Articles
*Share - Works only when the website is live*

0-9Download
13 Security Tips To Safe Online Banking
Author : CyberSecurity Malaysia
Click Here

ADownload
An Overview of Disk Imaging Tool In Computer Forensics
Author : Madihah Mohd. Saudi
Click Here
An Overview of SecureIIS - Are We Really Secured Now?
Author : Zul Azhan Suhaimi
Click Here
Ancaman Siber: Mitos atau Realiti?
Author : NISER
Click Here
Anti-SPAM Framework Of Best Practices And Technical Guidelines
Author : NISER
Click Here

BDownload
Buli Siber : Mangsa Buli Mengalami Gangguan Mental Dan Emosi
Author : Benny Lim
Click Here
Beware the Hidden Danger
Author : Ahmad Nasir Mohd Zin & Zahri Yunos
Click Here
Business Continuity Planning for All
Author : Nazhalina Nazri
Click Here
Business Continuity Not Just About Business
Author : Zahri Yunos & Ahmad Nasir Mohd Zin
Click Here
Benefits of ISO/IEC 27005:2011 to SMEs
Author : Noor Aida Idris & Lt. Col Asmuni Yusof (Rtd)
Click Here

CDownload
CyberThreats - Myths or Reality?
Author : Zahri Yunos & Ahmad Nasir Mohd Zin
Click Here
Cyberspace The New War Frontier
Author : Shaharudin Ismail & Zahri Yunos
Click Here

DDownload
Dunia Digital : Identiti Dalam Talian Dan Penyamaran
Author : Sandra Isnaji
Click Here
Dealing With Dangers From Within
Author : Siti Suharti Abu Sujak & Zahri Yunos
Click Here
Defending CyberSpace:Agenda for Action
Author : Zahri Yunos & Ahmad Nasir Mohd Zin
Click Here
Dontphishme Add-On
Author : Majalah PC
Click Here

EDownload
Ethics In Information Security
Author : Yati Yassin and Zahri Yunos
Click Here

FDownload
Future Cyber Weapons
Author : Ahmad Nasir Mohd Zin & Zahri Yunos
Click Here

GDownload
Going the dotcom way
Author : Izwan Iskandar Ishak
Click Here

HDownload
Home PC Security
Author : Sharifah Roziah
Click Here
How To Make Online Banking Secure
Author : Ahmad Nasir Mohd Zin & Zahri Yunos
Click Here

IDownload
Is Cyber Crime Reigning on a No Man's Land?
Author : NISER
Click Here
Inculcating The "Culture of ICT Security"
Author : Lt Col Husin Hj Jazri & Noormawati Mohd Nawi
Click Here
Insecurity of Inputs to CGI Program
Author : Suhairi Mohd Jawi @ Said
Click Here
ISMS Implementation: Examining Roles and Responsibilities
Author : Rafidah Abdul Hamid
Click Here
ISMS Pilot Programme Experiences: Benefits, Challenges & Recommendations
Author : Shamsuddin Abdul Jalil and Rafidah Abdul Hamid
Click Here

KDownload
Kesan Aplikasi Rangkaian Sosial Terhadap Pengguna Internet
Author : Syahrir Mat Ali dan Fatin Hasnan
Click Here
Ketagihan Internet Satu Penyakit Mental?
Author : Redy Jeffry Mohamad Ramli
Click Here
Keeping Kids safe online
Author : Zahri Yunos & Sharifah Sajidah
Click Here

LDownload
Let Us Put A Full Stop To Cyber-Bullying
Author : Benny Lim
Click Here

MDownload
Malware Trend Report H2/2017
Author : The OIC-CERT Permanent Secretariat
Click Here
Malware Trend Report H1/2017
Author : The OIC-CERT Permanent Secretariat
Click Here
Managing the Advancement of Documents Going Digital
Author : Zahri Yunos & Ahmad Nasir Mohd Zin
Click Here
Measures to Combat Spam
Author : Maslina Daud & Zahri Yunos
Click Here
Melindungi Anak-anak di Alam Siber
Author : Redy Jeffry Mohamad Ramli
Click Here
Mitigating Advanced Persistent Threats
Author : Noor Azwa Azreen Abd Aziz & Zahri Yunos
Click Here
Mitigating Negative Content On The Net
Author : Ahmad Nasir Mohd Zin & Zahri Yunos
Click Here
Much Ado About Malware
Author : Zahri Yunos and Sharmila Mohamad Salleh
Click Here

NDownload
NISER's ISMS Pilot Programme Experiences: Common Shortcomings in ISMS Implementation (Article)
Author : Shamsuddin Abdul Jalil, Rafidah Abdul Hamid & Ariffuddin Aizuddin
Click Here
NISER's ISMS Pilot Programme Experiences: Common Shortcomings in ISMS Implementation (Paper)
Author : Shamsuddin Abdul Jalil, Rafidah Abdul Hamid & Ariffuddin Aizuddin
Click Here

PDownload
Phishing for Information
Author : Sandra Isnaji
Click Here
Perang Siber Hanya Ilusi Maya?
Author : Redy Jeffry Mohamad Ramli & Nadia Salwa Mohamad
Click Here
Putting Cyber Terrosim Into Context
Author : Zahri Yunos
Click Here
Pengiklanan Internet : Efektif Tapi Mengancam
Author : Azila Alya bt Dahalan
Click Here

RDownload
Raising Business Continuity Management Awareness in Malaysia
Author : Shamsuddin Abdul Jalil
Click Here
Regulating Online Content
Author : Izwan Iskandar Ishak
Click Here
Rootkit: Attacker undercover tools
Author : Saliman Manap
Click Here

SDownload
Securing Applications From Hackers
Author : Norhazimah bt Abd Malek
Click Here
Securing e-mail
Author : Sharipah Setapa
Click Here
Securing IP Routing and Remote Access on Cisco Routers
Author : Mohammed Shafri Hatta
Click Here
Security Policy: Enforcement and Compliance
Author : Rafidah Abdul Hamid
Click Here
Selamatkah Facebook Anda
Author : Sandra Isnaji
Click Here
Shop Online in Peace
Author : Izwan Iskandar Ishak
Click Here
Smart Card- An Alternative to Password Authentication
Author : Ahmad Ismadi Yazid B. Sukaimi
Click Here
Social Networks Posing Security Threat
Author : Syahrir Mat Ali
Click Here
Storage Security Design - A Method to Help Embrace Cloud Computing
Author : Ahmed Abdel-Aziz - GSE, CISSP
Click Here

TDownload
The Seduction of the Virtual City
Author : Sandra Isnaji
Click Here
The Reality of Cyber-Threats Today
Author : Zahri Yunos
Click Here
The Common Criteria ISO/IEC 15408 - The Insight, Some Thoughts, Questions & Issues
Author : Ariffuddin Aizuddin
Click Here
The Importance of Setting Up an Information Security Management Committee
Author : Rafidah Abdul Hamid
Click Here
The New Frontier for Terrorists
Author : Zahri Yunos
Click Here
The Regulatory Environment in Information Security
Author : Husin Jazri
Click Here
Trusted Computer Systems: Understanding and Issues
Author : Ahmad Ubaidah Omar
Click Here

UDownload
Understanding the Various Types of Denial of Service Attack
Author : Raja Azrina Raja Othman
Click Here

WDownload
Weathering a Crisis
Author : Maslina Daud & Zahri Yunos
Click Here
What You Need to Know About Security Policy
Author : Rafidah Abdul Hamid
Click Here
Worms and Trojans Go Mobile
Author : Shaharudin Ismail & Zahri Yunos
Click Here