CFP last date
20 December 2024
Reseach Article

Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia

by Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 37
Year of Publication: 2018
Authors: Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf
10.5120/ijca2018916154

Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf . Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia. International Journal of Computer Applications. 180, 37 ( Apr 2018), 15-19. DOI=10.5120/ijca2018916154

@article{ 10.5120/ijca2018916154,
author = { Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf },
title = { Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 180 },
number = { 37 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number37/29330-2018916154/ },
doi = { 10.5120/ijca2018916154 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:02:55.664564+05:30
%A Zuraidy Adnan
%A Mohd Fahmi Mohamad Amran
%A Norhayati Mohd Amin
%A Muhammad Fairuz Abd Rauf
%T Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 37
%P 15-19
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we share our experience in developing hybrid majors’ undergraduate program which combines network security and digital forensic using Information Security and Critical Information and Communication Infrastructure Protection (ISCIP) common body of knowledge (CBK) as a reference. We also share the challenges and parallel effort, mostly from government, that help us in developing this program.

References
  1. Brundiers, K., Wiek, A., & Redman, C. L. (2010). Real-world learning opportunities in sustainability : from classroom into the real world. https://doi.org/10.1108/14676371011077540
  2. Bullough, R. V, Young, J., Birrell, J. R., Clark, D. C., Egan, M. W., Erickson, L., … Brunetti, J. (2003). Teaching with a peer : a comparison of two models of student teaching, 19, 57–73.
  3. Cohen, F. (1999). Managing Network Security : Security Education in the Information Age, 7–10.
  4. Fairuz, M., Othman, I., Bahaman, N., Muslim, Z., & Abdollah, F. (2008). New Curriculum Approach in Teaching Network Security Subjects for ICT Courses in, 637–641.
  5. Industry 4.0: Building the digital enterprise. (2016). Retrieved October, 2017, from https://www.pwc.com/gx/en/industries/industries-4.0/landing-page/industry-4.0-building-your-digital-enterprise-april-2016.pdf
  6. Krempl, S. (2005). Universities need lessons in IT.
  7. Lin, C., & Chen, Y. (2005). Teacher-oriented adaptive Web-based environment for supporting practical teaching models : a case study of “‘ school for all ,’” 44, 155–172. https://doi.org/10.1016/j.compedu.2003.11.003
  8. Lundin, R. W. (2008). Teaching with Wikis : Toward a Networked Pedagogy, 25, 432–448. https://doi.org/10.1016/j.compcom.2008.06.001
  9. Mdec.my. (2017). Malaysia Digital Economy Corporation | MDEC. [online] Available at: https://www.mdec.my/?gclid=EAIaIQobChMI3dDar-Hy1wIVU4GzCh2FJQZyEAAYASAAEgKVZvD_BwE
  10. www2.mqa.gov.my. (2017). :: Malaysian Qualifications Register ::. [online] Available at: http://www2.mqa.gov.my/mqr/ [Accessed 5 Dec. 2017].
  11. Rutledge, S., & Hoffman, J. (1986). A Survey of Issues in Computer Network Security, 5, 296–308.
  12. Sharma, S. K., & Sefchek, J. (2007). Teaching information systems security courses : A hands-on approach, 26, 290–299. https://doi.org/10.1016/j.cose.2006.11.005
  13. Theoharidou, M., Xidara, D., & Gritzalis, D. (2008). A CBK for Information Security and Critical Information and Communication Infrastructure Protection, 1(C), 81–96. https://doi.org/10.1016/j.ijcip.2008.08.007
  14. www2.mqa.gov.my. (2017). :: Malaysian Qualifications Register [online] Available at: http://www2.mqa.gov.my/mqr/ [Accessed 5 Dec. 2017].
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Digital Forensic Curricula Development Private IHL.