Principles Guidelines
 
 
 
MySEAL - National Trusted Cryptographic Algorithm List (Senarai Algoritma Kriptografi Terpercaya Negara)
MySEAL 2.0 Nomination Criteria Download : pdf (878 KB)
Guideline on the Usage of AKSA MySEAL Recommended Cryptographic Algorithms Download : pdf (581 KB)
New Cryptographic Algorithm (AKBA) Nomination Form Download : doc (649 KB)
AKSA-Non Inclusive Cryptographic Algorithms Download : pdf (315 KB)

 

Common Criteria Collaboration Program
Common Criteria Collaboration Program Download : pdf (1.12 MB)
Application Form MyCC Certification Programme Download : pdf (1 MB)

 

General Information Security Best Practices
10 Langkah Mudah Kesedaran Keselamatan Siber Download : pdf (2.3 MB)
Wi-Fi: Nothing is Private When Done in Public Download : pdf (11.1 MB)
Information Security Best Practice : Securing Blackberry Download : pdf (4.12 MB)
Social Network Sites Download : pdf (1.75MB)
Online Identity Theft Download : (4.3MB)
Web Browsing: Play It Smart, Don't Be Played! Download : pdf (3.8MB)
Best Practices Protecting Your Mobile Device Download : pdf (36kb)
Cyberstalking Download : pdf (574kb)
Safe Online Gaming Download : pdf (715kb)
Safer Internet Surfing Download : pdf (764kb)
Social Networking Download : pdf (980kb)
Online shopping Download : pdf (30kb)
Online banking Download : pdf (53kb)

 

General Information Security Guidelines
Guidelines To Forensically Extract Data From Dashcam Download : pdf (4.2MB)
Garis Panduan Untuk Mendapatkan Data Secara Forensik Daripada Kamera Papan Pemuka Download : pdf (4.2MB)
User Guidelines For An Ideal Dashcam Installation Download : pdf (4MB)
Guidelines For Digital Forensics Laboratories Download : pdf (562KB)
Guidelines for Secure Industrial Control System (ICS) Download : pdf (1.3MB)
Guidelines for Secure Software Development Life Cycle (SSDLC) Download : pdf (2.4MB)
Guidelines for Secure Internet of Things (IoT) Download : pdf (479kb)
Guidelines for Secure Industry 4.0 Download : pdf (885kb)
Guidelines for Securing MyKAD Enhanced Biometric Access (EBA) Ecosystem Download : pdf (4.3MB)
Guidelines for Securing Cloud Implementation by Cloud Service Subscriber Download : pdf (927kb)
Safeguard Children from Cyberbullying Download : pdf (1.09MB)
Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations Download : pdf (627kb)
ISMS Implementation Guideline Download : pdf (2.6MB)
Guidelines for Small & Medium Enterprises (SMEs) Download : pdf (805kb)
Code of Ethics for Information Security Professionals Download : pdf (504kb)
Guidelines on Information Security in ICT Outsourcing Download : pdf (3MB)
Guidelines on Computer Security Download : pdf (4MB)
Wireless Local Area Network (LAN) Security Guideline Download : pdf (1.52MB)
3rd Party Information Security Assessment Guideline Download : pdf (1.53MB)

 

Policy and Procedure
Policy and Procedure for Seizing Cryptocurrencies Download : pdf (6.3 MB)