Home > National Cyber Security Policy (NCSP)

THRUST 1: Effective Governance

  • Centralise coordination of national cyber security initiatives
  • Promote effective cooperation between public and private sectors
  • Establish formal and encourage informal information sharing exchanges

THRUST 2: Legislative & Regulatory Framework

  • Review and enhance Malaysia's cyberlaws to address the dynamic nature of cyber security threats
  • Establish progressive capacity building programmes for national law enforcement agencies
  • Ensure that all applicable local legislation is complementary to and in harmony with international laws, treaties and conventions

THRUST 3: Cyber Security Technology Framework

  • Develop a national cyber security technology framework that specifies cyber security requirement controls and baselines for CNII elements
  • Implement an evaluation/certification programme for cyber security products and systems

THRUST 4: Culture of Security and Capacity Building

  • Develop, foster and maintain a national culture of security
  • Standardise and coordinate cyber security awareness and education programmes across all elements of the CNII
  • Establish an effective mechanism for cyber security knowledge dissemination at the national level
    Identify minimum requirements and qualifications for information security professionals

THRUST 5: Research & Development Towards Self-Reliance

  • Formalise the coordination and prioritisation of cyber security research and development activities
  • Enlarge and strengthen the cyber security research community
  • Promote the development and commercialisation of intellectual properties, technologies and innovations through focused research and development
  • Nurture the growth of cyber security industry

THRUST 6: Compliance and Enforcement

  • Standardise cyber security systems across all elements of the CNII
  • Strengthen the monitoring and enforcement of standards
  • Develop a standard cyber security risk assessment framework

THRUST 7: Cyber Security Emergency Readiness

  • Strengthen the national computer emergency response teams (CERTs)
  • Develop effective cyber security incident reporting mechanisms
  • Encourage alt elements of the CNII to monitor cyber security events
  • Develop a standard business continuity management framework
  • Disseminate vulnerability advisories and threat warnings in a timely manner
  • Encourage all elements of the CNII to perform periodic vulnerability assessment programmes

THRUST 8: International Cooperation

  • Encourage active participation in all relevant international cyber security bodies, panels and multi-national agencies
  • Promote active participation in all relevant international cyber security events, conferences and forums
  • Enhance the strategic position of Malaysia in the field of cyber security by hosting an annual international cyber security conference


Contact Us | FAQ | Site Map | Disclaimer | Copyright © - CyberSecurity Malaysia