Data breach on the critical information infrastructures: lessons from the Wikileaks

The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from...

Full description

Bibliographic Details
Main Authors: Abdul Ghani Azmi, Ida Madieha, Zulhuda, Sonny, Jarot, Sigit Puspito Wigati
Format: Conference or Workshop Item
Language:English
Published: IEEE 2012
Subjects:
Online Access:http://irep.iium.edu.my/27231/
http://irep.iium.edu.my/27231/
http://irep.iium.edu.my/27231/
http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf
id iium-27231
recordtype eprints
spelling iium-272312013-11-26T06:35:34Z http://irep.iium.edu.my/27231/ Data breach on the critical information infrastructures: lessons from the Wikileaks Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati K Law (General) T58.5 Information technology T58.6 Management information systems The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) –national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture– can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies. IEEE 2012-07-23 Conference or Workshop Item PeerReviewed application/pdf en cc_by http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf Abdul Ghani Azmi, Ida Madieha and Zulhuda, Sonny and Jarot, Sigit Puspito Wigati (2012) Data breach on the critical information infrastructures: lessons from the Wikileaks. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec, 26-28 June 2012, IIUM. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6246173 10.1109/CyberSec.2012.6246173
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic K Law (General)
T58.5 Information technology
T58.6 Management information systems
spellingShingle K Law (General)
T58.5 Information technology
T58.6 Management information systems
Abdul Ghani Azmi, Ida Madieha
Zulhuda, Sonny
Jarot, Sigit Puspito Wigati
Data breach on the critical information infrastructures: lessons from the Wikileaks
description The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) –national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture– can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies.
format Conference or Workshop Item
author Abdul Ghani Azmi, Ida Madieha
Zulhuda, Sonny
Jarot, Sigit Puspito Wigati
author_facet Abdul Ghani Azmi, Ida Madieha
Zulhuda, Sonny
Jarot, Sigit Puspito Wigati
author_sort Abdul Ghani Azmi, Ida Madieha
title Data breach on the critical information infrastructures: lessons from the Wikileaks
title_short Data breach on the critical information infrastructures: lessons from the Wikileaks
title_full Data breach on the critical information infrastructures: lessons from the Wikileaks
title_fullStr Data breach on the critical information infrastructures: lessons from the Wikileaks
title_full_unstemmed Data breach on the critical information infrastructures: lessons from the Wikileaks
title_sort data breach on the critical information infrastructures: lessons from the wikileaks
publisher IEEE
publishDate 2012
url http://irep.iium.edu.my/27231/
http://irep.iium.edu.my/27231/
http://irep.iium.edu.my/27231/
http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf
first_indexed 2023-09-18T20:40:30Z
last_indexed 2023-09-18T20:40:30Z
_version_ 1777409333298987008