The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations
The data security of an organisation is not only susceptible to malicious outsiders and exploitative attackers but also to insider threats. Preventing insider threats is particularly challenging, especially when they originate from seemingly trusted and authorised insiders. Currently, in Malaysia th...
| Main Author: | |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2025
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/11965/1/permission%20to%20deposit-allow%20embargo%2024%20months-s828932.pdf https://etd.uum.edu.my/11965/2/s828932_01.pdf https://etd.uum.edu.my/11965/3/s828932_02.pdf https://etd.uum.edu.my/11965/ |
| Abstract | Abstract here |