Securing the digital frontier: Malaysia’s strategic approach to cybersecurity in the 5G era

The introduction of 5G technology in Malaysia is poised to revolutionise connectivity, data transfer, and innovation, paving the way for the Fourth Industrial Revolution (IR 4.0).

However, this transition also presents challenges, including cyber vulnerabilities that could compromise national security, disrupt economic stability, and jeopardise data privacy of citizens. The mitigation of these threats requires a strategic, nuanced, and proactive approach.

The advent of 5G technology adds complexity to cybersecurity, offering faster speeds and increased connectivity. This will attract sophisticated cyber threats eager to exploit potential vulnerabilities. As Malaysia faces the transition to digital transformation, the potential for cyber threats to evolve at an unprecedented rate is not just a possibility, but a certainty.

In 2022, two significant data breaches occurred in Southeast Asia, specifically, in Malaysia. The AirAsia data breach involved a ransomware attack by the “Daixin Team” that resulted in personal information being stolen from staff and passengers. The Malaysian National Registration Department data breach involved the sale of a database containing the personal information of 22.5 million Malaysian nationals.

The Malaysian government finds itself at a crucial juncture, navigating these uncharted waters and ensuring the nation’s digital transformation is secure and resilient. The urgency of this task cannot be overstated; the need for comprehensive cybersecurity measures is paramount. Our approach to cybersecurity must be as innovative and agile as the technology it seeks to protect.

A holistic strategy that encompasses not just technological solutions, but also regulatory frameworks, educational initiatives, and public awareness campaigns confirms the aspiration that our digital future is not just bright, but secure.

Safeguarding our nation’s critical infrastructure becomes paramount in this digital transformation era. Critical National Information Infrastructure (CNII), which refers to vital assets crucial for national security, demands stringent protection measures.

In alignment with national security priorities, there is a need to uphold and safeguard CNII from potential cyberattacks, adhering to the guidelines and regulations outlined in Malaysia’s National Security Committee (NSC) Order No. 26. This comprehensive exploration of the challenges associated with 5G technology provides a structured framework aimed at fortifying Malaysia’s cyber defences.

NSC’s Order No. 26, developed by the National Cyber Security Agency (NACSA), aims to establish regulatory compliance, and safeguard these assets against cyber threats, ensuring the integrity and resilience of our nation’s CNII.

The extraordinary potential of 5G technology is undeniable, promising to revolutionise various aspects of life and business in Malaysia. However, this advancement also brings with it complex cyber threats that cannot be overlooked. It’s crucial to embed robust cybersecurity measures right from the outset, ensuring a secure foundation for this digital leap.

The significance of a collaborative approach in strengthening our digital defences cannot be overstated, especially in the context of the emerging 5G landscape. This synergy between government, industry, and academia, is pivotal in creating a robust and resilient cybersecurity infrastructure. The government, with its regulatory and policymaking capabilities, can set the tone for national security standards and provide the necessary legal framework. Industry players, with their technical expertise and practical experience, are crucial in developing and implementing cutting-edge cybersecurity technologies.

Academia, on the other hand, plays a vital role in research and development, contributing to the innovation of new cybersecurity methodologies and training the next generation of cybersecurity professionals. Together, these three pillars form a dynamic and comprehensive defence mechanism against cyber threats, leveraging each sector’s strengths to create a more secure digital environment for the nation.

This collaborative model not only facilitates the sharing of resources and knowledge but also fosters a culture of continuous learning and adaptation, which is essential in the fast-paced world of digital technology and cybersecurity.

The cybersecurity policy recommendations for 5G integration are aligned with the regulatory framework established by the NACSA. NSC Order No. 26 provides a comprehensive set of guidelines designed to safeguard national security interests, and the policy recommendations are crafted to ensure full compliance with these directives. The alignment of this policy recommendation with the regulatory framework will reinforce our commitment to national security and fortify our defences against cyber threats.

To address this urgency, a holistic and proactive strategy is proposed to mitigate the cyber risks associated with 5G and ensure the resilience of the nation’s digital infrastructure. The system includes establishing an authoritative and independent governance structure dedicated solely to overseeing and upholding 5G cybersecurity standards across Malaysia. An autonomous audit body will also be found to monitor, enforce, and maintain 5G cybersecurity standards.

By adopting these recommendations, Malaysia can transform this moment of urgency into an opportunity for progress, ensuring that implementing 5G technology in Malaysia becomes a beacon of innovation, security, and resilience for future generations.

This article is based on an extensive one-year research project, spearheaded by Brigadier General Norli Hisham Alwi of the Royal Malaysian Air Force. His team comprised members of Sub Cohort 1 from the National Resilience Course Cohort 4/23, at the National Resilience College, in Putrajaya.

The original paper discusses the critical aspects of cybersecurity in the context of Malaysia’s transition to 5G technology, with emphasis on the need for a holistic, proactive strategy to safeguard the national digital infrastructure.

Tagged with: