You are on page 1of 3

THE EMERGING OF SECURITY TECHNOLOGY IN IT INDUSTRY

Speakers: Mr. Karunia Widjaja, founder and CeO of PT Adi Inti Mandiri (CyptoTechno) Mr. Pike Wong, founder and CTO of Beijing Compass Technology (Simcommander) Time: Tuesday, June 4, 2013

This was a seminar that has been held at Auditorium, Anggrek Campus of Bina Nusantara University. The seminar was about security in computer network. The awesome topics were brought by two awesome speakers from awesome corporations. They have many expertises on networking and its security.

Nowadays, since technology is developing continuously, the threats and attacks coming from technology is emerging much more, especially to the IT industry. So people are developing technology for security in IT industry. That is to counter the threats and attacks coming from technology too.

The speaker at the first session asked us about important thing. Why we need security? The purpose is for protection from bad people. For example, like prevent the college students from hacking and changing his/her exam grade. Protect some important file from unauthorized user, etc.

There are three types of threats to an organization; those are outsider threats, insider threats, and unknown threats. The appearance of threats to the organization is a common thing. Every organization must have its threats. The speaker said that securing the organization from outsider threats is common and easy to handle. We could just close it completely from outside world. That is the easiest way to protect from outsiders attack. But

the second and third, which is insider and unknown threats, are verily put more risk to the organization. These two are the most challenging threats to the organization s security. They are often difficult to spot. The insiders, put more risk to the organization because they could know the circumstances of the organization. They could know the security system in there, which is more easily for them to find the weakness of the organizations security.

One of the types of attack is malware implantation. Malware is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. In IT industry, Malware is implanted by attackers primarily to steal sensitive information, financial, or business importance of the organization. The challenges of malware implantation are that insiders compromise servers often to increase their access to additional resources. Solution to this attack is with anti malware software and periodic information backup and recovery.

The speaker told us about anonymous proxy bypass as one of the solution in security. Proxy bypass is a computer system that acts as an intermediary for requests from clients seeking resources from other servers. The purpose of this is to keep machines behind it anonymous, mainly for security. Many organizations use this to block specific website by blocking to protect employees.

He said that just one security breach can result in financial losses, loss of intellectual property, brand and reputation compromised. So there are some things that security must have: security must add value to the business; business owners want better performance, value and brand recognition; security must not be in there just for the sake of security.

There are two things that must be considered when developing or using security technology. First is the effectiveness of relevant security. The last is application and network availability. Unfortunately, the second speaker, Mr. Pike Wong, didnt come for sharing his knowledge about security in technology at the second session. So the session was presented by Mr. Karunia Widjaja again to explains about PT. Adi Inti Mandiri and some information about US and China advanced technology

US and China is continuously developing more advanced security technology. Mr. Karunia Widjaja have shown many technology of them on the presentation. China have launched their own satellite that covering around the earth. On cyber network, China is rumored that no one can breach their security due to their powerful security network technology. It is also issued that there is a cyber war between US and China until now. At 2010, US has been discovered China s submarine ship were stalking on their US fleet during exercise on Pacific Ocean. The one submarine was able to slip past at least a dozen other U.S. warships.

Finally at the last session he explained about his corporation, AIM. CryptoTechno is a brand name of PT. Adi Inti Mandiri. AIM is a local IT company specialize in full-service of secure and manageable IP communications, email archiving and auditing services, contact center, performance optimization, customer relationship management (CRM) and IT Service Management (ITSM) applications, systems integration, consultation and NLP training. There are three business principles of AIM; know the business, act with integrity, and be excellence. He also explained one of their products, MindCrypt. This software is for tracking and recording sounds in purpose of security. Next product is for smartphones, secfone for secure conferencing. The software offer an options including password validation and operator intervention to ensure that only those you invite, are listening to your conference.

We can conclude that security technology is an important thing now. The number of bad people who want to compromise, attack and the other purpose for their personal gain is increasing. We have to be smarter and put more concern about security in order to protect our privacy and sensitive information.

Reported by Agung Wijayakusuma, 1501164864, 04PLT

You might also like