Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0028
Enhancement of Asset Value Classification for Mobile Devices
Ahmad Ismadi; Yazid Sukaimi Faizal M.A; Rabiah Ahmad; S. Shahrin; Solahuddin Shamsuddin
Information in mobile devices is an asset like other important business assets, is essential to an organization's business and consequently needs to be suitably protected. The use of mobile devices involves the sharing of its functions between the official and personal use of the data in the same device. The organization needs to perform a risk assessment in order to determine the organization's mobile devices exposure to risk and determine the best way to manage this. The determination of risk within the methodology is based upon the standard formula, which the risk is calculated from the multiplication of the asset value, threats and vulnerability. The ISO 27001 requires is that `An appropriate risk assessment shall be undertaken'. The purpose of this study is to introduce enhancement ways to measure the value of a mobile device using ISO 27001 assets management methodology and mobile device categorization methodology.
Year published : 2012 | 106-110 | IEEE Conference Proceeding
Publication : Proceeding of International Conference on Cyber Security, Cyber Warfare and Digital Forensic
CSC 0030
Forensic acquisition on MP3 players
Sarah Khadijah Taylor; Mohd Izuan Effendy Yusof
MP3 player, a portable digital music player used for playing songs, despite its popularity feature for storing audio files, can also be used to store other types of data, namely .doc, .pdf or .avi. Its portability makes it easy for users to store any data into the device. Investigators now need to be prepared for such devices, as they might contain evidence of a crime. To complicate things further, each MP3 player may have its own proprietary file system, format and technology. This paper will discuss the forensic acquisition on three types of MP3 player; Creative Zen Mosaic, Sony NZW E443 and Samsung YP-Q1.
Year published : 2011 | 143-147 | IEEE Conference Proceeding
Publication : International Conference on Pattern Analysis and Intelligent Robotics
CSC 0029
Forensics Readiness for Wireless Body Area Network (WBAN) System
Abdul Fuad Abdul Rahman
Wireless Body Area Network (WBAN) is a wireless network that can be attached or implanted onto the human body by using wireless sensor. Since WBAN developed for medical devices, the system should be design for a wide range of end user with different professional skill groups. This require WBAN system to be open, accurate and efficient. As from our previous experienced, any open system is vulnerable, similar to any other current available wireless systems such as Wireless Local Area Network (WLAN). However, currently there were not many discussions on the WBAN security vulnerability and security threats and if there is any, the issues were discussed through theoretical, concept and simulation data. In this paper, we discuss potential WBAN security vulnerability and threats using Practical Impact Assessment (PIA) conducted in real environment so that we are able to identify the problem area in details and develop potential solutions to produce a forensics readiness secure network architecture for WBAN system.
Year published : 2014 | 177-180 | IEEE Conference Proceeding
Publication : Proceeding of the 16th International Conference on Advanced Communication Technology
CSC 0047
Framework of Analysis Technique for Abnormal Behavior in Mobile Application
Naqliyah Zainuddin
Abnormal application behavior in mobile can produce a number of undesirable effects. An incorrect or insufficient implementation of application lifecycle, memory related issues and malicious application might cause an unexpected behavior of the application such as bad usability, not responding, crashed and even data loss. Current analysis and detection of abnormal applications behavior are still not comprehensive enough where behavior under user visible failure category such as crash, “stopped unexpectedly” and “not responding” received less attention by researchers. Furthermore, framework of analysis technique has not been developed by researcher to investigate the abnormal behavior in mobile application. Thus, this research will introduce the framework of analysis technique for abnormal behavior in mobile application. In this paper, both static and dynamic analysis techniques are described and applied to Android applications to identify causes of abnormal behavior. These allow the identification of android abnormal application behavior into “behavior groups”, which consists certain behavior that tends to have similar generalized activity profiles.
Year published : January 2015
Publication : Recent Advances in Electrical Engineering and Electronic Devices
CSC 0041
Grounding the Component of Cyber Terrorism Framework Using the Grounded Theory
Zahri Yunos; Rabiah Ahmad [UTeM]; and Mariana Yusoff [UTeM]
The current framework of cyber terrorism consists of non-tested components which are related to physical terrorism as well as cyber security threats. However, there is no universally accepted definition of cyber terrorism, which seems to be a fundamental issue and challenge in countering threats from cyber terrorism. Grounded theory research begins by focusing on area of study and gathers data from various sources, including literatures, interviews and field observations. A grounded theory study can result in empirically grounded hypothesis that can be further tested and verified with new data using qualitative methodology. In this research, semi-structured interview with purposive sampling procedures is the primary data collection. Twenty-two (22) participants took part in the interview session. The analysis indicated that the framework describing cyber terrorism can be considered from six components: motivation, target, method of attack, domain, action by perpetrator and impact. Continued research in this area can be further conducted, which may lead to the development of strategic and technological framework to counter cyber terrorism.
Year published : 2014 | 523-529 | Conference Proceeding
Publication : Proceeding of the IEEE Science and Information Conference 2014
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed