ANCAMAN KESELAMATAN INTERNET SEBAGAI ISU UTAMA NEGARA: ISU-ISU KONTEMPORARI, PENDEKATAN, DAN PENYELESAIAN

OEMAR HAMDAN, ABD MANAF ISMAIL

Abstract


Isu keselamatan siber merupakan isu utama masa kini yang mendapat per-hatian dari pelbagai pihak termasuklah pengguna individu, masyarakat, pihak Kera-jaan, organisasi perniagaan, dan sebagainya. Isu ini seakan tidak ada penyelesaian lantaran ancaman berterusan seperti serangan pengodam terhadap komputer masih berlaku, malah di sesetengah negara is agak membimbangkan. Untuk itu, kertas kerja ini membincangkan sorotan kajian berkaitan isu-isu kesela-matan siber termasuklah di Malaysia. Secara khususnya, kod profesional ICT akan dibincangkan untuk melihat sejauhmanakah ianya berkesan dalam mem-bendung permasalahan ini. Kertas kerja ini juga mengupas pendekatan berasas-kan ICT yakni sejauhmanakah pendekatan ini berupaya menangani permasa-lahan berkenaan. Akhir sekali, cadangan untuk mempertingkatkan kesedaran terhadap bahaya ancaman ini adalah penting agar para pengguna peka terhadap sebarang amaran mengenai ancaman siber.

Full Text:

PDF

References


Abdul Manaf Bohari, Salina Ismail & Ezanee Mohamed Alias (2003). Aplikasi komputer dalam pengurusan. Model Pendidikan Jarak Jauh. Sintok: PACE UUM.

Abdul Manaf Bohari (2006). isu-lsu Proksional 1CT di Malaysia. Kuala Lumpur : 11:IS Book Publication.

Abraham, R., Jas, F., & Russell, W. (1995). The web empowerment book, Cali-fornia: Telos Library.

Ause, W., & Arpajian,. S. (1996). How to use the WWW. California: Macmillan Comput-er Publishing

Asniza Musa (2005). Faisafah, akta dan polisi teknologi makiumat di malaysia pada masa kini serta implikasinya terhadap-sistem pendidikan negara. Retrieved May 25, 2005 fromhttp://www.asnizamusa. tripod.comige6543tugl.html

Ayre, Ft_ (2001). Internet filtering op-tion anolyNk An interim report Infappaplp Project_

Ayres Robert (1999). The essence of professional issues in computing. New Jer-sey: Prentice Hall.

Alexander, M. (1996). The Under-ground Guide To Computer Security: Slight-ly Askew Advice From A Winword Wizard. United States Of America: Addison-Wesley Publication Company.

Beuselinck, C. (1998). A look at in-terne/ filtering technologies. Odyssey '98 Conference. Canada.

Cashman, T. J., Shelly, G. B., $r. Ver-maat, M. E (2000). Discovering computers 2001: Concepts for a connected world, web and cnn enhanced New York: Course Tech-nology.

Duoper.J. Chrit Larry Hu ,,,,,,,,, Karait Siyan, William & Peter (1995). Implementing inlet-ma securi;y. New York: New Riders Pub-lishing.

Jabatan Perdana Menteri (JPM).

Malaysia (2000). Rancangan malaysia kelapan 2000-2005. Kuala Lumpur: Unit Perancangan Ekonomi, Jabatan Perdana Men-teri (JPM).

Mazrifirdaus (2006). Standard dan pen-gukuran polisi dalam pemhangunan kesela-matan maklumat organisasi. Dalam Abdul Manaf Bohari (2006). Isu-Isu Profesional ICT di Malaysia. Kuala Lumpur : IBS Book Publica-tion.

Iviohd Safar (2002). Mengenali undang-undang media dan siber. Kuala Lumpur: Utusan Publications.

Multimedia Development Corpora-tion (2005). Multimedia super corri-dor. Retrieved May 25, 2005 from http://www.mdc.com.my

Na` :a Abdul ':S nap 1,12001). ..Peogenalan keiwida undang-una'ang komersial di Malaysia. Suntingan Sakina ShallAhmad Yusoff. 1LBS: Kuala Lumpur.

Nurharyani (2006). Isu-isu keselamatan Siber di Malaysia Dalam Abdul Manaf Bohari (2006). Isu-Isu Profesional

ICT di Malaysia. Kuala Lumpur : IRS Rook Publication.

Turow, J., (1999). The Internet and the Family: The View from parents the view from the press. Annenberg Public

Policy Center of the University of Pennsylva-nia. Report No. 27.

Pfleeger, C. P. (1997). Security In Compu-ting: New Jersey: Prentice Hall.

Rogerson, S. (1998). The ethics of infor-mation and communication technologies (OCT) in

Fazli Azzali, Ali Yusni Daud, & Ezanee Mohamed Alias (2006). Pengukuhan teknologi kata laluan sebagai kaedah menghadapi se-rangan siber. Dalam _Abdul Manaf Bohari (2006), Isu-isu. Prolerional ICT di Malaysia. Kuala Lumpur : IBS Book Publication.

G., Iteyvaud, R., & Rounds, L. (2004). Professional development in ICT: A range of possibilities. (Online: http://www.aset.org.au/confs/2002).

Gleason (2004). Professional context of ICT. (Online: http://www.cse.dmu.ac.uk).

Hamelink (2000). ICT for Information Age. New Jersey: Prentice Hall.

Hazaruddin Harun & Hamirul'Aini Ham-bali (2006). Internet dan ancaman terhadap peradaban manusiawi. Dalam Abdul Maitar-Bohari (2006). Isu-Isu Prfilifsiunal ICT di MlaysiKuala Lumpur : IBS Book Publica-tion: Hogg,

D. L. (2002). Introduction to ICT. New Jersey: Prentice Hali.

Howard, G.S (1995). Introdution to in-ternet security: From basic to beyond. New York: Prima Publishing.

Hunter, C. D. (2000). Negotiating the global internet rating and filteringsystem: Opposing the rertelsmarin founda-tion's self-regulation of internet content pro-posal. Computers, Freedom, and Privacy 2000 Conference (Toronto). April 2000.

Hunter, C. D. (2000). Internet Filter Effec-tiveness: Testing Over and Underinclusive Blocking Decisions of Four Popular Filters. Social Science Computer Review, Vol. 18, No. 2, Summer 2000.

Jongwoo Han (2004). Contemporary issues in the information age. (Online: http://classes.maxwell.syr.edu/PSC300_103/ )

Johnston, D., Hand,. S., 2, Morgan, C (1998). Cyber law. Kuala Lumpur: Pei-and:LA Publications.

Malaysia (2003). Knilan sepriruh pe-nozal rrincanzan ma!aysia kPloban 1:100-7005. Koala Lumpur Unit Perancangan Ekonomi,

business. Journal Of International Management Information Systems, Volume 8 (2).

Siponen, M.T. (2001). Five Dimensions of Information Security Awareness. Computers and Society Magazine: Pg 14 19.

Siponen, M.T. (2000). A Conceptual Founda-tion for Organizational Information Security Aware-ness. Information Management and Computer Security. 8(1). Pg 31 41

Spading, P. (1995). Promoting Security Awareness and Commitment. Information: Man-agement and Computer Security. 3(2) Pg 20 -26

Taber, M. (1997). Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. United States of America: San-net.

Tavani, H. T. (2004). Ethics and technology: Ethical issues in an age of information and com-munication technology. New York: Wiley & Son.

Turban, E., McLean, E., & Wetherbe, J. (2001). Information technology for manage-ment: Making connection for strrgegic ,fivcsntogas; crd ed.). l'gew Vnrk: Jr.hn WilPy z cnns.

Thomson, M.F. & Von, S.R. (1997). An Effective Security Awareness Program for Industry. Proceeding of WG 11.2 and WG 11.1 of TCII (IFIP).

Thomson. M.F. & Von. S.R. (1998). Infor-mation Security Awareness: Education Our Users Effectively. Information Management and Computer Security. 6 (4). Pg 167 173.

Wooding, S., Anhal A. & Valeri L. 2003. Rising Citizen Awareness of Information Secu-rity: A Practical Guide. Berlin : E-aware Publish-er.


Refbacks

  • There are currently no refbacks.