NC4 Public1

National Cyber Threat Level

Low

Moderate

Caution

High

Critical

Security Policy

The following are among the main security policy that are derived from the NACSA's security policy document:

  1. National Cyber Security Agency (NACSA) is committed in protecting the NACSA’s information from all threats, whether internal or external, deliberate or accidental from unauthorised access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability. We will use all reasonably practicable measures to ensure that:

              (a)   Information is protected against unauthorised access;

              (b)   Confidentiality of information is assured;

              (c)    Integrity of information is maintained; 

              (d)   Regulatory and legislative requirements are met;

              (e)   Managing the security incidents effectively by establishing information security incident response plans;

  1. Visitors who want to use facilities such as feedback and others are required to register for security  measures in order to avoid undesirable incidence;

  2. Visitors are fully responsible for the information provided to this Portal;

  3. Visitors must ensure that files attached (if any) are free of viruses;

  4. Websites of government and private agencies that required a link to this Portal must have the approval from the Director of The National Cyber Coordination & Command Centre; 

  5. Breaking or hacking attempts into this Portal are prohibited.

  6. Visitors should also take the following safeguards measures:

    (a)  prevent disclosure of information to unauthorized parties;

    (b)  check the information and determine it accurately and completely from time to time;

    (c)  maintaining the confidentiality of passwords;

    (d)  comply with established standards, procedures, measures and safety guidelines;

    (e)  implement regulatory requirements related to the information, especially during the creation, processing, storage, transmission, delivery, exchange and destruction; and

    (f)  safeguarding the confidentiality of ICT security measures from publicly known.

Insert title here