8MB) | |
Best Practices Protecting Your Mobile Device | Download : | pdf (36kb) | |
Cyberstalking | Download : | pdf (574kb) | |
Safe Online Gaming | Download : | pdf (715kb) | |
Safer Internet Surfing | Download : | pdf (764kb) | |
Social Networking | Download : | pdf (980kb) | |
Online shopping | Download : | pdf (30kb) | |
Online banking | Download : | pdf (53kb) |
General Information Security Guidelines | |||
Guidelines To Forensically Extract Data From Dashcam | Download : | pdf (4.2MB) | |
Garis Panduan Untuk Mendapatkan Data Secara Forensik Daripada Kamera Papan Pemuka | Download : | pdf (4.2MB) | |
User Guidelines For An Ideal Dashcam Installation | Download : | pdf (4MB) | |
Guidelines For Digital Forensics Laboratories | Download : | pdf (562KB) | |
Guidelines for Secure Industrial Control System (ICS) | Download : | pdf (1.3MB) | |
Guidelines for Secure Software Development Life Cycle (SSDLC) | Download : | pdf (2.4MB) | |
Guidelines for Secure Internet of Things (IoT) | Download : | pdf (479kb) | |
Guidelines for Secure Industry 4.0 | Download : | pdf (885kb) | |
Guidelines for Securing MyKAD Enhanced Biometric Access (EBA) Ecosystem | Download : | pdf (4.3MB) | |
Guidelines for Securing Cloud Implementation by Cloud Service Subscriber | Download : | pdf (927kb) | |
Safeguard Children from Cyberbullying | Download : | pdf (1.09MB) | |
Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations | Download : | pdf (627kb) | |
ISMS Implementation Guideline | Download : | pdf (2.6MB) | |
Guidelines for Small & Medium Enterprises (SMEs) | Download : | pdf (805kb) | |
Code of Ethics for Information Security Professionals | Download : | pdf (504kb) | |
Guidelines on Information Security in ICT Outsourcing | Download : | pdf (3MB) | |
Guidelines on Computer Security | Download : | pdf (4MB) | |
Wireless Local Area Network (LAN) Security Guideline | Download : | pdf (1.52MB) | |
3rd Party Information Security Assessment Guideline | Download : | pdf (1.53MB) |
Policy and Procedure | |||
Policy and Procedure for Seizing Cryptocurrencies | Download : | pdf (6.3 MB) |