OIC-CERT JOURNAL OF CYBER SECURITY
ISSN 2636-9680 | eISSN 2682-9266


 

 

Indexing:

 

Abstracted and indexed in:

 

 

 

Future:

 

 

Edition > Volume 3 > Issue 1

VOLUME 3, ISSUE 1

 

Title:

PRACTICAL GUIDELINE FOR DIGITAL FORENSICS LABORATORY ACCREDITATION – A CASE STUDY

 

 

Author(s):

Sarah Taylor, AkmalSuriani Mohamed Rakof & Mohd Zabri Adil Talib

 

 

Abstract:

Digital forensics is a branch of forensic science that is used to assist investigation of cybercrime cases. Digital evidence, such as from mobile devices and computers, are analysed and the data are interpreted to assist the court of law in understanding what has taken place.

 

 



Title:

THE INTEGRATION OF CYBER WARFARE AND INFORMATION WARFARE

 

 

Author(s):

Noor Azwa Azreen Binti Dato’ Abd. Aziz, Engku Azlan Bin Engku Habib & Madihah Mohd Saudi

 

 

Abstract:

Throughout the years, the appearance of cyber warfare and information warfare have changed and enhanced the methods, techniques, as well as the tools strategically, in the information and cyber warfare domain.

 

 



Title:

CYBERBULLYING VIA SOCIAL MEDIA: CASE STUDIES IN MALAYSIA

 

 

Author(s):

Azriq Ariffin, Nurul Mohd & Thurgeaswary Rokanatnam

 

 

Abstract:

Cyberbullying is generally defined as employing electronic communication to bully or harass a person on the Internet, particularly on the social media sites. Advances in technology and better Internet access have enabled cyberbullies to find their way into the IT world.

 

 



Title:

ESTABLISHMENT OF A METHOD TO MEASURE THE AWARENESS OF OIC-CERT MEMBERS

 

 

Author(s):

Tural Mammadov, Noraini Abdul Rahman & Mohamad Farhan Mohd Rahimi

 

 

Abstract:

Cyber threats and incidents have increased massively in the recent years thus it is very crucial in protecting and maintaining the critical infrastructures in organizations. The lack of awareness and active responses could be an issue to be highlighted for the Computer Emergency Response Teams (CERTs), which are responsible for incident handling process and mitigating the exposed risks faced by organizations and nations.

 

 



Title:

DEVELOPMENT OF EXAMINATION FRAMEWORK FOR CYBER SECURITY PROFESSIONAL COMPETENCY CERTIFICATION

 

 

Author(s):

Siti Rahayu Selamat & Azni Haslizan Ab Halim

 

 

Abstract:

Talent development in the area of cyber security rapidly evolve due to the dramatic changes in cyber threats and attacks. The needs of professional certification in cybersecurity industry have been addressed by many organizations throughout the world.

 

 



Title:

OVERVIEW OF PRIORITIZATION MODEL FOR NATIONAL CRITICAL SECTORS PROTECTION

 

 

Author(s):

Ariani & Muhammad Salman

 

 

 

Abstract:

The national critical sectors are an important sector that should be paramount in maintaining the state security when cybersecurity incident occurs. The national critical sectors aim to secure facilities, networks, information and physical assets.

 

 



Title:

ACHIEVING 5G SECURITY THROUGH OPEN STANDARDS

 

 

Author(s):

A. Cheang, X. Gong & M. Yang

 

 

Abstract:

In telecommunications, 5G is the fifth-generation technology standard for broadband cellular networks. The substantial increase in speed, coupled with reduced latency that allows instant communication and ability to connect more devices at the same time are critical game changers when it comes to building a foundation infrastructure that will support future smart applications and solutions in any digital transformation projects that attempt to create new outcomes that will benefit people and businesses.

 

 

 


Title:

NEW VULNERABILITIES UPON GRAIN V0 BOOLEAN FUNCTION THROUGH FAULT INJECTION ANALYSIS

 

 

Author(s):

Wan Zariman Omar@Othman, Muhammad Rezal Kamel Ariffin, Solahuddin Shamsuddin, Suhairi Mohd. Jawi & Zahari Mahad

 

 

Abstract:

Algebraic attacks on stream cipher are very important in cryptography as well as in cryptanalysis. Generally, increasing degree of the equation will make an algebraic attack to the equation hardest. In conducting this analysis, we aim to decrease the degree of the targeted Boolean equation by constructing low degree annihilator equation(s).