Cyber Security Crisis/Threat: Analysis of Malaysia National Security Council (NSC) Involvement Through the Perceptions of Government, Private and People Based on the 3P Model

Authors

  • Siti Sabrina Imji Rahim Centre For History, Politics, and International Affairs, Faculty of Social Sciences & Humanities, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia
  • Mohd Ikbal Mohd Huda Centre For History, Politics, and International Affairs, Faculty of Social Sciences & Humanities, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia
  • Shahrizal Sa’ad Centre For History, Politics, and International Affairs, Faculty of Social Sciences & Humanities, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia
  • Ravichandran Moorthy Centre For History, Politics, and International Affairs, Faculty of Social Sciences & Humanities, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia

DOI:

https://doi.org/10.17576/ebangi.2024.2102.17

Abstract

The new crisis/threat namely cyber security has become a priority for Malaysia due to the huge impact not only on this country, but also the people. Malaysia shows a trend of increasing cyber security despite various initiatives taken by the government to deal with it. The government has established the National Cyber Security Agency (NACSA) under the auspices of the National Security Council (NSC) where NACSA acts to coordinate all forms of cyber management with other agencies that handle cyber in Malaysia. The question arises is why cyber security continues to increase which is necessary to analyze to what extent NSC as a coordinating agency for managing cyber security successfully plays its role. The study carried out by analyzing the perception of the government, the private sector, and the people on the effectiveness of NSC 's involvement based on the 3P Model via qualitative methods that refer to primary and secondary documents such as official reports, academic journals, and online news as well as through interviews with government officials involved. The results of the analysis found that NSC's involvement is proactive in dealing with cyber security. NSC's coordination with other agencies is active, but there are challenges that need to be addressed. Coordination between the central and state NSC is effective. Political interference has influenced the determined decision but minimal. Cyber security management has led NACSA/NSC to updating/drafting the laws, increased program/strategy, more prominent, and collaborative involvement of all parties.Keywords: Cyber Security crisis/threat; NACSA; NSC; perception; 3P ModelReferencesBahaudin, N. H, & Haqimi, M. A. (2022, March 30). Ancaman keselamatan siber semakin serius. My Metro. https://www.hmetro.com.my/mutakhir/2022/03/826613/ancaman-keselamatan-siber-semakin-seriusBansal, M. (2018). An Overview of Cyber Security in Malaysia. Journal of Emerging Technologies and Innovative Research (JETIR), 5(8). https://www.jetir.org/papers/JETIRFF06020.pdfBernama. (2022, August 5). 11,367 kes jenayah siber dari Januari hingga Julai tahun ini. https://www.astroawani.com/berita-malaysia/11367-kes-jenayah-siber-dari-januari-hingga-julai-tahun-ini-polis-374682Bernama. (2022, June 7). Malaysia catat 57.8 juta serangan virus siber pada suku pertama. https://www.astroawani.com/berita-malaysia/malaysia-catat-578-juta-serangan-virus-siber-pada-suku-pertama-fortinet-365120BH Online. (2021, June 28). Keselamatan siber lengkapi usaha memacu pertumbuhan ekonomi. https://www.bharian.com.my/berita/nasional/2021/06/832966/keselamatan-siber-lengkapi-usaha-memacu-pertumbuhan-ekonomi-muhyiddinBH Online. (2021, May 23). Malaysia siap siaga hadapi ancaman siber. https://www.bharian.com.my/berita/nasional/2021/05/819815/malaysia-siap-siaga-hadapi-ancaman-siberBurton, J. (2013). Small states and cyber security: The case of New Zealand. Political Science, 65(2), 216-238. https://doi.org/10.1177/0032318713508491Dioubate, B. M., Daud, W., & Norhayate, W. (2022). Cyber security risk management frameworks implementation in Malaysian Higher Education Institutions. International Journal of Academic Research in Business and Social Sciences, 12(4), 1356–1371. DOI: 10.6007/IJARBSS/v12-i4/12300E. Ite, U. (2004). Multinationals and corporate social responsibility in developing countries: a case study of Nigeria. Corporate Social Responsibility and Environmental Management, 11(1), 1-11. https://doi.org/10.1002/csr.49Fuad, N. S. M., Daud, M., & Yusof, A. R. M. (2022). Memahami Jenayah Siber Dan Keselamatan Siber Di Malaysia: Suatu Pemerhatian Terhadap Pandangan Sarjana Dan Intelektual: Understanding Cybercrime and Cybersecurity in Malaysia: An Observation from The Perspective of Scholars and Intellectuals. Asian Journal of Environment, History and Heritage, 6(1), 11-26. https://spaj.ukm.my/ajehh/index.php/ajehh/article/view/184Ganesin, A., Supayah, L., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of the Arabian Journal of Business and Management Review, 6(4), 12-20. https://platform.almanhal.com/Files/Articles/101388Hamzah, A. (2004). Kaedah Kualitatif Dalam Penyelidikan Sosiobudaya: Qualitative Methods in Sociocultural Research. Jurnal Pengajian Media Malaysia, 6(1), 1-10. https://sare.um.edu.my/index.php/JPMM/article/view/32755Hasnan, H. A. (2019, April 3). Ancaman siber: NACSA bakal keluarkan Strategi Keselamatan Siber Negara. Astro Awani. https://www.astroawani.com/berita-malaysia/ancaman-siber-nacsa-bakal-keluarkan-strategi-keselamatan-siber-negara-203081Ismail, I. S. (2022, September 22). MKN kesan peningkatan ancaman serangan siber. BH Online. https://www.bharian.com.my/berita/nasional/2022/09/1003536/mkn-kesan-peningkatan-ancaman-serangan-siberJasmi, K. A. (2012). Metodologi pengumpulan data dalam penyelidikan kualitatitif. Kursus Penyelidikan Kualitatif Siri, 1(2012), 28-29. https://www.researchgate.net/profile/Kamarul-Azmi-Jasmi/publication/293097563_Metodologi_Pengumpulan_Data_dalam_Penyelidikan_Kualitatitif/links/5c0234e0a6fdcc1b8d4d2e10/Metodologi-Pengumpulan-Data-dalam-Penyelidikan-Kualitatitif.pdfKrishnan, D. Bala. (2021, January 26). Brace for possible cyber-attack, govt agencies told. New Straits Time. https://www.nst.com.my/news/nation/2021/01/660733/brace-possible-cyber-attack-govt-agencies-toldLai, R., & Rahman, S. S. (2012). Analytic of China Cyberattack. The International Journal of Multimedia & Its Applications (IJMA), 4(3), 37-56. https://doi.org/10.5121/ijma.2012.4304Lehto, M., & Limnell, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal: A Global Perspective, 30(3), 139-148. https://doi.org/10.1080/19393555.2020.1813851Liff, A. P. (2018). Japan’s national security council: policy coordination and political power. Japanese Studies, 38(2), 253-279. https://doi.org/10.1080/10371397.2018.1503926Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265-284. https://doi.org/10.1080/23738871.2020.1778759Mat, B., Pero, S. D. M., Wahid, R., & Shuib, M. S. (2020). Cyber Security Threats to Malaysia: A Small State Security Discourse. Sustaining Global Strategic Partnership in the Age of Uncertainties, 5(6), 31.https://www.researchgate.net/publication/349881373_Cyber_Security_Threats_to_Malaysia_A_Small_State_Security_DiscourseMatsubara, M. (2014). Countering cyber-espionage and sabotage: the next steps for Japanese–UK cyber-security co-operation. The RUSI Journal, 159(1), 86-93. https://doi.org/10.1080/03071847.2014.895263Medcalf, R. (2017). Imagining an Indian National Security Strategy: the sum of its parts. Australian Journal of International Affairs, 71(5), 516-528. https://doi.org/10.1080/10357718.2017.1342762NSC Official Website. (2022, May 11). Keselamatan Siber: Bahaya ‘Espionage’. https://www.NSC.gov.my/web/ms/2022/05/11/keselamatan-siber-bahaya-espionage/Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young Internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245-255. https://doi.org/10.6007/ijarbss/v11-i19/11733Park, J., & Chung, E. (2021). Learning from past pandemic governance: Early response and Public-Private Partnerships in testing of COVID-19 in South Korea. World Development, 137, 105198. https://doi.org/10.1016/j.worlddev.2020.105198Rosli, F. A. (2020, May 26). Enam langkah 'lawan' jenayah siber. Berita Harian. https://www.bharian.com.my/berita/nasional/2020/05/692956/enam-langkah-lawan-jenayah-siberSmith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. https://doi.org/10.1080/10357718.2017.1320972Stevens, T., & O’Brien, K. (2019). Brexit and cyber security. The RUSI Journal, 164(3), 22-30. https://doi.org/10.1080/03071847.2019.1643256Suhaimi, F. (2020, November 4). RM1.8 bilion diperuntukkan, rangka Strategi Keselamatan Siber atasi jenayah siber. Astro Awani. https://www.astroawani.com/berita-malaysia/rm18-bilion-diperuntukkan-rangka-strategi-keselamatan-siber-atasi-jenayah-siber-saifuddin-266683Zahri, Y., Ab Hamid, R. S., & Mustaffa, A. (2017). Cyber security situational awareness among students: a case study in Malaysia. International Journal of Educational and Pedagogical Sciences, 11(7), 1704-1710. https://doi.org/10.5281/zenodo.1131053Zaini, A. H. (2020). Keberkesanan koordinasi agensi kerajaan dan isu pemerdagangan orang: Kajian empirik organisasi jenayah terancang dalam industri eksploitasi seksual [Master's thesis, National University of Malaysia].Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161. https://doi.org/10.1080/21624887.2015.1071165

Downloads

Published

2024-05-31

Issue

Section

Article