Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0057
A Change Impact Analysis Tool: Integration Between Static and Dynamic Analysis Technique
Wan Shafiuddin Zainuddin, Saiful Adli Ismail, Kamilia Kamardin, Norziha Megat Zainuddin, Azri Azmi & Nazri Kama
Accepting too many software change requests could contribute to expense and delay in project delivery. On the other hand rejecting the changes may increase customer dissatisfaction. Software project management might use a reliable estimation on potential impacted artifacts to decide whether to accept or reject the changes. In software development phase, an assumption that all classes in the class artifact are completely developed is impractical compared to software maintenance phase. This is due to some classes in the class artifact are still under development or partially developed. This paper is a continuous effort from our previous work on combining between static and dynamic analysis techniques for impact analysis. We have converted the approach to an automated tool and call it a CIAT (Change Impact Analysis Tool). The significant achievements of the tool are demonstrated through an extensive experimental validation using several case studies. The experimental analysis shows improvement in the accuracy over current impact analysis results.
Year published : September 2015
Publication : Intelligent Software Methodologies, Tools and Techniques [Proceeding of the 14th International Conference SoMET in Naples, Italy on September 15 – 17, 2015]
CSC 0003
A Dynamic Cyber Terrorism Framework
Rabiah Ahmad and Zahri Yunos
Many nations all over the world have increased their dependency on cyberspace by maximizing the use of Information and Communication Technology (ICT). In this digital age, the concept of cyber terrorism or the use of cyberspace to carry out terrorist activities has emerged. Interestingly, there are many concepts of cyber terrorism provided by researchers, policy makers and individuals. This paper proposes a framework describing the core components of cyber terrorism. The authors have analyzed the data by using a grounded theory approach, in which the framework is drawn. The framework defines cyber terrorism from six perspectives: Target, motivation, method of attack, domain, action by perpetrator, and impact. In addition, the proposed framework provides a dynamic way in defining cyber terrorism as well as describing its influential considerations. Continued research in this area can be further conducted, which may lead to the development of strategic and technological framework to counter cyber terrorism.
Year published : 2012 | 149-158 | Vol. 10 No. 2
Publication : International Journal of Computer Science and Information Security
CSC 0032
A Propose Technical Security Metrics Model for SCADA Systems
Nor Azuwa Muhamad Pahri; Rabiah Ahmad; Shahrin Sahib; Solahuddin Shamsuddin
Information security metrics are very important to guide the direction for measuring the effectiveness of security controls in compliance with the information security standards. However, lack of method to guide organization in choosing the technical security metrics may cause technical security control objectives and capabilities failed. This research proposes a model of technical security metrics to measure the effectiveness of network security management, such as network security controls and services such as firewall and Intrusion Detection Prevention System (IDPS) in the protection of Supervisory and Data Acquisition (SCADA) systems. The methodology used is Plan-Do-Check-Act process model. The proposed technical security metric provides guidance for SCADA owners in complying with requirements of ISO/IEC 27001 Information Security Management System (ISMS) standard. The proposed model should be able to provide a comprehensive measurement and prove the effectiveness of ISO/IEC 27004 ISMS Measurement standard.
Year published : 2012 | 70-75 | IEEE Conference Proceeding
Publication : International Conference on Cyber Security, Cyber Warfare and Digital Forensic
CSC 0008
A Proxy-Based Adaptive Security Model For Secure Socket Layer (SSL) Ecosystem
Suhairi Mohd Jawi; Fakariah Hani Mohd Ali; Nurul Huda Nik Zulkipli
Secure Socket Layer (SSL) and its successor Transport Layer Security (TLS) has been the main drivers for secure communication over the web. Since its first inception, these protocols face with several security issues from their design and implementation. Several solutions and proposals have emerged as measures to enhance their security. The study for adaptive security for SSL/TLS deserves a focus. In this study, components from adaptive security such as monitoring, analysis and response are integrated into a web proxy. One of the advantages of adaptive security is its architecture improves over time. It can help in protecting users from security threats of HTTPS connections in the changing security environments.
Year published : 2013
Publication : Prosiding Kolokium Siswazah Sains Komputer dan Matematik Peringkat Kebangsaan 2013
CSC 0050
A Qualitative Analysis For Evaluating A Cyber Terrorism Framework in Malaysia
Zahri Yunos, Rabiah Ahmad & Nor Amalina Mohd Sabri
Terrorist cyber attacks on Critical National Information Infrastructure are possible where motives, resources, and willingness to conduct operations against specific targets influence people to conduct such actions. However, there is no universally accepted definition of cyber terrorism, which seems to be a fundamental challenge in countering cyber terrorism threats. A schematic study has been conducted to discover various definitions of related terms used in this area. Although many policy makers and scholars have studied and provided the concept of cyber terrorism, some of the definitions are static and some are fragmented. Thus, in this research components that constitute cyber terrorism are explored, and the study is supported by systematic validation and an appropriate evaluation mechanism for the proposed components. The introduction of this paper indicates that the nature of cyber terrorism should be formulated from six perspectives: motivation, target, tools of attack, domain, method of action, and impact. According to our observations, there are both similarities and differences in views regarding the proposed cyber terrorism conceptual framework.
Year published : 2015
Publication : Information Security Journal: A Global Perspective
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed