Вы находитесь на странице: 1из 36

STAYING AHEAD OF EVOLVING CYBER THREATS IN THE BUSINESS SECTOR

Dr. Amirudin bin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia

7 September 2015

CopyrightCopyright ©© 20152015 CyberSecurityCyberSecurity MalaysiaMalaysia

SCOPE

SCOPE • INTRODUCTION • CYBER THREATS IN THE BUSINESS SECTOR • MALAYSIA ’ S INITIATIVES IN

INTRODUCTION

CYBER THREATS IN THE BUSINESS SECTOR

MALAYSIA S INITIATIVES IN ADDRESSING CYBER SECURITY THREATS

CONCLUSION AND WAY FORWARD

Copyright © 2015 CyberSecurity Malaysia

2

INTRODUCTION

INTRODUCTION § With the increase in sophistication and proliferation of the threat landscape, security challenges in

§ With the increase in sophistication and proliferation of the threat landscape, security challenges in the cyberspace have become more complex while security threats grow at an alarming rate .

§ The constantly evolving nature of cyber threats and vulnerabilities are posing a persistent challenge to the business sector with the threat of attack on the critical national information infrastructure .

§ The dynamic nature of the cyber risk environment requires continuous proactive and innovative cyber- protection capability.

requires continuous proactive and innovative cyber- protection capability. Copyright © 2015 CyberSecurity Malaysia 3
requires continuous proactive and innovative cyber- protection capability. Copyright © 2015 CyberSecurity Malaysia 3

Copyright © 2015 CyberSecurity Malaysia

requires continuous proactive and innovative cyber- protection capability. Copyright © 2015 CyberSecurity Malaysia 3

3

WORLD INTERNET USERS

WORLD INTERNET USERS Copyright © 2015 CyberSecurity Malaysia 4

Copyright © 2015 CyberSecurity Malaysia

4

THE GLOBAL RISKS 2015 – THREATS IN THE CYBERSPACE

THE GLOBAL RISKS 2015 – THREATS IN THE CYBERSPACE Copyright © 2015 CyberSecurity Malaysia 5

Copyright © 2015 CyberSecurity Malaysia

5

MALAYSIA’S TRANSFORMATION TOWARDS A DIGITAL ECONOMY

MALAYSIA’S TRANSFORMATION TOWARDS A DIGITAL ECONOMY Cyber Security Support Malaysia ’ s Transformation Programme

Cyber Security Support Malaysia s Transformation Programme That Drive Wealth Creation And Enhance The Standard Of Living To Move Malaysia To A Developed Digital Economy By 2020.

VISION 2020
VISION 2020

Copyright © 2015 CyberSecurity Malaysia

6

Cyber Security & Preservation and Enhancement of Unity in Diversity Effective Delivery of Government services
Cyber
Security &
Preservation and
Enhancement of
Unity in Diversity
Effective Delivery of
Government services
Economic
New Economic
Model: A high
Income, inclusive and
sustainable nation
Anchoring Growth
on People
Innovation
are mutually
11 th Malaysia Plan
1Malaysia
Government
Transformation
Programme (GTP)
reinforcing
Economic
Transformation
Programme (ETP)
“ The people economy will be
given priority”
People First,
Performance Now
“ 6 National Key Result
“A High Income, Inclusive
and Sustainable Nation”
“ Towards Digital
Areas (NKRAs)”
Economy ”

CYBER THREATS IN THE BUSINESS SECTOR – Threat Of Cyber Attack On The Critical Information Infrastructure

SECTOR – Threat Of Cyber Attack On The Critical Information Infrastructure Copyright © 2015 CyberSecurity Malaysia
SECTOR – Threat Of Cyber Attack On The Critical Information Infrastructure Copyright © 2015 CyberSecurity Malaysia
SECTOR – Threat Of Cyber Attack On The Critical Information Infrastructure Copyright © 2015 CyberSecurity Malaysia

Copyright © 2015 CyberSecurity Malaysia

7

COST OF CYBER CRIMES

“Cyber crime costs the global economy about $445 billion every year, with the damage to
“Cyber crime costs the global economy about $445 billion every year, with the damage
to business from the theft of intellectual property exceeding the $160 billion loss to
individuals from hacking………”
- The Center for Strategic and International Studies, U.S.A 2014
Center for Strategic and International Studies, U.S.A 2014 “The growing menace of cybercrime is impacting the
“The growing menace of cybercrime is impacting the global economy significantly with estimated annual losses
“The growing menace of cybercrime is impacting the global economy significantly
with estimated annual losses of up to USD 575
billion.
.”
- McAfee 2014

Copyright © 2015 CyberSecurity Malaysia

8

CHANGES IN CYBER CRIME MEGATRENDS

CHANGES IN CYBER CRIME MEGATRENDS Note: A negative percentage indicates that the security risk rating is
CHANGES IN CYBER CRIME MEGATRENDS Note: A negative percentage indicates that the security risk rating is

Note: A negative percentage indicates that the security risk rating is expected to increase. A positive percentage indicates that risk is forecasted to decline.

Source: 2015 Global Megatrends in Cybersecurity, Ponemon Institute, February 2015

Copyright © 2015 CyberSecurity Malaysia

9

COST OF CYBERCRIME TO INDUSTRIES

COST OF CYBERCRIME TO INDUSTRIES Average annualized cost by industry sector: Cost expressed in US dollars

Average annualized cost by industry sector: Cost expressed in US dollars (million) Source: 2014 Global Report on the Cost of Cyber Crime

Copyright © 2015 CyberSecurity Malaysia

10

CYBER THREATS IN THE BUSINESS SECTOR – Financial Industry

CYBER THREATS IN THE BUSINESS SECTOR – Financial Industry Copyright © 2015 CyberSecurity Malaysia 1 1
CYBER THREATS IN THE BUSINESS SECTOR – Financial Industry Copyright © 2015 CyberSecurity Malaysia 1 1
CYBER THREATS IN THE BUSINESS SECTOR – Financial Industry Copyright © 2015 CyberSecurity Malaysia 1 1

Copyright © 2015 CyberSecurity Malaysia

11

CYBER THREATS IN THE BUSINESS SECTOR – Health Care Industry

CYBER THREATS IN THE BUSINESS SECTOR – Health Care Industry Copyright © 2015 CyberSecurity Malaysia 1
CYBER THREATS IN THE BUSINESS SECTOR – Health Care Industry Copyright © 2015 CyberSecurity Malaysia 1
CYBER THREATS IN THE BUSINESS SECTOR – Health Care Industry Copyright © 2015 CyberSecurity Malaysia 1

Copyright © 2015 CyberSecurity Malaysia

12

CYBER THREATS IN THE BUSINESS SECTOR – Maritime Industry

CYBER THREATS IN THE BUSINESS SECTOR – Maritime Industry Copyright © 2015 CyberSecurity Malaysia 1 3
CYBER THREATS IN THE BUSINESS SECTOR – Maritime Industry Copyright © 2015 CyberSecurity Malaysia 1 3
CYBER THREATS IN THE BUSINESS SECTOR – Maritime Industry Copyright © 2015 CyberSecurity Malaysia 1 3

Copyright © 2015 CyberSecurity Malaysia

13

CYBER THREATS IN THE BUSINESS SECTOR – Aviation Industry

CYBER THREATS IN THE BUSINESS SECTOR – Aviation Industry Copyright © 2015 CyberSecurity Malaysia 1 4
CYBER THREATS IN THE BUSINESS SECTOR – Aviation Industry Copyright © 2015 CyberSecurity Malaysia 1 4
CYBER THREATS IN THE BUSINESS SECTOR – Aviation Industry Copyright © 2015 CyberSecurity Malaysia 1 4

Copyright © 2015 CyberSecurity Malaysia

14

CYBER THREATS IN THE BUSINESS SECTOR – Energy Industry

CYBER THREATS IN THE BUSINESS SECTOR – Energy Industry July 9, 2015 Copyright © 2015 CyberSecurity
CYBER THREATS IN THE BUSINESS SECTOR – Energy Industry July 9, 2015 Copyright © 2015 CyberSecurity
July 9, 2015
July 9, 2015

Copyright © 2015 CyberSecurity Malaysia

15

CYBER THREATS IN THE BUSINESS SECTOR – Insiders’ Threat

CYBER THREATS IN THE BUSINESS SECTOR – Insiders’ Threat Copyright © 2015 CyberSecurity Malaysia 1 6

Copyright © 2015 CyberSecurity Malaysia

16

TARGETED MALWARE ON INDUSTRY

TARGETED MALWARE ON INDUSTRY Southeast Asia ’ s financial sector faces a dual threat . First,

Southeast Asia s financial sector faces a dual threat . First, standard cybercriminals are looking to steal money from them. Second, advanced threat actors are seeking sensitive financial information for a business advantage .

Source: Special Report - Southeast Asia: An Evolving Cyber Threat Landscape FireEye Threat Intelligence, March 2015

An Evolving Cyber Threat Landscape FireEye Threat Intelligence, March 2015 Copyright © 2015 CyberSecurity Malaysia 1

Copyright © 2015 CyberSecurity Malaysia

17

FINANCIAL MALWARE ATTACKS - MALAYSIA

FINANCIAL MALWARE ATTACKS - MALAYSIA Geographical distribution of attacks with financial malware targeting users of
FINANCIAL MALWARE ATTACKS - MALAYSIA Geographical distribution of attacks with financial malware targeting users of
FINANCIAL MALWARE ATTACKS - MALAYSIA Geographical distribution of attacks with financial malware targeting users of

Geographical distribution of attacks with financial malware targeting users of Android-based devices in 2014

malware targeting users of Android-based devices in 2014 Source: Kaspersky Lab ’ s “ Financial Cyber

Source: Kaspersky Lab s Financial Cyber -threats in 2013Report

Copyright © 2015 CyberSecurity Malaysia

18

MOBILE MALWARE ATTACKS - MALAYSIA

MOBILE MALWARE ATTACKS - MALAYSIA The Geography Of Mobile Malware Infection Attempts In Q2 2015 (Percentage
MOBILE MALWARE ATTACKS - MALAYSIA The Geography Of Mobile Malware Infection Attempts In Q2 2015 (Percentage

The Geography Of Mobile Malware Infection Attempts In Q2 2015 (Percentage Of All Users Attacked)

Source: IT Threat Evolution in Q2 2015, Kapersky Lab, July 2015

Copyright © 2015 CyberSecurity Malaysia

19

CYBERCRIME LEADS TO INCREASE IN THE COST OF BUSINESSES

CYBERCRIME LEADS TO INCREASE IN THE COST OF BUSINESSES Copyright © 2015 CyberSecurity Malaysia 2 0
CYBERCRIME LEADS TO INCREASE IN THE COST OF BUSINESSES Copyright © 2015 CyberSecurity Malaysia 2 0
CYBERCRIME LEADS TO INCREASE IN THE COST OF BUSINESSES Copyright © 2015 CyberSecurity Malaysia 2 0

Copyright © 2015 CyberSecurity Malaysia

20

CYBER SECURITY INCIDENTS IN MALAYSIA

Cyber Incidents Referred to CyberSecurity Malaysia from 1997 – July 2015
Cyber Incidents Referred to CyberSecurity
Malaysia from 1997 – July 2015

Number of cyber security incidents referred to CyberSecurity Malaysia (excluding spams)

Copyright © 2015 CyberSecurity Malaysia

21

A HOLISTIC APPROACH People, Process, Technology & Policy

A HOLISTIC APPROACH People, Process, Technology & Policy – Copyright © 2015 CyberSecurity Malaysia 2 2
A HOLISTIC APPROACH People, Process, Technology & Policy – Copyright © 2015 CyberSecurity Malaysia 2 2
A HOLISTIC APPROACH People, Process, Technology & Policy – Copyright © 2015 CyberSecurity Malaysia 2 2

Copyright © 2015 CyberSecurity Malaysia

22

2005

MALAYSIA’S INITIATIVES - National Cyber Security Policy NCSP Objectives 2007
MALAYSIA’S INITIATIVES
- National Cyber Security Policy
NCSP Objectives
2007
CyberSecurity Malaysia launched by Prime Minister of Malaysia on 20 August 2007
CyberSecurity Malaysia
launched by
Prime Minister of Malaysia
on 20 August 2007
launched by Prime Minister of Malaysia on 20 August 2007 NCSP Adoption and Implementation 2006 National
NCSP Adoption and Implementation 2006
NCSP
Adoption
and
Implementation
2006

National Cyber Security Policy formulated by MOSTI

Malaysia’s Ministry of Science, Technology & Innovation (MOSTI) carried out the

study on the National Cyber Security Policy

(NCSP) in 2005

Address The Risks To The Critical National Information Infrastructure

Ensure That Critical Infrastructure Are Protected To A Level That Is Commensurate With The Risks

National IT Council (NITC) Meeting on 7 Apr 2006 agreed to implement NCSP and establishment of the Malaysia Cyber Security Centre to administer NCSP.

NCSP was endorsed by the Cabinet in May 2006.

CyberSecurity Malaysia launched by Prime Minister of Malaysia on 20 Aug 2007

The policy recognises the critical and highly interdependent nature of the CNII and aims to develop and establish a comprehensive programme and a series of frameworks that will ensure the effectiveness of cyber security controls over vital assets

Copyright © 2015 CyberSecurity Malaysia

Develop And Establish A Comprehensive Programme And A Series Of Frameworks

23

CYBERSECURITY MALAYSIA S MANDATE

CYBERSECURITY MALAYSIA ’ S MANDATE The Cabinet Meeting on 28 September 2005, through the Joint Cabinet

The Cabinet Meeting on 28 September 2005, through the Joint Cabinet Notes between Ministry of Finance (MOF) and Ministry of Science, Technology and Innovation (MOSTI) No. H609/2005 agreed to create the

National ICT Security and Emergency Response Centre (NISER), currently known as CyberSecurity Malaysia as a National Body to monitor the National e-Security aspect

separated from MIMOS as an agency and established as a Company Limited-by-Guarantee under the supervision of MOSTI

Company Limited-by-Guarantee under the supervision of MOSTI The Ministerial Functions Act 1969 and The Order of

The Ministerial Functions Act 1969 and The Order of Federal Government Ministers 2013

Provide specialised services in cyber security and continuously identify areas that may be detrimental to public and national security

that may be detrimental to public and national security Order No . 24 - Policy and

Order No . 24 - Policy and Mechanism for National Cyber Crisis Management by the National Security Council, Malaysia :

As a specialist agency, CyberSecurity Malaysia is required to support as well as provide technical assistance and training services for national cyber crisis management .

Copyright © 2015 CyberSecurity Malaysia

24

NATIONAL CYBER SECURITY POLICY

NATIONAL CYBER SECURITY POLICY Thrust 1: Effective Governance Thrust 2: Legislative & Regulatory Framework Thrust
Thrust 1: Effective Governance
Thrust 1:
Effective
Governance
Thrust 2: Legislative & Regulatory Framework
Thrust 2:
Legislative &
Regulatory
Framework
Thrust 3: Cyber Security Technology Framework
Thrust 3:
Cyber Security
Technology
Framework
Thrust 4: Culture of Security & Capacity Building
Thrust 4:
Culture of Security
& Capacity Building
Thrust 4: Culture of Security & Capacity Building “ Malaysia ’ s CNII shall be secure,

Malaysias CNII shall be secure, resilient and self -reliant. Infused with a culture of security it will promote stability, social well being and wealth creation

promote stability, social well being and wealth creation ” Government Service Emergency Services Energy
Government Service
Government
Service
Emergency Services
Emergency
Services

Energy Government Service Emergency Services Water Health Services Defense & Security Banking & Finance Food &

Water Government Service Emergency Services Energy Health Services Defense & Security Banking & Finance Food &

Health Services
Health
Services
Defense & Security
Defense &
Security
Banking & Finance
Banking &
Finance
Food & Agriculture
Food &
Agriculture
Transportation
Transportation
Information & Communication
Information &
Communication

Critical National Information Infrastructure (CNII)

Copyright © 2015 CyberSecurity Malaysia

Thrust 5: R&D Towards Self Reliance
Thrust 5:
R&D Towards Self
Reliance
Thrust 6: Compliance & Enforcement
Thrust 6:
Compliance &
Enforcement
Thrust 7: Cyber Security Emergency Readiness
Thrust 7:
Cyber Security
Emergency
Readiness
Thrust 8: International Cooperation 25
Thrust 8:
International
Cooperation
25

MALAYSIA’S CYBER SECURITY SERVICES

MALAYSIA’S CYBER SECURITY SERVICES 26 Copyright © 2015 CyberSecurity Malaysia 26
MALAYSIA’S CYBER SECURITY SERVICES 26 Copyright © 2015 CyberSecurity Malaysia 26

26

MALAYSIA’S CYBER SECURITY SERVICES 26 Copyright © 2015 CyberSecurity Malaysia 26

Copyright © 2015 CyberSecurity Malaysia

26

CYBERSECURITY MALAYSIA - Coordinated Malware Eradication & Remediation Project (CMERP) Framework

• Reporting systems (infections), honeynet (malware forensics – static and dynamic analyses) & Microsoft •
• Reporting systems (infections), honeynet (malware forensics –
static and dynamic analyses) & Microsoft
• Vendors ( FireEye – IoC , threat level etc ) & CERTs (info sharing) –
Which malware is prevalent ?
• C&C, botnets, APT
• Malware configuration (type)
• Physical takedown (local & foreign), sinkhole, blacklist
• Patches and bug fixes
• End user, organisation (CNII or corporation), ISP ( Jaring )
• Governance/Management, legal, budget, time
• Campaign , awareness, training, national/international
• Detection and removal tool development for automation
• Technical write up, advisory and signature
• Observation/monitoring, reinfections, challenges
• Feedbacks and continuous campaign/awareness
• Total eradication if not back to Step 1
1) Forensic Analysis 2) Threat Coverage 3) Preventive Measure 4) Target Audience 5) Forensic Response
1) Forensic
Analysis
2) Threat
Coverage
3) Preventive
Measure
4) Target
Audience
5) Forensic
Response
6) Total
Eradication

Copyright © 2015 CyberSecurity Malaysia

27

BEST PRACTICES FOR CYBER SECURITY PREPAREDNESS

BEST PRACTICES FOR CYBER SECURITY PREPAREDNESS Preventive Risk Assessment Implementation of Information Security
Preventive Risk Assessment Implementation of Information Security Controls Adherence to Policies and Procedures
Preventive
Risk Assessment
Implementation of
Information Security
Controls
Adherence to Policies and
Procedures
Employee Competency &
Information Security
Awareness Programme
Business Continuity
Management

ACTIONS

Detective Vulnerability Assessment & Penetration Testing ICT Product & System Evaluation Incident Response
Detective
Vulnerability Assessment &
Penetration Testing
ICT Product & System
Evaluation
Incident Response Team
Data Breach Protection Tool
Corrective Management Review Regular Monitoring Periodical Internal Audit
Corrective
Management Review
Regular Monitoring
Periodical Internal Audit
Top Management Involvement
Top Management Involvement

Copyright © 2015 CyberSecurity Malaysia

28

STRENGTHENING INFORMATION SECURITY

STRENGTHENING INFORMATION SECURITY MS ISO/IEC 27001:2007 Comprehensive Scope • Internal and external issues that are
STRENGTHENING INFORMATION SECURITY MS ISO/IEC 27001:2007 Comprehensive Scope • Internal and external issues that are
STRENGTHENING INFORMATION SECURITY MS ISO/IEC 27001:2007 Comprehensive Scope • Internal and external issues that are

MS ISO/IEC 27001:2007

STRENGTHENING INFORMATION SECURITY MS ISO/IEC 27001:2007 Comprehensive Scope • Internal and external issues that are

Comprehensive Scope

Internal and external issues that are relevant to organisational purpose;

Interested parties and their requirements that are relevant to the ISMS;

interfaces and dependencies of both internal and external activities

Copyright © 2015 CyberSecurity Malaysia

29

ADOPTION OF THE COMMON CRITERIA STANDARD

ADOPTION OF THE COMMON CRITERIA STANDARD Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme
Malaysian Common Criteria
Evaluation & Certification (MyCC)
Scheme

CERTIFICATE AUTHORISING PARTICIPANTS

MISSION to increase Malaysias competitiveness in quality assurance of information security based on the Common Criteria (CC) standard and to build consumersconfidence towards Malaysian information security products

towards Malaysian information security products ” Participants that have a national interest in recognising CC
towards Malaysian information security products ” Participants that have a national interest in recognising CC

Participants that have a national interest in recognising

CC certificates produced by the Certificate Authorising

MALAYSIA QUALIFIES

Participants based on ISO/IEC 15408

TO BE AUTHORIZING PARTICIPANT BY SEPTEMBER 2011

• Participants that represent a compliant Certification Body

• Mutually recognises certified products/systems produced by the Certificate Authorising Participants based on ISO/IEC 15408 AS OF SEPT. 2011

CERTIFICATE CONSUMING PARTICIPANTS

based on ISO/IEC 15408 AS OF SEPT. 2011 CERTIFICATE CONSUMING PARTICIPANTS Copyright © 2015 CyberSecurity Malaysia

Copyright © 2015 CyberSecurity Malaysia

30

ICT PRODUCTS AND SYSTEMS EVALUATION

ICT PRODUCTS AND SYSTEMS EVALUATION Malaysian Common Criteria Evaluation and Certification (MyCC) Scheme provides a

Malaysian Common Criteria Evaluation and Certification (MyCC) Scheme provides a systematic process for evaluating and certifying the security functionality of ICT products & systems against defined criteria or requirements of ISO/IEC 15408 Common Criteria standard

defined criteria or requirements of ISO/IEC 15408 Common Criteria standard Copyright © 2015 CyberSecurity Malaysia 31

Copyright © 2015 CyberSecurity Malaysia

31

ENHANCEMENT OF COMPETENCY AND CAPACITY BUILDING

Provides competency and professional Training programmes Develops curriculum in cyber security for colleges,
Provides competency
and professional
Training programmes
Develops curriculum in cyber
security for colleges, polytechnics
and universities to build expertise
in cyber security with MOE
Collaboration between
CyberSecurity Malaysia and
Institute of Higher Learning (IHL)
in various comprehensive cyber
security modules
of Higher Learning (IHL) in various comprehensive cyber security modules Copyright © 2015 CyberSecurity Malaysia 32

Copyright © 2015 CyberSecurity Malaysia

32

AWARENESS PROGRAMMES – ADDRESSING THE PEOPLE

AWARENESS PROGRAMMES – ADDRESSING THE PEOPLE Content Partners International CERT Communities Other

Content

Partners

Content Partners International CERT Communities Other industry partners
Content Partners International CERT Communities Other industry partners
Content Partners International CERT Communities Other industry partners
Content Partners International CERT Communities Other industry partners

International

CERT

Communities

Other

industry

partners

Content Localization & Packaging Content Channels Publication Video clips Web Poster Competition TV ad
Content Localization &
Packaging
Content
Channels
Publication
Video clips
Web
Poster
Competition
TV ad
Target Audience Children / students Parents / home users Organisations 33 33
Target
Audience
Children / students
Parents / home users
Organisations
33
33
Children / students Parents / home users Organisations 33 33 www.cybersafe.my Copyright © 2015 CyberSecurity Malaysia

www.cybersafe.my

Copyright © 2015 CyberSecurity Malaysia

MITIGATING CYBER ATTACKS REQUIRES DOMESTIC & INTERNATIONAL COLLABORATION

ATTACKS REQUIRES DOMESTIC & INTERNATIONAL COLLABORATION Strengthening Domestic Security Cooperation at the Regional

Strengthening Domestic Security

INTERNATIONAL COLLABORATION Strengthening Domestic Security Cooperation at the Regional & Global Level Copyright ©
INTERNATIONAL COLLABORATION Strengthening Domestic Security Cooperation at the Regional & Global Level Copyright ©
INTERNATIONAL COLLABORATION Strengthening Domestic Security Cooperation at the Regional & Global Level Copyright ©

Cooperation at the Regional & Global Level

Domestic Security Cooperation at the Regional & Global Level Copyright © 2015 CyberSecurity Malaysia 3 4

Copyright © 2015 CyberSecurity Malaysia

34

CONCLUSION AND WAY FORWARD

CONCLUSION AND WAY FORWARD • Need to foster greater collaborative engagement among public and private-sector

Need to foster greater collaborative engagement among public and private-sector partners to enhance the security and resilience of the critical national information infrastructure ;

Adopt a coherent cyber security approach by taking responsive and proactive measures in staying ahead of evolving cyber threats;

Strengthen strategic alliance and enhance international cooperation in addressing emerging cross-border cyber threats.

Copyright © 2015 CyberSecurity Malaysia

35

CopyrightCopyright ©© 20152015 CyberSecurityCyberSecurity MalaysiaMalaysia

36