Data breach on the critical information infrastructures: lessons from the Wikileaks
The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/27231/ http://irep.iium.edu.my/27231/ http://irep.iium.edu.my/27231/ http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf |
id |
iium-27231 |
---|---|
recordtype |
eprints |
spelling |
iium-272312013-11-26T06:35:34Z http://irep.iium.edu.my/27231/ Data breach on the critical information infrastructures: lessons from the Wikileaks Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati K Law (General) T58.5 Information technology T58.6 Management information systems The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) –national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture– can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies. IEEE 2012-07-23 Conference or Workshop Item PeerReviewed application/pdf en cc_by http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf Abdul Ghani Azmi, Ida Madieha and Zulhuda, Sonny and Jarot, Sigit Puspito Wigati (2012) Data breach on the critical information infrastructures: lessons from the Wikileaks. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec, 26-28 June 2012, IIUM. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6246173 10.1109/CyberSec.2012.6246173 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
K Law (General) T58.5 Information technology T58.6 Management information systems |
spellingShingle |
K Law (General) T58.5 Information technology T58.6 Management information systems Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati Data breach on the critical information infrastructures: lessons from the Wikileaks |
description |
The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) –national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture– can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed.
The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies. |
format |
Conference or Workshop Item |
author |
Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati |
author_facet |
Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati |
author_sort |
Abdul Ghani Azmi, Ida Madieha |
title |
Data breach on the critical information infrastructures: lessons from the Wikileaks |
title_short |
Data breach on the critical information infrastructures: lessons from the Wikileaks |
title_full |
Data breach on the critical information infrastructures: lessons from the Wikileaks |
title_fullStr |
Data breach on the critical information infrastructures: lessons from the Wikileaks |
title_full_unstemmed |
Data breach on the critical information infrastructures: lessons from the Wikileaks |
title_sort |
data breach on the critical information infrastructures: lessons from the wikileaks |
publisher |
IEEE |
publishDate |
2012 |
url |
http://irep.iium.edu.my/27231/ http://irep.iium.edu.my/27231/ http://irep.iium.edu.my/27231/ http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf |
first_indexed |
2023-09-18T20:40:30Z |
last_indexed |
2023-09-18T20:40:30Z |
_version_ |
1777409333298987008 |