*INTERNATIONAL WEBINAR*
“Cybersecurity
in a Connected Worldâ€
STEKOM University, Indonesia – International Seminar entitled
“Cybersecurity in a Connected World†brought together a number of international speakers to
discuss in more depth aboutcyber securityin this increasingly connected world.
Seminar Speakers:
1.
Prof.S.Noorul
Hassan PhD (Head of Department AI&DS, CSE (CS)) AEC, India
2.
Ereso
Negi (Lecturer in Management Department) OSU, East Timor
3.
Cherlina
Heleina Panjaitan M.Kom (Lecturer of Computer Systems Dept) STEKOM University,
Indonesia
Seminar Opening:Dr. Joseph Teguh Santoso
(Rector of STEKOM University) Indonesia
Master of Ceremony : Anggi Novita Sari
(International Affairs) STEKOM, Indonesia
In
this International Webinar, we know that cybersecurity has become a major concern nowadays. Advances
in digital technology have changed the way we work, communicate, interact and
access information. However, as technology advances, increasingly complex
challenges emerge, especially in terms of personal data security.
In this seminar,Cherlina Heleina Panjaitan M.Kom (Lecturer of Computer Systems Dept,
STEKOM University, Indonesia) explained thatThe internet is a network
system that can connect us with users all over the world digitally.Connected worldDigitally
is a condition where there is a digital ecosystem that allows instant exchange
of data or information and communication between devices or individuals and
organizations throughout the world. There are many examples of technological
advances in how the world can be connected. We can see the Internet of Things
or IoT, global connectivity, e-commerce and online social media.
In his presentationCherlina toosaid that when we
talk about this internet-connected world, we also have to talk about its
security. Because information flows freely over the internet and devices are
constantly communicating with each other. Cybersecurity has become an important
concern. In a journal entitled Cybersecurity: Trends, Issues and Challenges, it
is stated that in today's internet world, where technology supports almost
every aspect of society, cyber security and forensic specialists are
increasingly facing cyber threats. When we talk about cyber threats, it will
always be associated with hackers. But what they actually do, here are the
cyber crimes committed by hackers:
1. Identity Theft or identity theft is a crime that uses someone
else's identity to gain profit or fraud by impersonating someone else using
that personal data.
2. Phishing
is a fraudulent attempt to obtain sensitive information or data such as
passwords and credit cards by posting as a trustworthy entity in electronic
communications.
3. Ransomware
is malicious software that encrypts a user's files or system demanding payment
for its release.
4. Cyber
​​espionage is a covert activity carried out through digital means to gain
unauthorized access to sensitive information or intellectual property
5. Malware is malicious software designed to interfere with, damage,
or gain unauthorized access to a computer system.
6. Denial
of Service (DoS) Attacks are threats to shut down a system or network so that
it cannot be accessed by users. Distribution or consumption of explicit content
involving minors.
7. Financial
Cybercrime is an illicit activity that targets financial systems and
institutions to obtain money or valuable financial information from users.
More, Cherlinaexplains that phishing is a cyber crimewho use email, telephone,text messages, personal identity information banking details, credit card details and passwords. The following is the Phishing process:
1. The
attacker sends the victim emails or other types of communications designed to
help attack the victim
2. The
victim clicks on the email and opens a phishing site
3. The
attacker collects the victim's credentials
4. The
attacker uses the victim's credentials to access the victim's account
According
toCherlinaPhishing is
one of the most frequent cyber crimes and takes many victims, so we have to be
more careful with our personal data. The following are several types of
Phishing:
1. Deceptive
phishing or deceptive pieces. Attackers impersonate legitimate companies and
try to steal people's personal information in their login passwords.
2. Spear
phishing, is a type of phishing attack that targets specific individuals or
organizations, usually via malicious emails.
3. Clone
phishing, a type of phishing attack in which official or previously obtained
emails contain attachments and links that are shared and used to create identical
emails or clones of the same.
4. Whaling,
is an attack with the aim of obtaining more profitable and confidential
information by destroying large targets.
5. Link
manipulation, when the user opens the link, the link opens on a website that
has been set up by the fraudster.
6. Voice
phishing, a scam that uses telephone calls to trick people into giving money or
revealing personal information.
The
following types of cybersecurity can be used to prevent phishing attacks:
1. Firewall,
is a layer of defense that monitors and controls internet traffic in a network.
2. Antivirus
and antimalware, are programs that will detect, block and remove malicious
software, including phishing.
3.
Email filtering, used to check and
identify suspicious or suspicious emailsphishing.
This filter can block suspicious emails before they reachuser
inbox.
4.
Multi-Factor Authentication (MFA). M.F.Arequires
users to provide more than one form of identification to access their accounts.
This can reduce the risk of phishing attacks because attackers often cannot
access both required authentication factors.
5.
URL Filtering, this tool can prevent users
from accessing websites that are predicted to be phishing or dangerous by
blocking access or providing warnings to users.
6.
Connection termination,
if a phishing attack is detected then preventive measures may involve
terminating the connection between the user and the suspicious source.
7. Software
updates, ensuring all software including web browsers and operating systems are
always updated to the latest versions to reduce the risk of phishing attacks.
Cherlina mentioned There
are several things you can do to prevent attacksphishing
:
1.
Be wary of spam in this
type of prevention
2.
Communicate personal
information only via telephone or secure websites
3.
Don't click on links,
download files or open attachments in emails from unknown senders
4.
Good security policy
5.
Security awareness training
The
next speaker, namelyProf.S.Noorul
Hassan PhD (Head of Department AI & DS, CSE (CS)) AEC, India spoke aboutcybersecurity
and the role of cybersecurity in this digitally connected world and how to
measure cybersecurity. In this seminar,Prof. S. Noorul explainedthat cybersecurity is technology and
processes designed to protect networks and devices from attack, damage or
unauthorized access. Cybersecurity is very important for militaries, hospitals,
large corporations, small businesses, and other organizations and individuals
in a country because this data is the foundation of any organization. If the data is exploited,
there are of course many risks.
FurthermoreProf. S. Noorulalso explains
the CIA Triad and its relationship to cybersecurity. The CIA triad is a general model on which system
development is basedcybersecuritywhich coverconfidentiality, integrity and availability. And the
security of any organization will start with these three principles. The
following is an explanation of the CIA Triad:
· The
principle of confidentiality emphasizes that only authorized parties can access
sensitive data or information.
· The
principle of integrity, emphasizes that only authorized people and parties can
change or add sensitive information.
· The
principle of availability, emphasizes that system functions and data must be
available according to the request of the authorized party.
Prof. S. Noorulalso
explained the importance of cybersecurity in this digitally connected world.
Cybersecurity should not be ignored. Because one cybersecurity breach can
result in the exposure of millions of people's personal information. And this
violation has a large financial impact on the company or organization.
Therefore, cybersecurity is essential to protect businesses and individuals
from spammers and cybercriminals.
According
toProf. S. NoorulA
cyber attack is an attempt by a hacker to access a computer network or system,
usually to change, steal, destroy or reveal information. When targeting
companies or other organizations, a hacker's goal is usually to access
sensitive company information, such as intellectual property (IP), customer
data or payment details. Then what kind of strategy needs to be carried out
against cyber attacks. The following are mitigation strategies against cyber
attacks according to Prof.S.Noorul:
· Strong
passwords, use strong and unique passwords for each of your accounts.
· Update
software, always update your computer, smartphone and other devices with the
latest security patches, because each update will fix security bugs.
· Firewall,
using a firewall to monitor and control incoming and outgoing networks
· Antivirus,
install antivirus software on your device to detect and remove malicious
software such as viruses and worms.
· Data
backup, back up your important files and data to an external hard disk or cloud
storage regularly.
· Multi-factor
authentication (MFA), enable multi-factor authentication whenever possible.
· Train
awareness, educate yourself and your employees about cyber threats
· Limiting
access, only giving access to sensitive information or systems to those who
need it for their work.
Prof.S.Noorul also explained about information disclosure
bug. Information disclosure bug refers to a security vulnerability in which an
application or system accidentally discloses sensitive information to
unauthorized users. This disclosure of information, is also known as
information leakage. So we must ensure that information disclosure must be in a
safe manner. Because if not, hackers can easily get or steal our data from the
website.
Then
Prof.S.Noorul added that disclosure of sensitive information can be caused by
software vulnerabilities, misconfigured systems, weak access controls,
inadequate encryption, insecure network transmissions and poor data handling by
employees or third-party vendors . The dangers of disclosing sensitive
information can pose major threats such as identity theft, financial fraud,
reputational damage, regulatory sanctions, loss of intellectual property and
legal liability. It can also damage trust among customers, partners and
stakeholders. Therefore, a cyber-aware culture is neededto be able to identify, prevent and respond to cyber threats. The
following builds a cyber-aware culture:
· Discussion
of the role of educational awareness in fostering a cyber-aware culture
· The
importance of training individuals to recognize and respond effectively to
cyber threats
· Conduct
outreach about cyber security awareness in schools, workplaces and communities