{"id":19041,"date":"2022-12-08T11:39:09","date_gmt":"2022-12-08T04:39:09","guid":{"rendered":"https:\/\/stei.itb.ac.id\/?p=19041"},"modified":"2022-12-08T11:39:09","modified_gmt":"2022-12-08T04:39:09","slug":"cyber-security-threats-as-a-classic-challenge-in-the-internet-world","status":"publish","type":"post","link":"https:\/\/stei.itb.ac.id\/en\/cyber-security-threats-as-a-classic-challenge-in-the-internet-world\/","title":{"rendered":"Cyber Security Threats as a Classic Challenge in the Internet World"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">BANDUNG, itb.ac.id \u2014 Technological prowess must supported by the ability to manage and maintain the technological system. This later became the topic of discussion in the Academic, Community Service and Research Talks (BINAAR) held by the School of Electrical Engineering and Informatics (SEEI ITB).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the theme cybersecurity, the event was hosted by <\/span><a href=\"https:\/\/itb.ac.id\/staf\/profil\/budi-rahardjo\"><span style=\"font-weight: 400;\">Ir. Budi Rahardjo, M.Sc., Ph.D.<\/span><\/a><span style=\"font-weight: 400;\">, who is a lecturer in the <\/span><a href=\"https:\/\/stei.itb.ac.id\/en\/research-groups\/research-group-of-computer-engineering\/\"><span style=\"font-weight: 400;\">Computer Engineering Research Group<\/span><\/a><span style=\"font-weight: 400;\">, the 8th BINAAR STEI which was held online on Friday (25\/11\/2022).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on data as of February 2022, there are around 204.7 million internet users in Indonesia. This large population opens up huge internet-based market opportunities and digital technology. If there is no proper attention and management in responding to a market of this size, then the control of the Indonesian internet and technology market will be taken over by other countries.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe market is 200 million. If we don&#8217;t take this, Google, Facebook, and so on will take it. The problem is we are not ready yet. We are not ready technologically, not ready with the human resources, not ready financially,&#8221; <\/span><a href=\"https:\/\/itb.ac.id\/staf\/profil\/budi-rahardjo\"><span style=\"font-weight: 400;\">Budi<\/span><\/a><span style=\"font-weight: 400;\"> explained. The adoption of internet-based technology and social media is now being intensively carried out. Various kinds of applications and service platforms for transportation, e-commerce, travel, to finance, all can be easily accessed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Behind this potential, there are also risks from the use of the internet in human daily life. The most common threat is data leakage. Leaked databases can be caused by user negligence or weak system security. The threat of data leakage is not only felt by individual users, but also by large companies that are equipped with sophisticated data security technology. Even though data leaks are very vulnerable and can occur at any time, prevention efforts must always be made through layered protection and the development of a better security system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The next threat that is no less risky is ransomware. Ransomware is a type of malware that hackers use to encrypt data so that it cannot be read by the user&#8217;s device. To be able to reuse the data, the user must use the encryption code which is usually obtained after giving the hacker a ransom. Apart from ransomware on user data, threats of hacking and data manipulation can also occur on blockchain systems. Hackers will usually change or randomize data on a list of transactions that have not been validated so that it will cause problems with these transactions. All threats on the internet are carried out by actors known as cyber threat intelligence.<\/span><\/p>\n<p><a href=\"https:\/\/itb.ac.id\/staf\/profil\/budi-rahardjo\"><span style=\"font-weight: 400;\">Budi<\/span><\/a><span style=\"font-weight: 400;\"> further explained, \u201cAll systems have vulnerabilities. And usually we use protection such as a firewall to protect the system from outside threats. But actually the problem is still there because it comes from the system itself. If the protection used is safe enough, it&#8217;s still okay. But if not, external threats attack security, then security incidents will occur.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/itb.ac.id\/staf\/profil\/budi-rahardjo\"><span style=\"font-weight: 400;\">Budi<\/span><\/a><span style=\"font-weight: 400;\">, cybersecurity problems are caused by four main factors, namely weak passwords, software that is not updated, fraud that takes advantage of human weaknesses (social engineering), and the transition from network security to application security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In dealing with existing security threats, developers are expected to be able to create better security applications and systems. On the other hand, users in general must also increase cyber understanding and literacy so that the data security system and its devices are better maintained.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>BANDUNG, itb.ac.id \u2014 Technological prowess must supported by the ability to manage and maintain the technological system. This later became the topic of discussion in the Academic, Community Service and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18947,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1866,254,1838,1232,272],"tags":[],"class_list":["post-19041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-engineering-research-group","category-events","category-general","category-information","category-news"],"_links":{"self":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/posts\/19041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/comments?post=19041"}],"version-history":[{"count":0,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/posts\/19041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/media\/18947"}],"wp:attachment":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/media?parent=19041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/categories?post=19041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/tags?post=19041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}