Page 2 - bookofabstract_vj5_final(1)
P. 2
Table of Content
Contents
The Efficiency of Wiping Tools in Media Sanitization ................................................................................... 1
Monaliza Sahri, Siti Norul Huda Sheikh Abdulah, Mohd. Firham Efendy Md. Senan & Nooreen Ashilla
Yusof
Towards Compliance Management Automation thru Ontology mapping of Requirements to Activities
and Controls .................................................................................................................................................. 2
Danny C. Cheng, Jod B. Villamarin, Gregory Cu & Nathalie Rose Lim-Cheng
Information Security Risk Assessment for the Malaysian Aeronautical Information Management System 3
Alfian Alwi & Khairul Akram Zainol Ariffin
Robotic Movement Encryption Using Guaranteed Cellular Automata......................................................... 4
Manal Abd Al-Jabbar Ahmad Mizher & Riza Sulaiman
A Proposed Plan in Legalising Software for Measuring Instruments in Malaysia ........................................ 5
Muhammad Azwan Ibrahim, Nazri Marzuki, Zarina Shukur & Nasharuddin Zainal
Assessment of Self-Identity Among Teens Towards Self-Crime Prevention Program .................................. 6
Siti Norul Huda Sheikh Abdullah, Wan Fariza Fauzi, Muhammad Nuruddin Sudin, Nurul Nadhirah
Zahari, Zaizul Bin Ab Rahman, A`Dawiyah Ismail, Nur Riza Mohd. Suradi & Azmin Sham Rambely
Cyber Security Situational Awareness among Parents ................................................................................. 7
Nazilah Ahmad, Umi Asma’ Mokhtar, Zulaiha Ali Othman & Siti Norul Huda Sheikh Abdullah
Security Assessment of Libyan Government Websites................................................................................. 8
Abdullah Ahmed Ali & Mohd Zamri Murah
Level of Readiness in IT Disaster Recovery Plan ......................................................................................... 10
Shuhaiza Aszrin binti Mohd Kasim & Ibrahim bin Mohamed
Optimized Data Hiding in Complemented or Non- Complemented Form in Video Steganography .......... 11
Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah & Zulkifli Ahmad
Advanced Persistent Threats Awareness and Readiness: A Case Study in Malaysian Financial Institutions
.................................................................................................................................................................... 12
Zeti Suhana Zainudin & Nurul Nuha Abdul Molok
Victimization Analysis Based On Routine Activitiy Theory for Cyber-Love Scam in Malaysia .................... 13
Mohd Ezri Saad & Siti Norul Huda Sheikh Abdullah
i