Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0020
Protection of Critical National Information Infrastructure (CNII) Against Cyber Terrorism : Development of Strategy and Policy Framework
Zahri Yunos; Syahrul Hafidz Suid
Critical National Information Infrastructure (CNII) is crucial to the survivability of a nation that the destruction or disruption of these systems and communication networks would significantly affect the economic strength, image, defense and security, government capabilities to function, and public health and safety. CNII would probably become an attractive target for terrorists. There is a need to have a strategy at the national level for the protection of CNII from cyber terrorism activities.
Year published : 2010 | 169 | IEEE Conference Proceeding
Publication : 2010 IEEE International Conference on Intelligence and Security Informatics
CSC 0012
Randomness Analysis on Grain - 128 Stream Cipher
Norul Hidayah Lot @ Ahmad Zawawi; Kamaruzzaman Seman; Nurzi Juana Mohd Zaizi
In this work, the randomness analysis of Grain-128 stream cipher algorithm by using NIST Statistical Test Suite is introduced. The NIST Statistical Test Suite is applied to determine the randomness of this algorithm. The Grain - 128 is based on LFSR, NLFSR and Boolean function with suitable for limited resources like gate count, power consumption and area chip. It uses 128-bit key and 96-bit initial value (IV). Based on our result of conducting the analysis, we obtained that this algorithm is not random at the 1% significance level.
Year published : 2013 | n.a | AIP Conference Proceeding
Publication : International Conference on Mathematical Sciences and Statistics 2013
CSC 0063
Randomness Analysis on Speck Family of Lightweight Block Cipher
Liyana Chew Nizam Chew; Isma Norshahila Mohammad Shah; Nik Azura Nik Abdullah; Norul Hidayah Ahmad Zawawi; Hazlin Abdul Rani & Abdul Alif Zakaria
Speck family of lightweight block cipher was publicly released by National Security Agency (NSA), USA in June 2013. Speck has been designed with ten instances which provides excellent performance in both hardware and software. Speck is optimized for performance on microcontrollers. This paper will present the result of randomness testing using NIST statistical test suite for SPECK cipher family, which are Speck128/128, Speck128/192, and Speck128/256. Nine data categories are applied to generate the input sequence (either plaintext or key) for each algorithm. Randomness is important for cryptography module to ensure that the cipher is unpredictable before it becomes available. From the analysis conducted, some failures were identified in some data categories.
Year published : January 2015
Publication : International Journal of Cryptology Research No 5 Issue 1
CSC 0002
Safeguarding Malaysia's Critical National Information Infrastructure (CNII) Against Cyber Terrorism : Towards Development of a Policy Framework
Zahri Yunos; Syahrul Hafidz Suid; Rabiah Ahmad and Zuraini Ismail
Critical National Information Infrastructure (CNII) is crucial to the survivability of a nation. The destruction or disruption of these systems and communication networks would significantly affect the economic strength, image, defence and security, government capabilities to function, and public health and safety. CNII would probably become an attractive target for terrorists as the result of cyber attacks could leave the nation with difficult conditions due to the disruption of critical services. This paper provides an overview on the concept and fundamental elements of cyber terrorism. This paper also highlights the cyber security policy initiatives as a guideline for the development of the policy framework. This paper further recommends the need of policy development addressing the protection of CNII from cyber terrorism activities specifically for Malaysia.
Year published : 2010 | 21-27 | IEEE Conference Proceeding
Publication : 2010 Sixth International Conference on Information Assurance and Security
CSC 0064
Securing Classified Information: A Six-Step Approach to Data Classification
Siti Hazwah Abd Karim, Zahri Hj. Yunos, Mohd Shamir Hashim & Rahayu Azlina Ahmad
The Internet’s implementation and reach over businesses, governments and individuals are ever-increasing. Thus, it is not at all an overreaction to anticipate for cyberattacks to be subsequently on the rise, which will in turn ultimately lead to data breaches. Malware and cyber-attacks intended to breach data will continue to evolve and organizations must take the necessary steps to secure their valuable assets and mitigate potential risks through appropriate data classification approaches. The SANS Institute’s six-step approach is recommended as a possible solution to secure classified data.
Year published : 2015
Publication : International Journal of Computer Science and Information Technologies, Vol. 6 (4) , 2015
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed