27MALAYSIA
Balancing national development, national security, and cybersecurity policy
Introduction
The purpose of this chapter is threefold. First, to examine the Internet booms and the growth of the Information and Communication Technology (ICT) in Malaysia and how it impacts Malaysia’s national security. Second, it also examines the nature and substance of Malaysia’s cybersecurity frameworks. Third, it discusses Malaysia’s strategy to manage the multitude of cybersecurity challenges within its border, including the emerging trend of security threats such as cyber warfare, cyberterrorism, and cybercrime.
Background
Since attaining independence in 1957, Malaysia has experienced a rapid development and economic growth ...
Get Routledge Companion to Global Cyber-Security Strategy now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.