Cyber security crisis/threat: analysis of Malaysia National Security Council (NSC) involvement through the perceptions of government, private and people based on the 3P Model
List of Authors
  • Mohd Ikbal Mohd Huda , Siti Sabrina Imji Rahim

Keyword
  • Cyber Security crisis/threat, NACSA, NSC, perception, 3P Model

Abstract
  • The new crisis/threat namely cyber security has become a priority for Malaysia due to the huge impact not only on this country, but also the people. Malaysia shows a trend of increasing cyber security despite various initiatives taken by the government to deal with it. The government has established the National Cyber Security Agency (NACSA) under the auspices of the National Security Council (NSC) where NACSA acts to coordinate all forms of cyber management with other agencies that handle cyber in Malaysia. The question arises is why cyber security continues to increase which is necessary to analyze to what extent NSC as a coordinating agency for managing cyber security successfully plays its role. The study carried out by analyzing the perception of the government, the private sector, and the people on the effectiveness of NSC 's involvement based on the 3P Model via qualitative methods that refer to primary and secondary documents such as official reports, academic journals, and online news as well as through interviews with government officials involved. The results of the analysis found that NSC's involvement is proactive in dealing with cyber security. NSC's coordination with other agencies is active, but there are challenges that need to be addressed. Coordination between the central and state NSC is effective. Political interference has influenced the determined decision but minimal. Cyber security management has led NACSA/NSC to updating/drafting the laws, increased program/strategy, more prominent, and collaborative involvement of all parties.

Reference
  • 1. Bahaudin, N. H, & Haqimi, M. A. (2022, March 30). Ancaman keselamatan siber semakin serius. My Metro. https://www.hmetro.com.my/mutakhir/2022/03/826613/ancaman-keselamatan-siber-semakin-serius
    2. Bansal, M. (2018). An Overview of Cyber Security in Malaysia. Journal of Emerging Technologies and Innovative Research (JETIR), 5(8). https://www.jetir.org/papers/JETIRFF06020.pdf
    3. Bernama. (2022, August 5). 11,367 kes jenayah siber dari Januari hingga Julai tahun ini. https://www.astroawani.com/berita-malaysia/11367-kes-jenayah-siber-dari-januari-hingga-julai-tahun-ini-polis-374682
    4. Bernama. (2022, June 7). Malaysia catat 57.8 juta serangan virus siber pada suku pertama. https://www.astroawani.com/berita-malaysia/malaysia-catat-578-juta-serangan-virus-siber-pada-suku-pertama-fortinet-365120
    5. BH Online. (2021, June 28). Keselamatan siber lengkapi usaha memacu pertumbuhan ekonomi. https://www.bharian.com.my/berita/nasional/2021/06/832966/keselamatan-siber-lengkapi-usaha-memacu-pertumbuhan-ekonomi-muhyiddin
    6. BH Online. (2021, May 23). Malaysia siap siaga hadapi ancaman siber. https://www.bharian.com.my/berita/nasional/2021/05/819815/malaysia-siap-siaga-hadapi-ancaman-siber
    7. Burton, J. (2013). Small states and cyber security: The case of New Zealand. Political Science, 65(2), 216-238. https://doi.org/10.1177/0032318713508491
    8. Dioubate, B. M., Daud, W., & Norhayate, W. (2022). Cyber security risk management frameworks implementation in Malaysian Higher Education Institutions. International Journal of Academic Research in Business and Social Sciences, 12(4), 1356–1371. DOI: 10.6007/IJARBSS/v12-i4/12300
    9. E. Ite, U. (2004). Multinationals and corporate social responsibility in developing countries: a case study of Nigeria. Corporate Social Responsibility and Environmental Management, 11(1), 1-11. https://doi.org/10.1002/csr.49
    10. Fuad, N. S. M., Daud, M., & Yusof, A. R. M. (2022). Memahami Jenayah Siber Dan Keselamatan Siber Di Malaysia: Suatu Pemerhatian Terhadap Pandangan Sarjana Dan Intelektual: Understanding Cybercrime and Cybersecurity in Malaysia: An Observation from The Perspective of Scholars and Intellectuals. Asian Journal of Environment, History and Heritage, 6(1), 11-26. https://spaj.ukm.my/ajehh/index.php/ajehh/article/view/184
    11. Ganesin, A., Supayah, L., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of the Arabian Journal of Business and Management Review, 6(4), 12-20. https://platform.almanhal.com/Files/Articles/101388
    12. Hamzah, A. (2004). Kaedah Kualitatif Dalam Penyelidikan Sosiobudaya: Qualitative Methods in Sociocultural Research. Jurnal Pengajian Media Malaysia, 6(1), 1-10. https://sare.um.edu.my/index.php/JPMM/article/view/32755
    13. Hasnan, H. A. (2019, April 3). Ancaman siber: NACSA bakal keluarkan Strategi Keselamatan Siber Negara. Astro Awani. https://www.astroawani.com/berita-malaysia/ancaman-siber-nacsa-bakal-keluarkan-strategi-keselamatan-siber-negara-203081
    14. Ismail, I. S. (2022, September 22). MKN kesan peningkatan ancaman serangan siber. BH Online. https://www.bharian.com.my/berita/nasional/2022/09/1003536/mkn-kesan-peningkatan-ancaman-serangan-siber
    15. Jasmi, K. A. (2012). Metodologi pengumpulan data dalam penyelidikan kualitatitif. Kursus Penyelidikan Kualitatif Siri, 1(2012), 28-29. https://www.researchgate.net/profile/Kamarul-Azmi-Jasmi/publication/293097563_Metodologi_Pengumpulan_Data_dalam_Penyelidikan_Kualitatitif/links/5c0234e0a6fdcc1b8d4d2e10/Metodologi-Pengumpulan-Data-dalam-Penyelidikan-Kualitatitif.pdf
    16. Krishnan, D. Bala. (2021, January 26). Brace for possible cyber-attack, govt agencies told. New Straits Time. https://www.nst.com.my/news/nation/2021/01/660733/brace-possible-cyber-attack-govt-agencies-told
    17. Lai, R., & Rahman, S. S. (2012). Analytic of China Cyberattack. The International Journal of Multimedia & Its Applications (IJMA), 4(3), 37-56. https://doi.org/10.5121/ijma.2012.4304
    18. Lehto, M., & Limnell, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal: A Global Perspective, 30(3), 139-148. https://doi.org/10.1080/19393555.2020.1813851
    19. Liff, A. P. (2018). Japan’s national security council: policy coordination and political power. Japanese Studies, 38(2), 253-279. https://doi.org/10.1080/10371397.2018.1503926
    20. Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265-284. https://doi.org/10.1080/23738871.2020.1778759
    21. Mat, B., Pero, S. D. M., Wahid, R., & Shuib, M. S. (2020). Cyber Security Threats to Malaysia: A Small State Security Discourse. Sustaining Global Strategic Partnership in the Age of Uncertainties, 5(6), 31.https://www.researchgate.net/publication/349881373_Cyber_Security_Threats_to_Malaysia_A_Small_State_Security_Discourse
    22. Matsubara, M. (2014). Countering cyber-espionage and sabotage: the next steps for Japanese–UK cyber-security co-operation. The RUSI Journal, 159(1), 86-93. https://doi.org/10.1080/03071847.2014.895263
    23. Medcalf, R. (2017). Imagining an Indian National Security Strategy: the sum of its parts. Australian Journal of International Affairs, 71(5), 516-528. https://doi.org/10.1080/10357718.2017.1342762
    24. NSC Official Website. (2022, May 11). Keselamatan Siber: Bahaya ‘Espionage’. https://www.NSC.gov.my/web/ms/2022/05/11/keselamatan-siber-bahaya-espionage/
    25. Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young Internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245-255. https://doi.org/10.6007/ijarbss/v11-i19/11733
    26. Park, J., & Chung, E. (2021). Learning from past pandemic governance: Early response and Public-Private Partnerships in testing of COVID-19 in South Korea. World Development, 137, 105198. https://doi.org/10.1016/j.worlddev.2020.105198
    27. Rosli, F. A. (2020, May 26). Enam langkah 'lawan' jenayah siber. Berita Harian. https://www.bharian.com.my/berita/nasional/2020/05/692956/enam-langkah-lawan-jenayah-siber
    28. Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. https://doi.org/10.1080/10357718.2017.1320972
    29. Stevens, T., & O’Brien, K. (2019). Brexit and cyber security. The RUSI Journal, 164(3), 22-30. https://doi.org/10.1080/03071847.2019.1643256
    30. Suhaimi, F. (2020, November 4). RM1.8 bilion diperuntukkan, rangka Strategi Keselamatan Siber atasi jenayah siber. Astro Awani. https://www.astroawani.com/berita-malaysia/rm18-bilion-diperuntukkan-rangka-strategi-keselamatan-siber-atasi-jenayah-siber-saifuddin-266683
    31. Zahri, Y., Ab Hamid, R. S., & Mustaffa, A. (2017). Cyber security situational awareness among students: a case study in Malaysia. International Journal of Educational and Pedagogical Sciences, 11(7), 1704-1710. https://doi.org/10.5281/zenodo.1131053
    32. Zaini, A. H. (2020). Keberkesanan koordinasi agensi kerajaan dan isu pemerdagangan orang: Kajian empirik organisasi jenayah terancang dalam industri eksploitasi seksual [Master's thesis, National University of Malaysia].
    33. Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161. https://doi.org/10.1080/21624887.2015.1071165