Cyber Security Crisis/Threat: Analysis of Malaysia National Security Council (NSC) Involvement Through the Perceptions of Government, Private and People Based on the 3P Model

Siti Sabrina Imji Rahim, Mohd Ikbal Mohd Huda, Shahrizal Sa’ad, Ravichandran Moorthy

Abstract


The new crisis/threat namely cyber security has become a priority for Malaysia due to the huge impact not only on this country, but also the people. Malaysia shows a trend of increasing cyber security despite various initiatives taken by the government to deal with it. The government has established the National Cyber Security Agency (NACSA) under the auspices of the National Security Council (NSC) where NACSA acts to coordinate all forms of cyber management with other agencies that handle cyber in Malaysia. The question arises is why cyber security continues to increase which is necessary to analyze to what extent NSC as a coordinating agency for managing cyber security successfully plays its role. The study carried out by analyzing the perception of the government, the private sector, and the people on the effectiveness of NSC 's involvement based on the 3P Model via qualitative methods that refer to primary and secondary documents such as official reports, academic journals, and online news as well as through interviews with government officials involved. The results of the analysis found that NSC's involvement is proactive in dealing with cyber security. NSC's coordination with other agencies is active, but there are challenges that need to be addressed. Coordination between the central and state NSC is effective. Political interference has influenced the determined decision but minimal. Cyber security management has led NACSA/NSC to updating/drafting the laws, increased program/strategy, more prominent, and collaborative involvement of all parties.

Keywords: Cyber Security crisis/threat; NACSA; NSC; perception; 3P Model

References

Bahaudin, N. H, & Haqimi, M. A. (2022, March 30). Ancaman keselamatan siber semakin serius. My Metro. https://www.hmetro.com.my/mutakhir/2022/03/826613/ancaman-keselamatan-siber-semakin-serius

Bansal, M. (2018). An Overview of Cyber Security in Malaysia. Journal of Emerging Technologies and Innovative Research (JETIR), 5(8). https://www.jetir.org/papers/JETIRFF06020.pdf

Bernama. (2022, August 5). 11,367 kes jenayah siber dari Januari hingga Julai tahun ini. https://www.astroawani.com/berita-malaysia/11367-kes-jenayah-siber-dari-januari-hingga-julai-tahun-ini-polis-374682

Bernama. (2022, June 7). Malaysia catat 57.8 juta serangan virus siber pada suku pertama. https://www.astroawani.com/berita-malaysia/malaysia-catat-578-juta-serangan-virus-siber-pada-suku-pertama-fortinet-365120

BH Online. (2021, June 28). Keselamatan siber lengkapi usaha memacu pertumbuhan ekonomi. https://www.bharian.com.my/berita/nasional/2021/06/832966/keselamatan-siber-lengkapi-usaha-memacu-pertumbuhan-ekonomi-muhyiddin

BH Online. (2021, May 23). Malaysia siap siaga hadapi ancaman siber. https://www.bharian.com.my/berita/nasional/2021/05/819815/malaysia-siap-siaga-hadapi-ancaman-siber

Burton, J. (2013). Small states and cyber security: The case of New Zealand. Political Science, 65(2), 216-238. https://doi.org/10.1177/0032318713508491

Dioubate, B. M., Daud, W., & Norhayate, W. (2022). Cyber security risk management frameworks implementation in Malaysian Higher Education Institutions. International Journal of Academic Research in Business and Social Sciences, 12(4), 1356–1371. DOI: 10.6007/IJARBSS/v12-i4/12300

E. Ite, U. (2004). Multinationals and corporate social responsibility in developing countries: a case study of Nigeria. Corporate Social Responsibility and Environmental Management, 11(1), 1-11. https://doi.org/10.1002/csr.49

Fuad, N. S. M., Daud, M., & Yusof, A. R. M. (2022). Memahami Jenayah Siber Dan Keselamatan Siber Di Malaysia: Suatu Pemerhatian Terhadap Pandangan Sarjana Dan Intelektual: Understanding Cybercrime and Cybersecurity in Malaysia: An Observation from The Perspective of Scholars and Intellectuals. Asian Journal of Environment, History and Heritage, 6(1), 11-26. https://spaj.ukm.my/ajehh/index.php/ajehh/article/view/184

Ganesin, A., Supayah, L., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of the Arabian Journal of Business and Management Review, 6(4), 12-20. https://platform.almanhal.com/Files/Articles/101388

Hamzah, A. (2004). Kaedah Kualitatif Dalam Penyelidikan Sosiobudaya: Qualitative Methods in Sociocultural Research. Jurnal Pengajian Media Malaysia, 6(1), 1-10. https://sare.um.edu.my/index.php/JPMM/article/view/32755

Hasnan, H. A. (2019, April 3). Ancaman siber: NACSA bakal keluarkan Strategi Keselamatan Siber Negara. Astro Awani. https://www.astroawani.com/berita-malaysia/ancaman-siber-nacsa-bakal-keluarkan-strategi-keselamatan-siber-negara-203081

Ismail, I. S. (2022, September 22). MKN kesan peningkatan ancaman serangan siber. BH Online. https://www.bharian.com.my/berita/nasional/2022/09/1003536/mkn-kesan-peningkatan-ancaman-serangan-siber

Jasmi, K. A. (2012). Metodologi pengumpulan data dalam penyelidikan kualitatitif. Kursus Penyelidikan Kualitatif Siri, 1(2012), 28-29. https://www.researchgate.net/profile/Kamarul-Azmi-

Jasmi/publication/293097563_Metodologi_Pengumpulan_Data_dalam_Penyelidikan_Kualitatitif/links/5c0234e0a6fdcc1b8d4d2e10/Metodologi-Pengumpulan-Data-dalam-Penyelidikan-Kualitatitif.pdf

Krishnan, D. Bala. (2021, January 26). Brace for possible cyber-attack, govt agencies told. New Straits Time. https://www.nst.com.my/news/nation/2021/01/660733/brace-possible-cyber-attack-govt-agencies-told

Lai, R., & Rahman, S. S. (2012). Analytic of China Cyberattack. The International Journal of Multimedia & Its Applications (IJMA), 4(3), 37-56. https://doi.org/10.5121/ijma.2012.4304

Lehto, M., & Limnell, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal: A Global Perspective, 30(3), 139-148. https://doi.org/10.1080/19393555.2020.1813851

Liff, A. P. (2018). Japan’s national security council: policy coordination and political power. Japanese Studies, 38(2), 253-279. https://doi.org/10.1080/10371397.2018.1503926

Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265-284. https://doi.org/10.1080/23738871.2020.1778759

Mat, B., Pero, S. D. M., Wahid, R., & Shuib, M. S. (2020). Cyber Security Threats to Malaysia: A Small State Security Discourse. Sustaining Global Strategic Partnership in the Age of Uncertainties, 5(6), 31.https://www.researchgate.net/publication/349881373_Cyber_Security_Threats_to_Malaysia_A_Small_State_Security_Discourse

Matsubara, M. (2014). Countering cyber-espionage and sabotage: the next steps for Japanese–UK cyber-security co-operation. The RUSI Journal, 159(1), 86-93. https://doi.org/10.1080/03071847.2014.895263

Medcalf, R. (2017). Imagining an Indian National Security Strategy: the sum of its parts. Australian Journal of International Affairs, 71(5), 516-528. https://doi.org/10.1080/10357718.2017.1342762

NSC Official Website. (2022, May 11). Keselamatan Siber: Bahaya ‘Espionage’. https://www.NSC.gov.my/web/ms/2022/05/11/keselamatan-siber-bahaya-espionage/

Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young Internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245-255. https://doi.org/10.6007/ijarbss/v11-i19/11733

Park, J., & Chung, E. (2021). Learning from past pandemic governance: Early response and Public-Private Partnerships in testing of COVID-19 in South Korea. World Development, 137, 105198. https://doi.org/10.1016/j.worlddev.2020.105198

Rosli, F. A. (2020, May 26). Enam langkah 'lawan' jenayah siber. Berita Harian. https://www.bharian.com.my/berita/nasional/2020/05/692956/enam-langkah-lawan-jenayah-siber

Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. https://doi.org/10.1080/10357718.2017.1320972

Stevens, T., & O’Brien, K. (2019). Brexit and cyber security. The RUSI Journal, 164(3), 22-30. https://doi.org/10.1080/03071847.2019.1643256

Suhaimi, F. (2020, November 4). RM1.8 bilion diperuntukkan, rangka Strategi Keselamatan Siber atasi jenayah siber. Astro Awani. https://www.astroawani.com/berita-malaysia/rm18-bilion-diperuntukkan-rangka-strategi-keselamatan-siber-atasi-jenayah-siber-saifuddin-266683

Zahri, Y., Ab Hamid, R. S., & Mustaffa, A. (2017). Cyber security situational awareness among students: a case study in Malaysia. International Journal of Educational and Pedagogical Sciences, 11(7), 1704-1710. https://doi.org/10.5281/zenodo.1131053

Zaini, A. H. (2020). Keberkesanan koordinasi agensi kerajaan dan isu pemerdagangan orang: Kajian empirik organisasi jenayah terancang dalam industri eksploitasi seksual [Master's thesis, National University of Malaysia].

Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161. https://doi.org/10.1080/21624887.2015.1071165


Full Text:

PDF


DOI: http://dx.doi.org/10.17576/ebangi.2024.2102.17

Refbacks

  • There are currently no refbacks.


-


 

_________________________________________________

eISSN 1823-884x

Faculty of Social Sciences & Humanities
Universiti Kebangsaan Malaysia
43600 UKM Bangi, Selangor Darul Ehsan
MALAYSIA

© Copyright UKM Press, Universiti Kebangsaan Malaysia