The development of stage 1 & step 1 until step 2 of stage 2 of the malaysian public sector information security risk assessment methodology (MyRAM) tool for scan associates bhd
Also available in printed version : QA76.9.A25 C449 2005 raf
| Main Author: | Che Zalila Che Jaafar |
|---|---|
| Other Authors: | Othman Mohd. Yusop, supervisor |
| Format: | Master's thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/53675 |
| Abstract | Abstract here |
Similar Items
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
by: Abdulrahman Mustafa Shehu
Published: (2025)
by: Abdulrahman Mustafa Shehu
Published: (2025)
Secure wireless implementation based on IEEE 802.1x network standard
by: al-Slakhi, Mahmoud H.R
Published: (2025)
by: al-Slakhi, Mahmoud H.R
Published: (2025)
Low-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard
by: Azzam Zavvari (P53612)
Published: (2023)
by: Azzam Zavvari (P53612)
Published: (2023)
Design and development of a new lightweight scanning core engine for malware detection
by: Lee Ling Chuan
Published: (2023)
by: Lee Ling Chuan
Published: (2023)
A model of security awareness in cloud computing
by: Abdul Ghafar Jaafar
Published: (2025)
by: Abdul Ghafar Jaafar
Published: (2025)
Information security learning content classification : case study
by: Wan Nor Azura binti Kamarudin (P47925)
Published: (2023)
by: Wan Nor Azura binti Kamarudin (P47925)
Published: (2023)
Cloning, expression and characterization of antifungal protein gene (Endo-β-1,3-1,4-glucanase) from Bacillus sp. strain 289 against sheath blight disease pathogen, Rhizoctonia solani
by: Bunawan, Siti Noraini
Published: (2015)
by: Bunawan, Siti Noraini
Published: (2015)
Implementation of PKCS11 and PKCS12 cryptographic functions in.net for scan associates
by: Pirooz Kiani Kori
Published: (2025)
by: Pirooz Kiani Kori
Published: (2025)
Efficient 2-level image tamper detection using 3 LSB watermarking technique
by: Sajjad Dadkhah
Published: (2025)
by: Sajjad Dadkhah
Published: (2025)
Forecast Errors and the Effect of Underwriter Reputation and Auditor Influence During Listing on IPOs
by: Mahussin, Norlida
Published: (2003)
by: Mahussin, Norlida
Published: (2003)
Investigating the factors influencing user acceptance of Physical Access Control Systems (PACS)
by: Sindih, Janeve
Published: (2024)
by: Sindih, Janeve
Published: (2024)
Security posture assessment for Shapadu Corporation Sdn. Bhd / Ediwarman Mohamad Taher
by: Mohamad Taher, Ediwarman
Published: (2013)
by: Mohamad Taher, Ediwarman
Published: (2013)
Information security awareness amongst students in IIUM
by: Ahmed, Ibrahim Nasreldin Ibrahim
Published: (2024)
by: Ahmed, Ibrahim Nasreldin Ibrahim
Published: (2024)
Secure coding awareness learning tool (SCALT) in educating learners on web vulnerabilities
by: Nor Harisah Zainuddin @ Zenah
Published: (2024)
by: Nor Harisah Zainuddin @ Zenah
Published: (2024)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud comptuing
by: Muhammad Fisal Zakaria
Published: (2025)
by: Muhammad Fisal Zakaria
Published: (2025)
Analysis of user awareness on phishing attempt among student
by: Vanisri Nagalingam
Published: (2025)
by: Vanisri Nagalingam
Published: (2025)
Physical security measures framework for Marib power plant (Yemen)
by: Anas Mustafa Mohammed Al-Aghbari
Published: (2025)
by: Anas Mustafa Mohammed Al-Aghbari
Published: (2025)
Empirical investigation on GOE-EGDMS usage frequency in the Malaysian e-government agencies / Mohd Redzuan Mohd Jamaraji
by: Mohd Jamaraji, Mohd Redzuan
Published: (2006)
by: Mohd Jamaraji, Mohd Redzuan
Published: (2006)
Cross-cultural adaptation and validation of adults` food security survey module
by: Khairil Anuar Md. Isa
Published: (2024)
by: Khairil Anuar Md. Isa
Published: (2024)
A study on cyber-attack for IIUM network security practices
by: Alam, Mohammad Jahedul
Published: (2024)
by: Alam, Mohammad Jahedul
Published: (2024)
Deterministic quantum key distribution protocols : development and security analysis
by: Jesni bin Shamsul Shaari
Published: (2024)
by: Jesni bin Shamsul Shaari
Published: (2024)
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
by: Mohammed Nadir bin Ali
Published: (2024)
by: Mohammed Nadir bin Ali
Published: (2024)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment
by: Hau Lian Hong
Published: (2025)
by: Hau Lian Hong
Published: (2025)
Visual framing by social movement organisation towards political participation in Malaysia: an analysis on the BERSIH Movement / Mohd Firdauz Mohd Fathir
by: Mohd Fathir, Mohd Firdauz
Published: (2022)
by: Mohd Fathir, Mohd Firdauz
Published: (2022)
Information security vulnerability in an Iranian context from human perspective (electrical industry)
by: Malahat Pouransafar
Published: (2025)
by: Malahat Pouransafar
Published: (2025)
An improved malware detection framework
by: Ahmad Naim Irfan Aswami Fadillah
Published: (2025)
by: Ahmad Naim Irfan Aswami Fadillah
Published: (2025)
Serious gaming framework to design evacuation facilities / Mohamad Salah Taleb
by: Taleb, Mohamad Salah
Published: (2020)
by: Taleb, Mohamad Salah
Published: (2020)
Simplified computer incident response model for premium pension limited Nigeria
by: Abubakar Mohammed
Published: (2025)
by: Abubakar Mohammed
Published: (2025)
Penilaian pelaksanaan sistem pencegahan terhadap ancaman dalaman di agensi sektor awam
by: Abdul Hadi Jehmica Abdullah (P58673)
Published: (2023)
by: Abdul Hadi Jehmica Abdullah (P58673)
Published: (2023)
Pemodelan dan analisis risiko bagi pulangan saham Malaysia menggunakan taburan campuran normal
by: Zetty Ain Kamaruzzaman (P55938)
Published: (2023)
by: Zetty Ain Kamaruzzaman (P55938)
Published: (2023)
The use of audio-visual aids in recalling plot and characters in Step by Wicked Step / Yegnese Raja
by: Yegnese, Raja
Published: (2017)
by: Yegnese, Raja
Published: (2017)
Security implementation approach for the use of bring your own device in government agencies
by: Mohamad Roshidi Rozali
Published: (2025)
by: Mohamad Roshidi Rozali
Published: (2025)
Analyzing the dynamics behavior of fast-flux dmain name system through visualization
by: Andi Fitriah Binti Abdul Kadir
Published: (2024)
by: Andi Fitriah Binti Abdul Kadir
Published: (2024)
Secure Appreciative Inquiry Fuzzy Quantification Technique For Quantifying Software Security Requirements
by: Omar Isam Homaidi Al Mrayat
Published: (2024)
by: Omar Isam Homaidi Al Mrayat
Published: (2024)
Multi-Step Modified Differential Transform Methods For Hyperbolic Partial Differential Equations
by: Che Hussin, Che Haziqah
Published: (2020)
by: Che Hussin, Che Haziqah
Published: (2020)
A three-stage methodology for design evaluation in product development
by: Faiz, Mohd Turan
Published: (2013)
by: Faiz, Mohd Turan
Published: (2013)
A three-stage methodology for design evaluation in product development
by: Mohd Turan, Faiz
Published: (2013)
by: Mohd Turan, Faiz
Published: (2013)
Similar Items
-
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
by: Abdulrahman Mustafa Shehu
Published: (2025) -
Secure wireless implementation based on IEEE 802.1x network standard
by: al-Slakhi, Mahmoud H.R
Published: (2025) -
Low-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard
by: Azzam Zavvari (P53612)
Published: (2023) -
Design and development of a new lightweight scanning core engine for malware detection
by: Lee Ling Chuan
Published: (2023) -
A model of security awareness in cloud computing
by: Abdul Ghafar Jaafar
Published: (2025)
