A case study of Advanced Persistent Threats on financial institutions in Malaysia /

Advanced Persistent Threats (APT) has targeted the financial institutions (FI) for intelligence gathering on sensitive customer information and monetize the attack. The possible attack could cause disastrous impact to the targeted FIs and the country's economy if there is a lack of preparation...

Full description

Saved in:
Bibliographic Details
Main Author: Zeti Suhana Binti Zainudin (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2017
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5611
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Advanced Persistent Threats (APT) has targeted the financial institutions (FI) for intelligence gathering on sensitive customer information and monetize the attack. The possible attack could cause disastrous impact to the targeted FIs and the country's economy if there is a lack of preparation to confront these challenges and attacks. The research was carried out to determine the factors that influence the APT awareness among FIs particularly their IT security practitioners and investigate the security strategies utilized to protect against APT. This would enable to the researcher to examine the readiness of FIs to defend themselves from APT attacks. Qualitative research approach and case study method were used to facilitate the research in addressing the research problem and achieve the research objectives. Interviews were conducted with the IT security practitioners in selected FIs. Additionally, feedback from CyberSecurity Malaysia (CSM), the agency responsible for the security of cyber space in Malaysia was sought to validate the findings. The factors that influence APT awareness include the emphasis on informal learning, the availability of financial regulatory guidelines / requirement and APT's presence locally. The awareness has led IT security practitioners to implement advanced security technologies and the integrated security concept to defend against APT attacks.
Physical Description:xii, 89 leaves : illustrations ; 30cm.
Bibliography:Includes bibliographical references (leaves 69-73).