Cyber Warfare Impact to National Security - Malaysia Experiences

Abstract

This study analyzed the cyber warfare impact on national security and focusing on Malaysia experiences. The issues regarding cyber warfare have become a serious concern since it was a risk of national security in Malaysia. The objectives of the study are to analyze issues related to cyber warfare that affected Malaysian system security, to determine causes that caused to cyber warfare. This study used a qualitative research approach to evaluate the current defense approaches related to cyber warfare in Malaysia. The interviews were conducted with the respective respondents: the Senior Manager, Research Management Centre, Strategic Research, and Advisory Department of Cyber Security Malaysia Department. This study can contribute to expanding the security of national security by demanding the government to adopt a broad acquisition risk management strategy. It can assist in the development of highly effective aggressive and defensive methods to any company dealing with future cyber warfare challenges and risk.


 


Keywords: cyber warfare, national security, experiences.

References
[1] Andrew Adams, P. R. (2012). A Non-Militarised Approach to Cyber-Security. 11th European Conference on Information Warfare and Security (pp. 1-8). Laval: Academic Publishing International Limited.


[2] Billo, C. G. (2004). CYBER WARFARE: An analysis of the means and motivations of selected nation states. INSTITUTE FOR SECURITY TECHNOLOGY STUDIES.


[3] Bogdanoski, M., & Petreski, D. (2013). Cyber terrorism–global security threat. Contemporary Macedonian Defense-International Scientific Defense, Security and Peace Journal, 13(24), 59-73.


[4] BorneoPost, O. (2013, August 29). Cyber-crime a ticking bomb in Malaysia. BorneoPost Online, p. 2. Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Emerald insight.


[5] Caplan, N. (2013). Cyber Warfare: The Challenge to National Security. Global Security Studies, winter 2013, Volume 4, Issue 1, 96-97.


[6] David S. Alberts, D. S. (2000). National Security Implications of the Information Age. Volume II Information Age Anthology, 10.


[7] GAURAV RAGHUVANSHI, N. P. (2015, January 26). Malaysia Airlines Website Hacked by Group Calling Itself ‘Cyber Caliphate’.


[8] Global Information Assurance Certification Paper. (2004). Retrieved November 2, 2014, from SANS Institute: http://www.giac.org/paper/gsec/3873/informationwarfare- cyber-warfare future-warfare/106165


[9] Hemmat, A. (2011). Cyber Warfare (Russia, China, Iran). 18-20. 59 Ibid. (2010). Countering Challenges to the Global Supply Chain. Cyber Threats to National Security, Symposium One: Countering Challenges to the Global Supply Chain (p. 7). Virginia: CACI International Inc.


[10] Kenneth J. Knapp, W. R. (2006). CYBER-WARFARE. E-security.


[11] Lewis, J. A. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies, 2.


[12] Majid, D. M. (n.d.). Cybercrime: Malaysia. Royal Malaysia Police.


[13] Mohamad Faisol Keling, M. N. (2011). The Malaysian government’s efforts in managing military and defence development. International Journal of Business and Social Science, 181.


[14] Mohd Hafizzuddin, M. D. (n.d.). Cyberplanning and Cyber Defense: A Malaysian Perspective.


[15] Moyer, L. R. (2004). Cyber-security, cyber-attack, and the development of governmental response: the librarian’s view. New Library World, 248-255.


[16] Obama, B. (2008). The Comprehensive National Cybersecurity Initiative. Retrieved June 8, 2015, from The White House President Barack Obama: https://m.whitehouse. gov/issues/foreign-policy/cybersecurity/national-initiative


[17] Oberman, E. (2014, July 3). A Lack of Communicationon Cyber Security Will Cost Your Business Big (Infographic). Retrieved June 12, 2015, from Entrepreneur: http: //www.entrepreneur.com/article/235318 Olga Angelopoulou.


[18] R. Parks, D. Duggan, Principles of cyberwarfare, Security Privacy, IEEE 9 (5) (2011) 30–35. doi:10.1109/MSP.2011.138.


[19] S. V. (2012). Who are you today? Profiling the ID Theft Fraudster. 11th European Conference on Information Warfare and Security (pp. 25-34). Laval: Academic Publishing International Limited. Schreier, F. (n.d.). On Cyberwarfare. DCAF HORIZON 2015 WORKING PAPER No. 7.


[20] Steinberger, R. (2014). Proactive vs. Reactive Security. Retrieved June 9, 2015, from crime research: http://www.crime-research.org/library/Richard.html.


[21] Swanson, L. (2010). The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict. Digital Commons at Loyola Marymount University and Loyola Law School.


[22] Yunos, Z. (2008, September 23). The Reality of Cyber-Threats Today