Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.6 LEGAL ISSUES AND PRIVACY CONCERNS (Malaysian Cyber Law (digital…
1.6 LEGAL ISSUES AND PRIVACY CONCERNS
Malaysian Cyber Law
digital signature act 1997
computer crimes act 1997
telemedicine act 1997
communication and multimedia act 1998
copyright (amendent) act 1997
electronic commerce act 2006
Network Security Trends
Wireless Access
the increasing use of wireless LAN connections and the rapid rise of internet access from cell phones on Europe and Asia are requiring entirely whole new approaches to security.
The need for speed
the number of boradband connections to the internet from home is exceeding projections
Security Organization Roles
-cert/cc
us-cert
sans institute
(isc)2
common criteria
fips
icsa
Issues of line security
CATEGORIES
data disclosure
data modification
data availability
ACTIVITIES
hacking
cracking
spoofing
sniffing
Security Method
logon;
using strong password
file system;
install security patches regularly
data communication;
restricted connection
administration;
depending to the network
Source Of Threat
internal threat
mobile & remote user
internet & tcp/ip
physical
phone attacks (phone call)
social engineering
Internet Service
email transfer
file transfer; p2p, client server
remote access to hosts
real time conferencing services; fb, ws, skype
Security Threats
insecure architectures
broadcast network(hardware)
centralized services