Data breach on the critical information infrastructures: lessons from the Wikileaks

The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from...

Full description

Bibliographic Details
Main Authors: Abdul Ghani Azmi, Ida Madieha, Zulhuda, Sonny, Jarot, Sigit Puspito Wigati
Format: Proceeding Paper
Language:English
Published: IEEE 2012
Subjects:
Online Access:http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf
_version_ 1825646970763476992
author Abdul Ghani Azmi, Ida Madieha
Zulhuda, Sonny
Jarot, Sigit Puspito Wigati
author_facet Abdul Ghani Azmi, Ida Madieha
Zulhuda, Sonny
Jarot, Sigit Puspito Wigati
author_sort Abdul Ghani Azmi, Ida Madieha
collection IIUM
description The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) –national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture– can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies.
first_indexed 2024-03-05T23:10:38Z
format Proceeding Paper
id oai:generic.eprints.org:27231
institution International Islamic University Malaysia
language English
last_indexed 2024-03-05T23:10:38Z
publishDate 2012
publisher IEEE
record_format dspace
spelling oai:generic.eprints.org:272312023-03-27T06:29:30Z http://irep.iium.edu.my/27231/ Data breach on the critical information infrastructures: lessons from the Wikileaks Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati K Law (General) T58.5 Information technology T58.6 Management information systems The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) –national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture– can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies. IEEE 2012-07-23 Proceeding Paper PeerReviewed application/pdf en cc_by http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf Abdul Ghani Azmi, Ida Madieha and Zulhuda, Sonny and Jarot, Sigit Puspito Wigati (2012) Data breach on the critical information infrastructures: lessons from the Wikileaks. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec, 26-28 June 2012, IIUM. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6246173 10.1109/CyberSec.2012.6246173
spellingShingle K Law (General)
T58.5 Information technology
T58.6 Management information systems
Abdul Ghani Azmi, Ida Madieha
Zulhuda, Sonny
Jarot, Sigit Puspito Wigati
Data breach on the critical information infrastructures: lessons from the Wikileaks
title Data breach on the critical information infrastructures: lessons from the Wikileaks
title_full Data breach on the critical information infrastructures: lessons from the Wikileaks
title_fullStr Data breach on the critical information infrastructures: lessons from the Wikileaks
title_full_unstemmed Data breach on the critical information infrastructures: lessons from the Wikileaks
title_short Data breach on the critical information infrastructures: lessons from the Wikileaks
title_sort data breach on the critical information infrastructures lessons from the wikileaks
topic K Law (General)
T58.5 Information technology
T58.6 Management information systems
url http://irep.iium.edu.my/27231/1/Scopus_Copy.pdf
work_keys_str_mv AT abdulghaniazmiidamadieha databreachonthecriticalinformationinfrastructureslessonsfromthewikileaks
AT zulhudasonny databreachonthecriticalinformationinfrastructureslessonsfromthewikileaks
AT jarotsigitpuspitowigati databreachonthecriticalinformationinfrastructureslessonsfromthewikileaks