Papers by Muhammad Azwan Ibrahim
Systems, Jan 16, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
IEEE Access, 2022
Social engineering is an attack on information security for accessing systems or networks. Social... more Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and frameworks to prevent them. The current research explains user studies, constructs, evaluation, concepts, frameworks, models, and methods to prevent social engineering attacks. Unfortunately, there is no specific previous research on preventing social engineering attacks that effectively and systematically analyze it. Current prevention methods, models, and frameworks of social engineering attacks include health campaigns, human as security sensor frameworks, user-centric frameworks, and user vulnerability models. The human as a security sensor framework needs guidance that will explore cybersecurity as super-recognizers, likely policing act for a secure system. This paper intends to critically and rigorously review prior literature on the prevention methods, models, and frameworks of social engineering attacks. We conducted a systematic literature review based on Bryman & Bell's literature review method. We found a new approach in addition to methods, frameworks, models and evaluations to prevent social engineering attacks based on our review, which is using a protocol. We found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage information sharing on a social network. We present this systematic literature review to recommend ways to prevent social engineering attacks. INDEX TERMS Social engineering attacks prevention, systematic literature review.
IEEE Access, 2022
Social engineering is an attack on information security for accessing systems or networks. Social... more Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and frameworks to prevent them. The current research explains user studies, constructs, evaluation, concepts, frameworks, models, and methods to prevent social engineering attacks. Unfortunately, there is no specific previous research on preventing social engineering attacks that effectively and systematically analyze it. Current prevention methods, models, and frameworks of social engineering attacks include health campaigns, human as security sensor frameworks, user-centric frameworks, and user vulnerability models. The human as a security sensor framework needs guidance that will explore cybersecurity as super-recognizers, likely policing act for a secure system. This paper intends to critically and rigorously review prior literature on the prevention methods, models, and frameworks of social engineering attacks. We conducted a systematic literature review based on Bryman & Bell's literature review method. We found a new approach in addition to methods, frameworks, models and evaluations to prevent social engineering attacks based on our review, which is using a protocol. We found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage information sharing on a social network. We present this systematic literature review to recommend ways to prevent social engineering attacks. INDEX TERMS Social engineering attacks prevention, systematic literature review.
2015 International Conference on Electrical Engineering and Informatics (ICEEI), 2015
2017 6th International Conference on Electrical Engineering and Informatics (ICEEI), 2017
In the field of measuring instruments subject to legal control, priority is traditionally given t... more In the field of measuring instruments subject to legal control, priority is traditionally given to hardware testing and certification. For the last five years, digital measuring instruments gaining popularity among users and devices providers, especially in South East Asean. Without considering software certification, the software subject to legal control can be designed to enable the user to perform unauthorized modifications, changes and fraud. Previous studies have indicated that, certification of software product may help determine more certainty and assurance about the software. The certification reports are beneficial not only to the users and stakeholders but also to the developers and suppliers. This research proposes criteria for software of measuring instrument based on Malaysian environment whereby, the certificate can only be issued as evidence of compliance with the provisions of the proposed criteria. It is an alternative approach to guarantee the level of quality of a...
2018 Cyber Resilience Conference (CRC), 2018
Nowadays software has now become a critical element of measuring instruments require to be checke... more Nowadays software has now become a critical element of measuring instruments require to be checked and certified in order to be used in trades. Most ASEAN countries still have not implemented the pattern approval or type approval process for software in measuring instrument. This paper will propose an approach in implementing the legalisation process for existing use of software for measuring instrument in Malaysian context.
Asia-Pacific Journal of Information Technology & Multimedia
Uploads
Papers by Muhammad Azwan Ibrahim