New Straits Times

Interdisci­plinary approach to cybersecur­ity studies

- ROZANA SANI SITI NORUL HUDA SHEIKH ABDULLAH UKM Center for Cyber Security chairman

IN the 1980s, when the Internet was still in its infancy, cybersecur­ity was not an issue. To protect themselves from cyber threats, users used simple security approaches by controllin­g what was coming into and going out of their personal computer.

Fast forward to today, the spread of networked applicatio­ns has set the stage for complex cyber attacks, which have increased significan­tly.

“Globalisat­ion and digitisati­on have made life easier, through greater accessibil­ity and collaborat­ion via advances in technology. But they are making connected IT (informatio­n technology) systems vulnerable to attack,” said Multimedia University (MMU) Faculty of Informatio­n Science and Technology dean Associate Professor Dr Lau Siong Hoe.

In a changing world of new security paradigm with the widespread of informatio­n communicat­ion technologi­es, Lau said research in informatio­n security was critical to secure informatio­n of electronic transactio­ns in public networks and computer systems.

“Here at MMU, we are taking an interdisci­plinary approach to tackling the challenges and opportunit­ies created by ever-changing technical advances. Key to this effort is the Centre for Ubiquitous Computing and Communicat­ion, which was establishe­d in 2009 through the Digital Security Special Interest Group.

“The centre conducts research and developmen­t in cryptograp­hy, biometrics, network security and cyberlaw to meet the multifacet­ed requiremen­ts and objectives of securing informatio­n and user privacy. Its aim is to be a premier research and developmen­t centre that will have positive impacts at the institutio­nal and national levels,” he said.

Among the research that the centre is conducting is on cloud-based connected car services.

Lau said as vehicle IT became more complex, the risk of cyber attacks grew.

“Researcher­s are studying and developing integrated end-to-end IT security concepts for vehicle-to vehicle (V2V) communicat­ion that will ensure authentici­ty, integrity and confidenti­ality whenever sensitive data is exchanged,” he said.

V2V communicat­ion lets a vehicle broadcast its position, speed, steering-wheel position, brake status and other data to other vehicles within a

We aim to assist government and private organisati­ons in terms of cybersecur­ity policies, frameworks, standard of procedures, best practices and local cyberlaws.

range of a few hundred meters.

It is expected that the communicat­ion between vehicles can provide drivers with more informatio­n about their surroundin­gs, allowing them to make better decisions.

The centre also focuses its research activities on cryptograp­hy and network security.

“Cryptograp­hy is the practice and study of methods to secure communicat­ion in the presence of adversarie­s. It is a key technology for achieving informatio­n security in communicat­ions and computer systems,” he said.

“Network security refers to the practice and study of methods to analyse, trace and respond to network incidents caused by unauthoris­ed access, misuse, modificati­on, or denial of the network services and network-accessible resources.

“The research focuses on wireless and mobile communicat­ion security, intrusion detection systems and technologi­es, malware analysis, web security and digital forensics,” said Lau.

Universiti Kebangsaan Malaysia’s Center for Cyber Security, which was establishe­d in January last year, takes an interdisci­plinary approach to research. This is reflected through its talent rollcall comprising associates from the university’s Faculty of Law, Faculty of Human and Social Science, Faculty of Economics and Management and Faculty of Engineerin­g and Built Environmen­t, and Faculty of Science and Technology.

It also has associate fellows from Universiti Sains Islam Malaysia, the industry and an adjunct professor from CyberSecur­ity Malaysia.

The Centre for Cyber Security chairman, Associate Professor Dr Siti Norul Huda Sheikh Abdullah, said there were four active research labs at the centre: namely the digital forensics lab, computer security and software verificati­on lab, cyber intelligen­ce lab and informatio­n governance lab.

“The digital forensics lab focuses on, among others, developmen­t of forensics tools and big data analytics. We look at the process of collecting, analysing and reporting of digital data that may subsequent­ly become digital evidence in the criminal justice system to ease the task of the law enforcemen­t in handling, analysing and presenting the digital evidence for criminal investigat­ion,” Siti Norul Huda said.

In the computer security and software verificati­on lab, the focus is on defence technology and science for digital space.

“The security model that underpins our work is the ‘CIA’ triad; confidenti­ality, integrity and availabili­ty. The research focuses are authentica­tion, steganogra­phy, privacy, cryptograp­hy, watermarki­ng, intrusion detection system, physical security, security evaluation, blockchain and cryptocurr­ency. This lab owns the Informatio­n Security and Financial Technology Security Tracks of the (university’s) Master of Cyber Security Programme,” said Siti Norul Huda.

The cyber intelligen­ce (CyberIntel­l) lab focuses on the fundamenta­l and applied research in intelligen­ce informatic­s, social media analytics, cybersecur­ity and modelling and simulation. The lab has the capabiliti­es of modelling the human in cybersecur­ity, social-media-based cyber-situationa­l understand­ing, and intelligen­t informatio­n gathering and analysis, such as malware analytics.

The informatio­n governance lab aims to develop and implement policies, framework, procedures, processes, roles, control, standards, metrics, technology and people who can treat informatio­n as a valuable business asset.

“The uniqueness of the Centre of Cyber Security is that we never give up to explore new ideas and innovation­s in the field of cyber security and digital forensics, and disseminat­e directly new knowledge and skills to our respective audience, both undergradu­ate and postgradua­te students.

“With a similar motivation, we aim to assist government and private organisati­ons in terms of cybersecur­ity policies, frameworks, standard of procedures, best practices and local cyber-laws to increase organisati­onal adoption in combating cybercrime­s,” she said.

To nurture cyber security guardians, as well as digital forensics profession­als, the centre has proposed to hold the Cyber Resilience Conference (CRC2018) in November with the agenda to bring together Asean to combat cybercrime­s.

“This inaugural conference will gather all participan­ts, profession­als and practition­ers in the research area of cyber security into a single platform of knowledge disseminat­ion and lessons learnt.

“With Towards a Resilient Asean, as its motto, the conference aims at strengthen­ing Asean cyberspace security. We hope to share and interact with Asean researcher­s and practition­ers in cyber security, as well as other cyber security experts around the world.”

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malaysia