Volume 21 - (Q4/2009) “Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer and operate computer systems.” Kevin Mitnick Contributors MyCERT 4th Quarter 2009 Summary Report Guide to Motion Compensation Application Of Cryptography CyberSecurity Malaysia (Phase Correlation and Vector Assignment) By Liyana Chew Bt Nizam Chew & By Mohamad Faizal Bin Kheli Kuzzaman Norhayati Binti Aziz & Nor Azeala Binti Mohd Yusof USB Port: A culprit to ICT Security?
[email protected] [email protected] By Zarina Musa
[email protected] [email protected] Elliptic Curve Cryptography
[email protected] By Norul Hidayah & EnCase 101: How EnCase Looks at the Time Nik Azura Common Criteria and National Cyber Security of the Evidence File [Part 2]
[email protected] By Norahana Salimin By Lee Hui Jing
[email protected] [email protected] [email protected] Cyberdating: How to Have Fun but Stay Safe Improving Organizational Sustainability Flash Memory: SLC and MLC By Muralidharon Through Information Security By Hafizullah Fikrie (DF)
[email protected] By Maslina Daud
[email protected] [email protected] Know Your WZC and PNL Threats By Abdul Fuad Abdul Rahman Pengurusan Krisis Jamin Kesinambungan Urusan
[email protected] By Nazhalina Nazri
[email protected] Importance of Global IMD Report and CyberSecurity Malaysia Razman Azrai
[email protected] e-Security | CyberSecurity Malaysia | Volume 1721 - (Q4/2008)(Q4/2009) KDN License number PP 15526/10/2010 (025827) 2. From the Editor’s Desk A Message from the Head
[email protected] of CyberSecurity Malaysia Hello to all readers, It’s the fourth quarter of 2009 and we are back with lots of interesting articles.