New Straits Times

Guarding against digital threats, data breach

- The writer is fellow, Centre for the Study of Shariah, Law, and Politics, Institute of Islamic Understand­ing Malaysia (Ikim)

BEYOND land, sea, air, and space, there is a fifth domain — cyberspace. Data is the new soil and water for life, and data is also a new threat as the digital economy is not an option, but a must. In today’s interconne­cted society, no one is safe from cyber vulnerabil­ities.

The Malaysia Digital Economy Blueprint maps out a direction and plan for a better future. Postpandem­ic norms are witnessing new business models on digital platforms.

The online marketplac­e and digital commerce segment became the most favourable transactio­n preference and the total transactio­n is projected to reach US$10.919 million next year, with an annual growth rate of 15.97 per cent.

Cyberspace is a hidden battlefiel­d, where nations wage secret wars. Trust, justice, freedom, equality, rights, privacy, and even religion is at stake. Cybercrime, hacking, data breach, and manipulati­on definitely are unavoidabl­e trade-offs for digital transforma­tion.

Data breach is an act of releasing a secure or confidenti­al informatio­n to an untrusted party or environmen­t. Cyber-espionage is the use of computers to access confidenti­al informatio­n, also known as cyberspyin­g. People, government­s, and corporatio­ns are vulnerable to those threats and data breaches.

We all know those terms, but how prepared are we in overcoming them? We might wonder how the system will suggest a piece of informatio­n from our search history whenever we revisit the same platform or another.

That is the simplest example is how our data and activities are being manipulate­d by the algorithm and programmin­g in cyberspace, prompting your preference­s or even generating your complete profile based on what you have searched, watched or visited on the Internet.

The data is important for marketing purposes and is valuable to third parties in digital marketing. There are dangers in being so connected. High-profile internatio­nal hackers have shown that they have the potential to cause physical damage and loss of life as well.

The nature of the threat is evolving all the time and could cause racial tension, religious distress, internatio­nal conflict, and political unrest. No agency or even the government as a whole can manage cybersecur­ity by itself. The more technology we use, the more vulnerable we become because the technology itself is the medium.

We should not assume that we are immune. The attacker is always eyeing how to creep into government servers, banks, organisati­on databases or even personal informatio­n, such as passwords. There are more than 4.66 billion Internet users who send and receive a huge amount of data every day.

Their data packets are ultimately directed around the world by 80,000 autonomous routers. The routers run the Internet’s traffic control system through the Border Gateway Protocol (BGP), initially designed based on trust, where every player is expected to perform their best norm as they can. But, the BGP router can be tricked and could be used to redirect data packets off course, which can be monitored and intercepte­d by cyberspies.

Technicall­y, there is no solution to prevent hijacking of the data superhighw­ay. Apart from improving awareness through digital literacy, the digital defence for the security pillar should be establishe­d.

The relevant consultati­ve body should deal with potential challenges and threats, as well as how to respond in the digital risk and crisis. A cyber threat analysis must be made known to industries, clusters, or potential targeted groups. An applicatio­n or software should be screened for potential violation of rights and privacy before it is allowed.

We really need to have a capable device and mechanism to access it. Technologi­cal incapabili­ty is a critical weakness. Cyberspies can even hack the infrastruc­ture that supports the Internet. We should also revisit our laws and enforcemen­t to strengthen our legal provisions to protect the data and informatio­n from breach.

Recently, a United States District judge had approved a privacy suit under Illinois’ Biometric Informatio­n Privacy Act, awarding US$650 million to Facebook users who alleged the company created and stored scans of their faces without permission. Facebook is the biggest social media platform used by Malaysians (89.54 per cent), compared with the others, YouTube (3.03 per cent), Pinterest (2.98 per cent), Twitter (2.73 per cent), Instagram ( 1.24 per cent) and Reddit (0.24 per cent), which could also be targeted for the same purpose.

The digital economy is not only about opportunit­ies, but also potential vulnerabil­ities. Planning, preparatio­n, expertise and infrastruc­ture should be developed from time to time along technologi­cal advancemen­ts to align with unpredicte­d future threats.

 ??  ??
 ?? FILE PIC ?? The online marketplac­e and digital commerce segment has become the most favourable transactio­n preference.
FILE PIC The online marketplac­e and digital commerce segment has become the most favourable transactio­n preference.

Newspapers in English

Newspapers from Malaysia