The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations
The data security of an organisation is not only susceptible to malicious outsiders and exploitative attackers but also to insider threats. Preventing insider threats is particularly challenging, especially when they originate from seemingly trusted and authorised insiders. Currently, in Malaysia th...
Saved in:
| Main Author: | |
|---|---|
| Format: | Thesis |
| Language: | en en en |
| Published: |
2025
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/11965/1/permission%20to%20deposit-allow%20embargo%2024%20months-s828932.pdf https://etd.uum.edu.my/11965/2/s828932_01.pdf https://etd.uum.edu.my/11965/3/s828932_02.pdf https://etd.uum.edu.my/11965/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!
