๐๐๐ซ๐ญ 3 ๐๐๐ฅ๐๐ฒ๐ฌ๐ข๐ ๐๐ฒ๐๐๐ซ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ญ๐ซ๐๐ญ๐๐ ๐ฒ 2020-2024
๐ ๐๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐๐
โ In Malaysia, Internet-related fraud has been the most common cyber threat. Data from the Royal Malaysian Police's cybercrime reports for 2018 and 2019 indicate that telecommunication fraud, e-commerce scams, the 419 scam (Nigerian Scam), and e-financial fraud are the primary types of cyber threats prevalent in the country.
โ The main factor contributing to most fraud cases is a lack of awareness. In phishing incidents, people can easily fall victim to fraudulent sites and services because of their negligence and failure to identify the scams.
โ The healthcare sector faces new and concerning cyber threat issues beyond attacks on electronic medical records. Medical robotic technology and robot-assisted surgical procedures are now interconnected with computer systems and networks, making them vulnerable to cyber threats. With patient records digitized, there is an increased risk of breaches and disclosure of confidential information.
โ The aim is to raise awareness and provide education to individuals, enabling them to avoid making errors in judgment while conducting activities on the Internet. By promoting cyber security awareness, citizens can better protect themselves from potential cyber threats and enhance their online safety.
โ There were also incidents where these insiders, either employees or vendors, unknowingly became victims of elaborate cybercrime schemes such as through watering hole attacks, social engineering ploys, malware and ransomware infections, propagation mechanism by inserting infected USB devices into the internal networks or arbitrarily clicking on links found in emails or while browsing the Internet.
โ The correct posture and approach are needed in dealing with the selection of third parties/vendors, planning, development and implementation of ICT projects, especially those that involve or intended for critical establishments such as an Industrial Control System (ICS) for CNII agency.
โ Society is becoming increasingly concerned about the misuse of user personal data, leading to heightened vigilance regarding the sharing of personal information. The Personal Data Protection Act 2010 has significantly clarified what actions by data-collecting entities could be seen as encroaching on user privacy.
Overall, the primary issues and challenges in Malaysia's cyber security landscape are ๐ฅ๐๐ซ๐ ๐๐ฅ๐ฒ ๐๐ญ๐ญ๐ซ๐ข๐๐ฎ๐ญ๐๐ ๐ญ๐จ ๐ญ๐ก๐ ๐ฅ๐๐๐ค ๐จ๐ ๐๐ฐ๐๐ซ๐๐ง๐๐ฌ๐ฌ ๐๐ง๐ ๐๐๐ฎ๐๐๐ญ๐ข๐จ๐ง. While technological solutions and controls play a role, it is essential for netizens to have a basic understanding of cyber security essentials and related laws and regulations.ย