Cyber security maturity model and Maqasid al-Shari'ah

Knowing how vulnerable an organisation or a state towards cyberattacks, is referred to as Cyber security Index or Maturity Level. Such an index is important to evaluate the organisation's level of vulnerability to cyber threats. Various cyber security models are initiated and applied across the...

Full description

Bibliographic Details
Main Authors: M. Ridza, Nadwiyah, Abdul Aziz, Normaziah, Saidin, Aznan Zuhid, Wahiddin, Mohamed Ridza, Ahmad Dahlan, Abdul Rahman, Ibrahim, Jamaludin, Ahmad H.Osman, Rahmah
Format: Proceeding Paper
Language:English
English
English
Published: Institute of Electrical and Electronics Engineers Inc. 2018
Subjects:
Online Access:http://irep.iium.edu.my/72769/
http://irep.iium.edu.my/72769/1/72769_Cyber%20Security%20Maturity%20Model.pdf
http://irep.iium.edu.my/72769/2/72769_Cyber%20Security%20Maturity%20Model_SCOPUS.pdf
http://irep.iium.edu.my/72769/3/72769_Cyber%20Security%20Maturity%20Model_WOS.pdf
_version_ 1848787676194406400
author M. Ridza, Nadwiyah
Abdul Aziz, Normaziah
Saidin, Aznan Zuhid
Wahiddin, Mohamed Ridza
Ahmad Dahlan, Abdul Rahman
Ibrahim, Jamaludin
Ahmad H.Osman, Rahmah
author_facet M. Ridza, Nadwiyah
Abdul Aziz, Normaziah
Saidin, Aznan Zuhid
Wahiddin, Mohamed Ridza
Ahmad Dahlan, Abdul Rahman
Ibrahim, Jamaludin
Ahmad H.Osman, Rahmah
author_sort M. Ridza, Nadwiyah
building IIUM Repository
collection Online Access
description Knowing how vulnerable an organisation or a state towards cyberattacks, is referred to as Cyber security Index or Maturity Level. Such an index is important to evaluate the organisation's level of vulnerability to cyber threats. Various cyber security models are initiated and applied across the globe as tools towards measuring the mentioned index. These models provide indicators as to how ready an organisation or a country react to attacks and what are the steps to be taken to alleviate the situation. On the other hand, the Maqasid Al-Shari'ah or the higher objectives of Shari'ah generally seeks to preserve the five essentials in human life: faith (deen), life (nafs), intellect ('aql), progeny (nasl) and wealth (mal). This work is proposing the use of Maqasid Al-Shari'ah to identify and prioritizes critical incidents that need to be addressed to ensure the continuity of civil society from the Islamic perspective. This research will also deliver a prototype tool that captures users' input on an organisation's profile and displays the corresponding measured cyber security maturity level of the organisation.
first_indexed 2025-11-14T17:28:43Z
format Proceeding Paper
id iium-72769
institution International Islamic University Malaysia
institution_category Local University
language English
English
English
last_indexed 2025-11-14T17:28:43Z
publishDate 2018
publisher Institute of Electrical and Electronics Engineers Inc.
recordtype eprints
repository_type Digital Repository
spelling iium-727692019-06-21T02:54:57Z http://irep.iium.edu.my/72769/ Cyber security maturity model and Maqasid al-Shari'ah M. Ridza, Nadwiyah Abdul Aziz, Normaziah Saidin, Aznan Zuhid Wahiddin, Mohamed Ridza Ahmad Dahlan, Abdul Rahman Ibrahim, Jamaludin Ahmad H.Osman, Rahmah T Technology (General) T173.5 Technology and Islam Knowing how vulnerable an organisation or a state towards cyberattacks, is referred to as Cyber security Index or Maturity Level. Such an index is important to evaluate the organisation's level of vulnerability to cyber threats. Various cyber security models are initiated and applied across the globe as tools towards measuring the mentioned index. These models provide indicators as to how ready an organisation or a country react to attacks and what are the steps to be taken to alleviate the situation. On the other hand, the Maqasid Al-Shari'ah or the higher objectives of Shari'ah generally seeks to preserve the five essentials in human life: faith (deen), life (nafs), intellect ('aql), progeny (nasl) and wealth (mal). This work is proposing the use of Maqasid Al-Shari'ah to identify and prioritizes critical incidents that need to be addressed to ensure the continuity of civil society from the Islamic perspective. This research will also deliver a prototype tool that captures users' input on an organisation's profile and displays the corresponding measured cyber security maturity level of the organisation. Institute of Electrical and Electronics Engineers Inc. 2018 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/72769/1/72769_Cyber%20Security%20Maturity%20Model.pdf application/pdf en http://irep.iium.edu.my/72769/2/72769_Cyber%20Security%20Maturity%20Model_SCOPUS.pdf application/pdf en http://irep.iium.edu.my/72769/3/72769_Cyber%20Security%20Maturity%20Model_WOS.pdf M. Ridza, Nadwiyah and Abdul Aziz, Normaziah and Saidin, Aznan Zuhid and Wahiddin, Mohamed Ridza and Ahmad Dahlan, Abdul Rahman and Ibrahim, Jamaludin and Ahmad H.Osman, Rahmah (2018) Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 23rd-25th July 2018, Kuala Lumpur. https://ieeexplore.ieee.org/document/8567132 10.1109/ICT4M.2018.00056
spellingShingle T Technology (General)
T173.5 Technology and Islam
M. Ridza, Nadwiyah
Abdul Aziz, Normaziah
Saidin, Aznan Zuhid
Wahiddin, Mohamed Ridza
Ahmad Dahlan, Abdul Rahman
Ibrahim, Jamaludin
Ahmad H.Osman, Rahmah
Cyber security maturity model and Maqasid al-Shari'ah
title Cyber security maturity model and Maqasid al-Shari'ah
title_full Cyber security maturity model and Maqasid al-Shari'ah
title_fullStr Cyber security maturity model and Maqasid al-Shari'ah
title_full_unstemmed Cyber security maturity model and Maqasid al-Shari'ah
title_short Cyber security maturity model and Maqasid al-Shari'ah
title_sort cyber security maturity model and maqasid al-shari'ah
topic T Technology (General)
T173.5 Technology and Islam
url http://irep.iium.edu.my/72769/
http://irep.iium.edu.my/72769/
http://irep.iium.edu.my/72769/
http://irep.iium.edu.my/72769/1/72769_Cyber%20Security%20Maturity%20Model.pdf
http://irep.iium.edu.my/72769/2/72769_Cyber%20Security%20Maturity%20Model_SCOPUS.pdf
http://irep.iium.edu.my/72769/3/72769_Cyber%20Security%20Maturity%20Model_WOS.pdf