SUPERVISOR VERIFICATION

Similar documents
PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

TABLE OF CONTENTS CHAPTER TITLE PAGE

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

This item is protected by original copyright

LINKING ITIL WITH OUTSOURCE SERVICES ROKHSAREH MOBARHAN UNIVERSITI TEKNOLOGI MALAYSIA

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

CLOUD COMPUTING ADOPTION IN BANKING SYSTEM (UTM) IN TERMS OF CUSTOMERS PERSPECTIVES SHAHLA ASADI

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

ENHANCING WEB SERVICE SELECTION USING ENHANCED FILTERING MODEL AJAO, TAJUDEEN ADEYEMI

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

DATASET GENERATION AND NETWORK INTRUSION DETECTION BASED ON FLOW-LEVEL INFORMATION AHMED ABDALLA MOHAMEDALI ABDALLA

DYNAMIC TIMETABLE GENERATOR USING PARTICLE SWARM OPTIMIZATION (PSO) METHOD TEH YUNG CHUEN UNIVERSITY MALAYSIA PAHANG

716 West Ave Austin, TX USA

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

PROBLEMS ASSOCIATED WITH EVALUATION OF EXTENSION OF TIME (EOT) CLAIM IN GOVERNMENT PROJECTS


ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

BORANG PENGESAHAN STATUS TESIS

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN Minggu 11

LINK QUALITY AWARE ROUTING ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS RIBWAR BAKHTYAR IBRAHIM UNIVERSITI TEKNOLOGI MALAYSIA

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

ECO HOME MONITORING SYSTEM AIDIL AMSYAR BIN MOHD AZAMEE

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA


UNIVERSITI PUTRA MALAYSIA CLASSIFICATION SYSTEM FOR HEART DISEASE USING BAYESIAN CLASSIFIER

INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions.

FAKULTI TEKNOLOGI & SAINS MAKLUMAT

FAKULTI TEKNOLOGI & SAINS MAKLUMAT. PROGRAM KELAYAKAN MASUK SENARAI KURSUS Sarjana Sistem Maklumat

DYNAMIC MOBILE SERVER FOR LIVE CASTING APPLICATIONS MUHAMMAD SAZALI BIN HISHAM UNIVERSITI TEKNOLOGI MALAYSIA

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

SMART AQUARJUM (A UTOMATIC FEEDING MACHINE) SY AFINAZ ZURJATI BINTI BAHARUDDIN

UNIVERSITI PUTRA MALAYSIA WEIGHTED WINDOW FOR TCP FAIR BANDWIDTH ALLOCATION IN WIRELESS LANS

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Pengguna akan diberikan Username dan Password oleh Administrator untuk login sebagai admin/conference Manager bagi conference yang akan diadakan.

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

BORANG PENGESAHAN STATUS TESIS

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

MLR Institute of Technology

ISU DAN CABARAN PELAKSANAAN SISTEM PENGURUSAN KESELAMATAN MAKLUMAT (ISMS) 15 Jun 2016 Dewan Taklimat Serdang

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

DESIGN AND IMPLEMENTATION OF A MUSIC BOX USING FPGA TAN KIAN YIAK

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

The following chart provides the breakdown of exam as to the weight of each section of the exam.

THESIS PROJECT ARCHIVE SYSTEM (T-PAS) SHAHRUL NAZMI BIN ISMAIL

CREATING USER ID AND PASSWORD : NOTA PENTING NOTA PENTING SEBELUM MEMULAKAN PROSES CREATE USER ID & PASSWORD

HP Instant Support Enterprise Edition (ISEE) Security overview

UNSTEADY AERODYNAMIC WAKE OF HELICOPTER MAIN-ROTOR-HUB ASSEMBLY ISKANDAR SHAH BIN ISHAK UNIVERSITI TEKNOLOGI MALAYSIA

DESIGN ANALYSIS OF EXTERIOR CAR BODY PART BASTIAN WIBAR BIN MOMANG

CS 356 Internet Security Protocols. Fall 2013

DEVELOPMENT OF SPAKE S MAINTENANCE MODULE FOR MINISTRY OF DEFENCE MALAYSIA SYED ARDI BIN SYED YAHYA KAMAL UNIVERSITI TEKNOLOGI MALAYSIA

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Angela McKay Director, Government Security Policy and Strategy Microsoft

CSci530 Final Exam. Fall 2014

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

Keys to a more secure data environment

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA

WEB MANAGEMENT SYSTEM FOR SERIOUS GAME IN INTERNAL MEDICAL PRACTICE. Phoon Wei Yin

AN INTEGRATED SERVICE ARCHITECTURE FRAMEWORK FOR INFORMATION TECHNOLOGY SERVICE MANAGEMENT AND ENTERPRISE ARCHITECTURE

PORTABLE ELECTRONICS QUEUE CONTROL SYSTEM WONG CHUN YUAN UNIVERSITY MALAYSIA PAHANG

SLANTING EDGE METHOD FOR MODULATION TRANSFER FUNCTION COMPUTATION OF X-RAY SYSTEM FARHANK SABER BRAIM UNIVERSITI TEKNOLOGI MALAYSIA

SMART MOBILE ADVERTISER (SMA) MOHD SHABRUL KHAIRY BIN AWANG KENAL

SMS and Web-Based e-government Model Case Study: Citizens Complaints Management System at District of Gihosha Burundi

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Manual Pengguna. PCN Online Service Fulfillment System

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

ARM PROCESSOR EMULATOR MOHAMAD HASRUZAIRIN B MOHD HASHIM

Chapter 12. Information Security Management

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Transcription:

SUPERVISOR VERIFICATION I acknowledge that I have read this research report and in my opinion this research report is sufficient in terms of scope and quality for the award of Bachelor of Technology Management (Innovation) Signature :... Supervisors Name :... Date :...

THE ROLE OF CYBER SECURITY AT VIZONE SOLUTIONS SDN BHD MOHAMMED HARISH RASYDAN BIN ABDUL MUSTAK Report submitted in fulfillment of the requirements for the Bachelor Degree of Technology Management (Technology Innovation) Faculty of Technology Management and Technopreneurship UNIVERSITI TEKNIKAL MALAYSIA MELAKA (UTeM) JUNE 2014

ii DECLARATION I declare that all parts of this report are the results of my own work except for the quotations and references, the sources of which have been acknowledged in the bibliography. Signature :... Name :... Date :...

iii DEDICATION For Ummy and Addy

iv ACKNOWLEDGEMENT The researcher would like to first thank his parents for being there as a beacon of hope and guidance ever since the beginning. With much love and affection blended with the support given, the researcher was able to complete this research. The researcher is also grateful towards all the guidance and support provided by his supervisor, Dr. Norain Ismail throughout the process of conducting this research for the final year project. Finally, the researcher would like to acknowledge all who have been involved in this research project no matter directly or indirectly. Their support has been much help to the researcher. The researcher hopes that this report will be a reference for students and readers in the future.

v ABSTRACT In line with the growing trend of cyberspace, cyber security is being assembled to accommodate the also growing threat of cyber-crimes. Many Information Communications and Technology (ICT) vendors have taken this opportunity to publish and market their solutions and products that can help fight cyber-crimes. Cyber security has its role in every part of the cyber environment be it in the households or in organizations. Vizone Solutions Sdn Bhd is a company which deals with the cyber environment by providing services such a systems integration and network infrastructure development. Vizone also include cyber security in their services as well as utilizes cyber security methods in their organization. Facing the challenges of a growing cyber environment, Vizone and other organizations as well as the public users need to cope with the evolving threats that are present in the cyber environment. Cyber security has long been addressed ever since the cyber environment has come into being and is becoming a major focus with the increased use of the internet in everyday tasks. The researcher has identified this as a problem and will present his findings based on the research objectives and questions formulated. Concluding the research with significant findings from interviews and observations, the researcher also presents recommendations for the reference of both the public users and organizations. The researcher aspires that this research will make cyber security a larger area to be focused on in the future.

vi ABSTRAK Seiring dengan aliran ruang siber yang semakin berkembang, keselamatan siber sedang dihimpunkan untuk menampung ancaman jenayah siber yang semakin bertambah. Banyak penjaja Teknologi Maklumat dan Komunikasi telah mengambil peluang ini untuk menerbit dan memasarkan penyelesaian dan produk mereka yang boleh membantu membanteras jenayah siber. Keselamatan siber mempunyai peranannya di setiap bahagian persekitaran siber sama ada di premis persendirian atau dalam organisasi. Vizone Solutions Sdn Bhd ialah sebuah syarikat yang berdepan dengan persekitaran siber dengan menyediakan perkhidmatan persepaduan sistem dan pembangunan infrastruktur rangkaian. Vizone juga merangkumi keselamatan siber dalam perkhidmatan mereka serta menggunakan kaedah-kaedah keselamatan siber dalam organisasi mereka. Di samping menghadapi cabaran persekitaran siber yang kian bertambah, Vizone dan organisasi lain serta pengguna awam perlu mengatasi ancaman-ancaman baru yang hadir di persekitaran siber. Keselamatan siber telah lama dikemukakan semenjak persekitaran siber telah wujud dan menjadi satu fokus utama dengan penggunaan jaringan yang meningkat dalam tugasan harian. Penyelidik telah mengenalpasti dilema ini sebagai satu masalah dan akan mengemukakan penemuan diperoleh berdasarkan objektif dan soalan kajian. Kajian disimpulkan dengan penemuan dari temuramah dan pemerhatian penyelidik. Penyelidik juga akan mengemukakan beberapa cadagan untuk rujukan kedua-dua pihak pengguna awam dan organisasi. Penyelidik bercita-cita bahawa kajian ini akan menjadikan keselamatan siber itu sebagai tumpuan pada masa akan datang.

vii CONTENT CHAPTER TOPIC PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK CONTENT LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF APPENDICES ii iii iv v vi vii x xi xii xv CHAPTER 1 INTRODUCTION 1 1.1 Background 1 1.2 Problem Statement 2 1.3 Research Questions 3 1.4 Research Objectives 3 1.5 Scope and Limitation 3 1.6 Significance of the Study 4 1.7 Summary 5

viii CHAPTER TOPIC PAGE CHAPTER 2 LITERATURE REVIEW 6 2.1 Factors that Effect Cyber Security 6 2.2 Initiatives 10 2.2.1 Malaysian Administrative Modernisation and Management Planning Unit (MAMPU) 11 2.2.2 Malaysian Communications and Multimedia Commission (MCMC) 13 CHAPTER 3 RESEARCH METHODS 17 3.1 Research Design 17 3.2 Research Strategy 17 3.3 Primary and Secondary Data Sources 18 3.4 Reliability and Validity 19 3.5 Timeline 19 CHAPTER 4 FINDINGS AND DISCUSSIONS 20 4.1 Introduction 20 4.2 Cyber Security as a Whole 22 4.2.1 Vulnerabilities 25 4.3 Cyber Security in Organizations 28 4.4 Cyber Security Methods 33 4.4.1 Malicious Software 35

ix CHAPTER TOPIC PAGE 4.4.2 Hardware Security 36 4.4.3 Network Layer Security 39 4.4.4 Internet Protocol Security (IPSec) 39 4.4.5 Firewalls 40 4.4.6 Electronic Mail Security (E-mail Security) 42 4.4.7 Browser Choice 44 4.4.8 Internet Security Products 44 4.5 Implications of Cyber Security 45 CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 47 5.1 The Future of Cyber Security 47 5.2 VIZONE s Mission 48 5.3 The Researchers Recommendation 48 REFERENCES 51 APPENDICES 53

x LIST OF TABLES TABLE TITLE PAGE 2.1 Types of Attackers (Panko, 2003) 9 4.1 Interviewee Thoughts on Cyber Security as a Whole 22

xi LIST OF FIGURES FIGURE TITLE PAGE 2.1 The three factors governing cyber security and the relationship between them (Muniandy, 2012) 7 2.2 Factors affecting cyber security in organizations (Quane, 2013) 7 4.1 Vulnerabilities of Cyber Security 25 4.2 Types of Malicious Software 34 4.3 Dongles Infrastructure 37 4.4 Trusted Platform Modules 37 4.5 Mobile Access Infrastructure 38 4.6 Firewall Enabled Network 41 4.7 Researcher s Recommendations 49

xii LIST OF ABBREVIATIONS ICT Information Communications Technology IT Information Technology MP3 Moving Pictures Expert Groups Layer 3 MAMPU Malaysian Administrative Modernization and Planning Unit MCMC Malaysian Communications and Multimedia Commission SKMM Suruhanjaya Komunikasi dan Multimedia Malaysia CEO Chief Executive Officer IBM International Business Machines HP Hewlett-Packard TMS ekp Transportaion Management System Enterprise Knowledge Portal API Application Programming Interface PHP PHP Hypertext Processor NRW Non-Revenue Water DoS Denial of Service DDoS Distributed Denial of Service FTP File Transfer Protocol DNS Domain Name System CD-R Compact Disc-Recordable DVD-R Digital Versatile/Video Disc-Recordable CD-ROM Compact Disc-Read Only Memory FBI Federal Bureau of Investigations NSA National Security Agency TEMPEST NSA Codename IDS Intrusion Detection System

xiii LIST OF ABBREVIATIONS UNIX USB AES VPN TPM BIOS LE NFC ios QR TCP IP SSL TLS PGP IPSec IETF AH ESP IKE SMTP HTTP E-Mail RFC Name of First Operating System Universal Serial Bus Advanced Encryption Standards Virtual Private Network Trusted Platform Module Basic Input/Output System Low Energy Near Field Communication iphone Operating System Quick Response Transmission Control Protocol Internet Protocol Secure Sockets Layer Transport Layer Security Pretty Good Privacy Internet Protocol Security Internet Engineering Task Force Authentication Header Encapsulating Security Payload Internet Key Exchange Simple Mail Transfer Protocol Hypertext Transfer Protocol Electronic Mail Request For Comments

xiv LIST OF ABBREVIATIONS MUA MTA DES CAST-128 MIME ASCII NVT MAC DNA Mail User Agant Mail Transfer Agent Data Encryption Standard Block Cipher or Encryption Algorithm Multipurpose Internet Mail Extensions American Standard Code for Information Interchange Network Virtual Terminal Message Authentication Code Deoxyribonucleic Acid

xv LIST OF APPENDICES APPENDIX TITLE PAGE A Timeline for PSM I 53 B Timeline for PSM II 54 C Research Consent Letter 55 D Questions Guide for Interview 56

1 Chapter 1 Introduction 1.1. Background In line with the growing trend of cyberspace, cyber security is being assembled to accommodate the also growing threat of cyber-crimes. Many Information Communications and Technology (ICT) vendors have taken this opportunity to publish and market their solutions and products that can help fight cyber-crimes. Cyber security refers to a measure for protecting computer systems, networks, and information from disruption or unauthorized access, use, disclosure, modification or destruction (Gallaher, Link & Rowe, 2008). Vizone Solutions Sdn Bhd is an ICT vendor which deals with systems integration and email application services. Vizone has an image to uphold as a ICT organization, therefore, they need to let clients believe that the can bring the best solutions. Besides being an organization that deals with ICT services, Vizone also offers cyber security solutions. However, the organization itself is facing a few problems dealing with cyber security.

2 1.2. Problem Statement People are unaware of the importance of cyber security. They tend to overlook the matter and settle for simple security measures and solutions that are easy to breach and do not guarantee protection. Despite the availability of various types of cyber security measures and solutions and the statutes made by the government, the role of cyber security in organizations is still not seen as a significant matter to look upon. Cyber security needs to be addressed in today s growing ICT age. The awareness of the role of cyber security in Malaysia is still considered low compared to other countries despite the growing threats that are moving about in the cyber environment. The outside world has taken serious measures to ensure the security of their cyber environment is rigid unlike here in Malaysia. The consequences may be severe if so to say planned cyber-attacks carried out by hackers or even other countries. The security of Malaysia s cyber environment is still at its infancy. However, there are efforts from the government by enacting Data Protection Acts and policies for organizations and individuals to abide by. Vizone Solutions is a small organization that offers ICT solutions to client organizations and mainly deal with government agencies. However, Vizone is facing some problems of their own. The cyber security at Vizone is low and they have no means to address the problem. Thus, this is timely for the study of the role of cyber security at Vizone Solutions Sdn Bhd..

3 1.3. Research Questions The researcher has set a few research questions as follows: Why is cyber security important? What is the role of cyber security in organizations? What are the methods of cyber security that are available for Vizone? 1.4. Research Objectives The researcher has listed out a few research objectives that will be focused on: To explore the importance of cyber security To study the role of cyber security in an organization To examine the cyber security methods used by Vizone Solutions 1.5. Scope and Limitation The scope of this research has been set around to focus on cyber security and how preventive measures can be taken to secure and protect technology and in particular, data. The researcher only studies the roles, importance and methods of cyber security in Vizone Solutions Sdn Bhd.

4 The research will be a case study of the company, Vizone Solutions Sdn Bhd and this is because it has relations with the researchers former place of industrial training attachment. The researcher will not cover the laws and legislations. There will be no further research done on the security standards set by governing bodies. 1.6. Significance of the Study This research has much significance because it bears the weight of the future of ICT and in particular in Malaysia. The internet and its clump of technology has brought much development to the country and the world but along the way cyber security must also be addressed. The roles of cyber security will not only be made clear but also it will be viewed as a significant part of ICT protection. The researcher would also like to initiate this research to be a start of a new focus in the field collaboration of technology management and cyber security. The researcher will also be able to learn the importance of cyber security in organization and it will become a reference study for other organizations in the future. The researcher will also get to explore the various types of cyber security measures that are available. This research will also help organizations like Vizone to control their business sustainability because cyber security breaches can be damaging to a company and may result in business failures.

5 1.7. Summary This research is conducted mainly to study the role of cyber security in organizations. By formulating research question and having research objectives, the researcher can strengthen his research focus. This research will further discuss the methods and specific measures that can be taken to perform cyber security measures.

6 Chapter 2 Literature Review 2.1. Factors that Effect Cyber Security Cyber security refers to a measure for protecting computer systems, networks, and information from disruption or unauthorized access, use, disclosure, modification or destruction (Gallaher, Link & Rowe, 2008). Muniandy (2012) proposed a theory that there are three major factors that govern cyber security which are technology, organization and human. Technology factor refers to the technology that can play a major role in providing protection to the cyber citizen. Technology can be in the form of hardware or software or a combination of both. Human refers to the users of cyberspace. She went on to explain that organization is divided into two which are the special agencies formed by the Malaysian government and the acts enacted by the government.

7 Figure 2.1: The three factors governing cyber security and the relationship between them (Muniandy, 2012) The researcher agrees that the technological factor and the human factor is true. But as for the organization, it should be defined as the unit or body being attacked by the cyber terrorist whether it be a big enterprise or a personal business. As for the government and the law, it is a different factor whereby the governance encompasses the other three factors. COMPLIANCE CYBER SECURITY EVOLUTION OF DATA PROTECTION EMPLOYEE MOBILITY Figure 2.2: Factors affecting cyber security in organizations (Quane, 2013)

8 As for cyber security in an organization, Quane (2013) discusses in Figure 2.2 that there are three factors that influence it which are compliance, employee mobility and the evolution of data protection. The researcher strongly accepts this discussion as employee mobility in an organization can be managed but the outcome can never be anticipated. The evolution of data protection on the other hand is like a rolling ball of snow. It will increase in volume but the direction too cannot be anticipated. We can see so much of expansion in the cyber environment is all aspects whether it be in its technological evolution to its social influence. Compliance of all parties, whether it be from the organization or employees or even the vendors solution can be controlled. No matter how it may be, these three factors are the main factors of technology protection when it comes to an organizational perspective.