Plaque presentation by the UMN Faculty of Engineering and Informatics to Sagi. (Doc. UMN)
Tangerang – UMN’s Faculty of Engineering and Informatics (Fakultas Teknik dan Informatika/FTI) and the Continuing Education Center (CDC) held a guest lecture with Computrade-Tech International. This public lecture discussed “Computer Security: Following The Digital Trail” on Wednesday (05/03/2025). Narrated by Muhammad Sagi Dimarzio as Tech Coordinator of the Security Operations Center.
Computrade-Tech International has been a technology company in Indonesia, the Philippines, and Malaysia since 2003. CDC UMN and CTI formalized a collaboration in 2024. On this occasion, CDC UMN and CTI also carried out a development program, namely guest lectures, this time on computer security.
“What is computer security? In short, most of us have computers, and there are attacks on computers. This specialization is how to protect the computer environment from cyber attacks. We will learn how cyber attacks are carried out offensively and defensively and how to protect the computer infrastructure,” Sagi said.
On this occasion, Sagi also explained the CIA, which consists of Confidentiality, Integrity, and Availability. These three things are important in the aspect of computer security, and all three have an important role in maintaining the database and the confidentiality of a system.
“After learning to maintain data and computer infrastructure, other things need to be maintained, namely authentication, authorization, and accounting. In short, these three are important to record all database assets and maintain records, both track records. With this, we maintain the security of the system that has been created. This is important to do so that if there is a cyber attack at any time, the team can investigate,” Sagi continued.
Sagi also explained the data of industries often victims of cyber attacks, namely technology, which is as much as 23%, followed by other sectors such as consulting, education, healthcare, and many more. This cyber threat can occur due to the development of Human-Operated Ransomware, so criminals take advantage of what already exists.
“Some of the most preferred ways are phishing with links that can be attached via e-mail, SMS, and all social media forms with other chat features. Another cause is not updating software. Even though it looks trivial, it is important, such as public applications and VPNs. Your data can be leaked and spread on the dark web. If information is spread on the dark web, it can be traded”, Sagi continued.
In the computer security industry, there are two teams: red and blue. The attacker is considered the red team, while the one who resolves or anticipates this attack is the blue team. The blue team’s main tasks are building, observing, investigating, and hunting.
“Build is to see what can be installed for web systems, observe to monitor all traffic that occurs in a device company, and then proceed to the investigate stage. If there is an attack, the team must understand the attack scenario, and Hunt is responsible for the monitored infrastructure. All software devices must be checked to see the traces of the actor,” Sagi said.
By Rachel Tiffany Tanukusuma | UMN News Service
English translation by Levina Chrestella Theodora
Kuliah di Jakarta untuk jurusan program studi Informatika| Sistem Informasi | Teknik Komputer | Teknik Elektro | Teknik Fisika | Akuntansi | Manajemen| Komunikasi Strategis | Jurnalistik | Desain Komunikasi Visual | Film dan Animasi | Arsitektur | D3 Perhotelan , di Universitas Multimedia Nusantara.