OIC-CERT JOURNAL OF CYBER SECURITY
ISSN 2636-9680 | eISSN 2682-9266


 

 

Indexing:

 

Abstracted and indexed in:

 

 

 

Future:

 

 

Edition > Volume 4 > Issue 1

VOLUME 4, ISSUE 1

 

Title:

A PROPOSAL IN HAVING A CYBER RESILIENCE STRATEGY FOR THE CRITICAL NATIONAL INFORMATION INFRASTRUCTURE SECTORS IN MALAYSIA

 

 

Author(s):

Noor Azwa Azreen Binti Abd. Aziz, Dr. Nur Diyana Binti Kamarudin, Muhamad Zaim Bin Mohd. Rozi & Mohd Ridzuan Bin M Shariff

 

 

Abstract:

The environment today is much more complex and riskier, hence, traditional cybersecurity measures are insufficient. Cybersecurity prevention measures are no longer a solution. Cyber-attacks might have already occurred without being realised and by then the damage has already been done. In this regard, it is best to assume that cyber threats and cyber-attacks will eventually break through defences.

 

 



Title:

OIC-CERT 5G Security Framework

 

 

Author(s):

Hulk Zhang, Aloysius Cheang, Xiaoxin Gong & Yang Ming

 

 

Abstract:

OIC-CERT recognizes that 5G marks the beginning of a new era, and at the same time bringing in cybersecurity challenges to a successful 5G transformation. Thus, to effectively and timely address some of these challenges through a holistic way, according to the philosophy of both zero trust and team sports OIC-CERT has established the OIC-CERT 5G security framework as a foundation to demystify and simplify the journey of 5G adoption for OIC nation states where security is no compromise.

 

 



Title:

NEW TYPES OF DOS/DDOS ATTACKS REQUIRE ALTERNATIVE APPROACHES TO SECURITY

 

 

Author(s):

Rashad Aliyev & Tural Mammadov

 

 

Abstract:

This study examined cases where a system completely crashes when a user sends 2–3 DoS requests per second. The aim of these attacks is to find weak code or incorrect settings in the system. The research highlights the inadequacy of providing protection only at code and server levels or with security equipment, especially in critical infrastructures and dedicated networks.

 

 



Title:

A COMPREHENSIVE RECONSIDERATION OF CLOUD SECURITY APPROACH

 

 

Author(s):

Dr.Mohamed Hamad Al Kuwaiti & Talal M. Al Kaissi

 

 

Abstract:

With rapidly growing migration of business, computation and data into the cloud, cloud security is no longer a new topic and is increasingly playing a more critical role in digital transformation. However, with increasing severe cloud security incidents grabbing the headlines recently, it has become imperative that we need to reconsider how to secure the cloud more effectively based on principles about secure-by-design, and zero trust.

 

 



Title:

INCIDENT RESPONSE PRACTICES ACROSS NATIONAL CSIRTS: RESULTS FROM AN ONLINE SURVEY

 

 

Author(s):

Sharifah Roziah Mohd Kassim, Shujun Li & Budi Arief

 

 

Abstract:

The aim of this study is to obtain operational insights of real-world practices across national CSIRTs, concerning cyber incident reporting channels, ticketing tools, incident classification schemes, and ways to identify appropriate responses.

 

 



Title:

STUDY OF LOKIBOT INFECTION AGAINST INDONESIAN NETWORK

 

 

Author(s):

Ariani, Siti Rahmawati & Rudi Lumanto

 

 

 

Abstract:

Of the many types of malware that need attention is malware that causes data leakage, one of which is Lokibot. In 2021, we observed that malware attacks also occurred massively on the Indonesian internet network. Among the types of malware in those attacks, Lokibot was the most significant

 

 



Title:

BUILDING A DYNAMIC CLOUD-BASED SNORT NIDS: A JOURNEY OF “MATA GARUDA” NETWORK INTRUSION MONITORING DEVELOPMENT IN INDONESIA

 

 

Author(s):

Ferry Astika S., Fadhil Yori, Ikbar Maulana, Dimas R, Ahmada Y, M. Alfiyan, Andri S, Novi Turniawati, Dani Ramdani, Taufik Y, Muhammad Salman, Kalamullah Ramli, Jauhari, Isbat & Iwan Syarif

 

 

Abstract:

Snort is one of the well-known signature-based network intrusion detection system (NIDS). In the typical NIDS architecture, the sensor placement must be in the same physical network and the defence centre that makes the deployment cost steep.