Protect data and be alert to online cyber threats
PEKAN, 18 May 2021 - Universiti Malaysia Pahang (UMP), through the Centre for Information and Communication Technology (PTMK), advises university residents to always ensure that all internet-related applications are updated and upgraded and always be careful with emails and links from suspicious sou...
| Main Authors: | Irman, Khalil, Mimi Rabita, Abdul Wahit |
|---|---|
| Format: | Newspaper |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/31667/ http://umpir.ump.edu.my/id/eprint/31667/1/Protect%20data%20and%20be%20alert%20to%20online%20cyber%20threats.pdf |
Similar Items
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015)
by: Norhidayah, Masstor
Published: (2015)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
An Automated Tool for MC/DC Test Data Generation
by: Ariful, Haque, et al.
Published: (2014)
by: Ariful, Haque, et al.
Published: (2014)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Student academic alert system / Lee Foo Yee
by: Lee , Foo Yee
Published: (2003)
by: Lee , Foo Yee
Published: (2003)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
FK students take consolation prize in Huawei ICT Competition 2022-2023
by: Mimi Rabita, Abdul Wahit
Published: (2023)
by: Mimi Rabita, Abdul Wahit
Published: (2023)
Cyber physical systems for collaborative indoor localization and mapping
by: Ang, Jacqueline Lee Fang
Published: (2018)
by: Ang, Jacqueline Lee Fang
Published: (2018)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Threat analysis using artificial neural network
by: Yee, Chan Pheng
Published: (2009)
by: Yee, Chan Pheng
Published: (2009)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Sistem kafe siber (Cyber cafe’ system) / Norhashimah Hashim
by: Norhashimah , Hashim
Published: (2003)
by: Norhashimah , Hashim
Published: (2003)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
C++ Programming tutoring simulation "CyberCPP" / Muhammad Nor Mahat
by: Muhammad Nor, Mahat
Published: (2005)
by: Muhammad Nor, Mahat
Published: (2005)
Study and Implementation of Internet of Things (IoT) Based Vehicle Safety
Alert and Tracking System
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
Big data storage, collection, & protection with Islamic perspective
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
A Data-Driven Engine Starter System Using ESP32 With Multi-Layer
Authentication and Alerts
by: Parunandhi, Amareshwari, et al.
Published: (2025)
by: Parunandhi, Amareshwari, et al.
Published: (2025)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
Pensyarah UMPSA bangunkan sistem pengekangan gajah menggunakan kepintaran buatan
by: Mimi Rabita, Abdul Wahit
Published: (2023)
by: Mimi Rabita, Abdul Wahit
Published: (2023)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision
by: Mizanur, Rahman, et al.
Published: (2024)
by: Mizanur, Rahman, et al.
Published: (2024)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Geofence alerts application with gps tracking for children monitoring
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
CIT572 – CYBER MARKETING NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CIT572 – Cyber Marketing June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
100 pelajar UMP terima bantuan komputer riba daripada Kumpulan FGV Holdings Berhad
by: Mimi Rabita, Abdul Wahit
Published: (2023)
by: Mimi Rabita, Abdul Wahit
Published: (2023)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
A buffer-based online clustering for evolving data stream
by: Islam, Md. Kamrul, et al.
Published: (2019)
by: Islam, Md. Kamrul, et al.
Published: (2019)
Similar Items
-
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013) -
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015) -
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013) -
An Automated Tool for MC/DC Test Data Generation
by: Ariful, Haque, et al.
Published: (2014)