Abstracted and indexed in:
Future:
PRACTICAL GUIDELINE FOR DIGITAL FORENSICS LABORATORY ACCREDITATION – A CASE STUDY
Sarah Taylor, AkmalSuriani Mohamed Rakof & Mohd Zabri Adil Talib
Digital forensics is a branch of forensic science that is used to assist investigation of cybercrime cases. Digital evidence, such as from mobile devices and computers, are analysed and the data are interpreted to assist the court of law in understanding what has taken place.
THE INTEGRATION OF CYBER WARFARE AND INFORMATION WARFARE
Noor Azwa Azreen Binti Dato’ Abd. Aziz, Engku Azlan Bin Engku Habib & Madihah Mohd Saudi
Throughout the years, the appearance of cyber warfare and information warfare have changed and enhanced the methods, techniques, as well as the tools strategically, in the information and cyber warfare domain.
CYBERBULLYING VIA SOCIAL MEDIA: CASE STUDIES IN MALAYSIA
Azriq Ariffin, Nurul Mohd & Thurgeaswary Rokanatnam
Cyberbullying is generally defined as employing electronic communication to bully or harass a person on the Internet, particularly on the social media sites. Advances in technology and better Internet access have enabled cyberbullies to find their way into the IT world.
ESTABLISHMENT OF A METHOD TO MEASURE THE AWARENESS OF OIC-CERT MEMBERS
Tural Mammadov, Noraini Abdul Rahman & Mohamad Farhan Mohd Rahimi
Cyber threats and incidents have increased massively in the recent years thus it is very crucial in protecting and maintaining the critical infrastructures in organizations. The lack of awareness and active responses could be an issue to be highlighted for the Computer Emergency Response Teams (CERTs), which are responsible for incident handling process and mitigating the exposed risks faced by organizations and nations.
DEVELOPMENT OF EXAMINATION FRAMEWORK FOR CYBER SECURITY PROFESSIONAL COMPETENCY CERTIFICATION
Siti Rahayu Selamat & Azni Haslizan Ab Halim
Talent development in the area of cyber security rapidly evolve due to the dramatic changes in cyber threats and attacks. The needs of professional certification in cybersecurity industry have been addressed by many organizations throughout the world.
OVERVIEW OF PRIORITIZATION MODEL FOR NATIONAL CRITICAL SECTORS PROTECTION
Ariani & Muhammad Salman
The national critical sectors are an important sector that should be paramount in maintaining the state security when cybersecurity incident occurs. The national critical sectors aim to secure facilities, networks, information and physical assets.
ACHIEVING 5G SECURITY THROUGH OPEN STANDARDS
A. Cheang, X. Gong & M. Yang
In telecommunications, 5G is the fifth-generation technology standard for broadband cellular networks. The substantial increase in speed, coupled with reduced latency that allows instant communication and ability to connect more devices at the same time are critical game changers when it comes to building a foundation infrastructure that will support future smart applications and solutions in any digital transformation projects that attempt to create new outcomes that will benefit people and businesses.
NEW VULNERABILITIES UPON GRAIN V0 BOOLEAN FUNCTION THROUGH FAULT INJECTION ANALYSIS
Wan Zariman Omar@Othman, Muhammad Rezal Kamel Ariffin, Solahuddin Shamsuddin, Suhairi Mohd. Jawi & Zahari Mahad
Algebraic attacks on stream cipher are very important in cryptography as well as in cryptanalysis. Generally, increasing degree of the equation will make an algebraic attack to the equation hardest. In conducting this analysis, we aim to decrease the degree of the targeted Boolean equation by constructing low degree annihilator equation(s).