How Do We Create Defense Against Cyber Threats?

By Adi Permana

Editor Adi Permana

BANDUNG, itb.ac.id—Data is very valuable at this moment. Hence, data confidentiality has become more important, especially in cases of cyber and information threats. One of the most discussed cyber-attack in 2020 is the case of leakage and data theft. This case is an example of a technical cyber-attack that targeted the electronic system. Likewise, this threat also attacked social networking, specifically hacking and disinformation.

“In information warfare, the main weapon is the engineered information. Now with cyber technology, millions of information can be sent in a short time. If that information is constantly conveyed to humans, their brain will change; ideas, options, judgments, emotions, attitudes, behaviors, opinions, even motivation will be influenced,” said the Head of the National Cyber and Cypher Agency (BSSN), Lieutenant General (Ret.) Hinsa Siburian, in the Country Defense and National Security Seminar with the main topic of “Cyber Defense and Security for National Resilience” on Thursday (18/02/2021).

The keynote speaker and Dean of National Security Faculty Indonesia Defense University Romie Oktovianus Bura, B.Eng.(Hons.), MRAeS, Ph.D., CIQnR., CIQaR. agreed that human resources are the key in cyber defense and security. “We develop human resources who can host themselves in their own country. It is crucial for them to not only be capable of operating or applying foreign technologies but also developing domestic technologies,” he added.

According to Prof. Dr. Ing. Ir. Suhardi, M.T. from Cyber Security Center STEI ITB, the capability to tackle any cyber-attacks is very important to a country. Unresolved cyber-attacks will accumulate, relapse larger assets, and disturb the nation’s security. Therefore, self-awareness concerning cyber security should be raised.

“I think awareness is becoming a simple yet difficult task. On average, large-scale cyber-attacks begin with one’s negligence. Some of the tips that are usually delivered are securing your network, always keeping your software updated, and doubling protection when doing contact with other devices or against login,” he continued.

The certainty of the presence of digital traces encourages Cyber Security ITB to develop digital forensics as a methodology used when cyber security is already exceeded. Research and innovation on how to find these digital traces are now continuously being developed.

Reporter: Ristania Putri Wahyudi (Matematika, 2019)
Translator: Sekar Dianwidi B. (Rekayasa Hayati, 2019)