The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations

The data security of an organisation is not only susceptible to malicious outsiders and exploitative attackers but also to insider threats. Preventing insider threats is particularly challenging, especially when they originate from seemingly trusted and authorised insiders. Currently, in Malaysia th...

Full description

Saved in:
Bibliographic Details
Main Author: Afiqah, Abdul Razak
Format: Thesis
Language:en
en
en
Published: 2025
Subjects:
Online Access:https://etd.uum.edu.my/11965/1/permission%20to%20deposit-allow%20embargo%2024%20months-s828932.pdf
https://etd.uum.edu.my/11965/2/s828932_01.pdf
https://etd.uum.edu.my/11965/3/s828932_02.pdf
https://etd.uum.edu.my/11965/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items