An Initial Study of Cyber Security for Web Services in Malaysian Organizations

Authors

  • Firkhan Ali Bin Hamid Ali Department of Information Security & Web Technology, Fakulti Sains Komputer & Teknologi Maklumat, Universiti Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
  • M. Khairul Amin M. Sukri Department of Information Security & Web Technology, Fakulti Sains Komputer & Teknologi Maklumat, Universiti Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
  • M. Azahari M. Yusof Department of Information Security & Web Technology, Fakulti Sains Komputer & Teknologi Maklumat, Universiti Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
  • Mohd Zalisham Jali Faculty of Science & Technology, Universiti Sains Islam Malaysia, Nilai, Malaysia
  • Moh Norazmi Nordin Faculty of Education, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia
  • Miswan Surip Pusat Pengajian Diploma, Universiti Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia

Keywords:

Cyber security, information Technology, Malaysia, web services

Abstract

In the recent and next years, Malaysian enterprises have seen an increase in the development of information technology (IT). This is a result of the Malaysian government actively promoting IT usage throughout all companies in Malaysia, whether they are in the public or private sectors. Utilizing IT including web services will increase an organization's production and quality. Therefore, they require a well-planned implementation of the IT infrastructure and tools. Using web services will ensure that its operations are successful in supporting long-term business ambitions. Besides that, the cyber security play important role to ensure that the web services and IT infrastructures execute well along the organization’s business successful. So, is these digital environments in Malaysian organizations safe it is not a Malaysian IT culture and didn’t have enough and tough knowledge of cyber security. However, how to promote cyber security to Malaysian organizations for web services?  So, promotion can be done by using the web services itself by putting more knowledge and study on the secure usage of IT facilities in Malaysian organizations.

Downloads

Download data is not yet available.

References

Definition for Common Security Terms, http://www.mycert.org.my/html [1 MARCH 2020]

Davis, G.B. and Olson, M.H. (1985) Management Information System: Conceptual Foundations, Structure and Development (2nd edn), McGraw-Hill.

Firkhan Ali, H. A., Maziah Na’aman, “Vulnerability Assessment on the Network Security“ in NCSTIE 2006: Proceedings of the International Conference on Science and Technology 2006. PWTC, UiTM Pulau Pinang.

Galliers, R. and Sutherland (1991) Information System Management and Strategy Formulation: The ‘Stages of Growth’ Model Revisited, Journal of Information Systems, Vol 1 No 2 pp. 89-114.

Firkhan Ali, H. A etl. , “Development Of Dual-Factor Authentication For Web Based Application Using SMS”, Proceedings of the ICITS 2008, Kusadasi, Turkey, 2008.

Firkhan Ali, H. A etl., “Development of Vulnerability and Security Reporting System for Computer System and Networking” in SITIA 2008: Proceedings of the Seminar In The Intelligent Applications 2008, Surabaya, Indonesia, 2008.

Guomin Yang, Duncan S. Wong, Huaxiong Wang dan Xiaotie Deng (2006). “Formal Analysis and Systematic Construction of Two-factor Authentication Scheme.” City University of Hong Kong, China.

MyCERT About Us’, http://www.mycert.org.my/html [1 MARCH 2020]

Incident Statistic (2017-2019), http://www.mycert.org.my/html [1 MARCH 2020]

Wendy, R. (1997) Strategic Management and Information Systems (2nd edn), Prentice Hall.

Lederer, A.L and Gardiner, V. (1992) The Process of Strategic Information System Planning, Journal of Strategic Information System Planning, Vol 1No 2 Mar pp. 76-83

Hatch, B., Lee, J. and Kurtz G. (2001) Hacking Linux Exposed: Linux Security and Solutions, Osborne/McGraw-Hill.

Scambray, J., Mcclure, S. and Kurtz G. (2001) Hacking Exposed: Network Security and Solutions, Osborne/McGraw-Hill.

Richard A. Kemmerer et al., (2002), Intrusion Detection: A Brief History and Overview, SECURITY & PRIVACY–2002, Reliable Software Group, Computer Science Department, University of California Santa Barbara.

Norton, P and Stockman, M. (1999) Peter Norton’s Network Security Fundamentals, SAMS Publishing.

Wenke Lee et al., (2000), A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 4, ACM Press.

Williams, B.K., Sawyer, S.C. and Hutchinson, S.E. (1995) Using Information technology, Richard D. Irwin, Inc.

Ward, J. and Griffiths, P. (1996) Strategic Planning for Information Systems (2nd edn), Wiley.

Zacker, C. (2001) Networking: The Complete Reference, Osborne/McGraw-Hill.

Tipton, H.F. and Krause, M. (2000) Information Security Management Handbook (4th Edition), Auerbach Publications.

Security FAQs’, http://www.mycert.org.my/html [1 MARCH 2020]

Incidents statistics 2019

Downloads

Published

17.05.2023

How to Cite

Hamid Ali, F. A. B. ., M. Sukri, M. K. A. ., M. Yusof, M. A. ., Jali, M. Z. ., Nordin, M. N. ., & Surip, M. . (2023). An Initial Study of Cyber Security for Web Services in Malaysian Organizations. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 180–184. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2839

Issue

Section

Research Article