Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in the university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these as...
| Main Authors: | Ibrahim, Subariah, Salleh, Mazleena, Ithin, Norafida, Ahmad, Rabiah |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
Faculty of Computer Science and Information system
2003
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/4241/ http://eprints.utm.my/4241/1/71510.pdf |
Similar Items
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002)
by: Ibrahim, Subariah
Published: (2002)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
An analysis of the deployment of synergistic cyber security awareness model for the elderly (SCSAM-Elderly) in Malaysia
by: Nurul Alieyah Azam,, et al.
Published: (2024)
by: Nurul Alieyah Azam,, et al.
Published: (2024)
Cyber security and open government in Malaysia: issues and development
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
The Effects Of Structured Versus Unstructured Online Training Modules On Cyber Security Awareness And Perceived Behaviour Among College Students
by: Muniandy, Lalitha
Published: (2017)
by: Muniandy, Lalitha
Published: (2017)
The invisible intellectuals : Female academics in security and international politics
by: Aminudin, Rabi'ah
Published: (2020)
by: Aminudin, Rabi'ah
Published: (2020)
Development of TNB distribution network risk based asset replacement policy and guideline for medium voltage primary equipment
by: S. Balasubramaniam, Yogendra, et al.
Published: (2020)
by: S. Balasubramaniam, Yogendra, et al.
Published: (2020)
Perception on Cyber Terrorism: A Focus Group Discussion Approach
by: Ahmad , Rabiah
Published: (2012)
by: Ahmad , Rabiah
Published: (2012)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Interplay between Supply Chain Visibility and Cyber Security Performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
Cyber security awareness: Is there any significant difference in demographic factors?
by: Sharkawi, Ismawati, et al.
Published: (2023)
by: Sharkawi, Ismawati, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
Similar Items
-
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002) -
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000) -
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)