You are on page 1of 4

THE STAR, TUESDAY 16 APRIL 2019

COURSE FOCUS
Entangled in the web
By SRIMAYEE SEN SARMA

“WHEN talking about technology, rarely do


we acknowledge that it also has a dark side.
It is a double-edged sword that comes with
security challenges in the form of cyber
threats,” says CyberSecurity Malaysia chief
executive officer Dr Amirudin Abdul Wahab.
“Cybercrime is a fast-growing area of
crime and with the advancement of
technology, people are exploiting the speed,
convenience and anonymity of the Internet
to commit a diverse range of criminal
activities.”
Gone are the days when cybercrimes
were mostly committed by lone computer
wizards who may have done the deed purely
out of mischief or in a bid to show off.
Cybercrime has now grown to become an
organised industry with customised, easily
accessible tools for hackers to make easy
money.
Take for example, the Bangladesh Bank
heist, where US$101mil (RM411mil) was
reportedly stolen when attackers used
custom malware to transfer the money and
hide their tracks. Or the massive data breach
in 2017 that saw the personal information of
46.2 million Malaysians leaked online,
marking it the biggest cybercrime in local
history.
Such attacks, leaks and hacks are
becoming increasingly common, so much so
that Cybersecurity Ventures – an American
research company that provides global
cybersecurity facts and figures – predicts
that by 2021, the world will face an
estimated loss of US$6 trillion (RM24.5 With the increase in data hosted in the digital world, it only makes sense that we need cybersecurity experts to protect and manage that
trillion) annually, up from US$3 trillion data appropriately.
(RM12.2 trillion) in 2015.
While there are experts who understand for dedicated cybersecurity experts will years, there has been a stubborn shortage of professionals is vast, from purely technical
cyberspace and use technology to fight for decrease anytime soon. cybersecurity professionals. With the work to analytics and management. Unlike
the safety of all Internet users, there is a dire Malaysia is heading towards a digital business direction of almost every industry what many believe, cybersecurity
need for more such professionals. economy as well, and as emphasised by moving towards adopting digital professionals do not just design and install
Cybersecurity Ventures estimates there will National Cyber Security Agency chief technologies for business efficiency, we antivirus software and put up robust
be around 3.5 million unfilled cybersecurity executive Md Shah Nuri, “In order to foster expect the demand to only increase.” firewalls to protect a network. It is a wide
positions worldwide by 2021, and although it a digital economy, we need to establish the field and covers other jobs, such as policy
is predicted that all university courses will
include modules on cyber safety in the near
right ecosystem for a resilient cyberspace,
and cybersecurity plays a significant role in
The rise of the protectors creation and governance, as well.

future, it is highly doubtful that the demand supporting this ecosystem. For the past few The job scope of cybersecurity > TURN TO PAGE 2

Forefront of innovation
THE emergence of artificial intelligence (AI) consumers and retailers, who can use the
is expected to drastically change our lives in Cashierbook platform to carry out authentic
the not too distant future. Some terms that online transactions through blockchain
were once considered jargon such as big verification and use social media analytics
data, machine learning and Internet of to provide intelligent recommendations for
Things will soon impact our lives and a targeted and effective e-commerce
redefine the way we work. This is a global experience.
phenomenon and the only way forward is to TAR UC Bachelor of Computer Science
embrace and capitalise on it. (Hons) student Johnson Chin See How is
Against this backdrop, Tunku Abdul part of the team currently managing the
Rahman University College (TAR UC) has Cashierbook app, which went live in August
taken the step to embrace technological last year. “This is a fulfilling part of my
innovation through the establishment of its student life because I am gaining valuable
Integrated Innovation Hub (I² Hub), which experience by helping manage and
was launched on Aug 1. The I² Hub will help troubleshoot an actual mobile app.
TAR UC synergise the latest developments in Although I have prior experience in
technology towards enhancing the education developing apps through my coursework
and learning experience. By integrating assignments, it is not the same as actually
relevant expertise from different faculties managing an app that has gone live on
within TAR UC, the hub acts as a catalyst Android and iOS. People are using the app
where creative innovations and ground- and there is a lot of expectation in ensuring Johnson Chin (left) in a discussion with his Cashierbook team members at TAR UC’s
breaking applications are discovered, the app is constantly functioning well. The Integrated Innovation Hub.
especially in its four areas of focus – Smart demands are high but I believe my fellow
Campus for Education 4.0, Industry 4.0, team members and I are well guided by our Industry 4.0 solutions. Through the analytics and AI applications in the supply
Agriculture 4.0 and Corporate Social lecturer, Dr Tang Tiong Yew, who is the collaboration of expertise from different TAR chain, Kian Joo will move closer to the goal
Responsibility. main lead for Cashierbook. UC faculties, the area of focus is in creating of becoming the first local industry player
Through the hub, TAR UC students have “On top of this, a lot of technical and utilising Industry 4.0 solutions, including in Malaysia to fully adopt Industry 4.0,”
the opportunity to work hand-in-hand with knowledge and skills we have gained from machine-to-machine communication, big says Ang.
their lecturers in real-world industry and our degree programme has helped us a lot data analytics and incorporating AI into the
research projects, which expose them to the when managing the app. For instance, the decision-making processes in businesses. n Explore TAR UC’s industry-relevant
latest trends and developments taking place Software Evolution and Maintenance For example, Kian Joo Can Factory Bhd programmes at TAR UC’s Open Day from
in the workplace today. subject in my degree programme helps me has engaged TAR UC’s expertise to increase now until Apr 28, from 9am to 5pm at
Cashierbook is a project under the I² Hub understand the technical problems users efficiency and productivity in its production TAR UC campuses in Kuala Lumpur,
and involves the participation of TAR UC face and how to troubleshoot those line. Kian Joo general manager Ang Kok Jun Penang, Perak, Johor, Pahang and Sabah.
students. It is an app that uses social media problems,” he says. has expressed confidence that the Attractive scholarships are also available
analytics and blockchain technology to TAR UC’s I² Hub has also paved the way partnership will achieve the factory’s goal of in TAR UC on the basis of academic merit
enable fast and secure e-commerce for it to provide consultancy services to implementing Industry 4.0 in its operations. and sibling discount for qualified students.
transactions. Its target users are end- industries in implementing real-time “Through TAR UC’s support in big data Alternatively, visit www.tarc.edu.my
2 Computing, Technology, Arts & Design THE STAR, TUESDAY 16 APRIL 2019

Dynamic and ever-changing field


> FROM PAGE 1 Computing, believes that a course
in cybersecurity can only provide
Cybercrimes can only Apart from working as technical basic technical knowledge.
be properly handled support, cybersecurity experts can “Degree programmes equip
In the field of
when the wider public also work as: students with the fundamental cybersecurity, what’s
is educated about l Testers, whose job is to find knowledge required to enable
more important
threats and maintaining loopholes in the security system, students to have a solid base for
safety in cyberspace. so they must know how to hack, in starting their career in is the ability and
addition to understanding hacking
l Trainers, who educate people
cybersecurity, but it is a dynamic
field where new things pop up
interest to constantly
on cybersecurity almost daily. Hence, there is a learn. Cybersecurity
l Researchers, who are
responsible for finding out the
need to constantly learn and
relearn in order to stay relevant.”
professionals move
best and latest protection methods Shah agrees, saying, “Those across sectors and
l Sleuths, to investigate
cybercrimes and catch criminals
interested in the field of
cybersecurity should develop
often need to quickly
l Lecturers, who are professors foundations in network, learn and understand
of cybersecurity programming, system and
application knowledge in order
the business
For students aspiring to pursue to understand the components processes within an
this challenging career, there are within the cyber infrastructure. organisation before
many universities in Malaysia “That said, in the field of
offering courses in cybersecurity, cybersecurity, what’s more they can identify
but Syed Zainudeen Mohd Shaid, important is the ability and security risks and
senior lecturer at Universiti interest to constantly learn.
Teknologi Malaysia’s School of Cybersecurity professionals move form treatment plans.
across sectors and often need to
quickly learn and understand the Md Shah Nuri
business processes within an
organisation before they can
identify security risks and form
treatment plans. A sense of mechanisms, end to end. This
inquisitiveness, good analytical includes choosing strong
thinking and passion will go a authentication for online access,
long way.” not clicking on phishing links,
Dr Amirudin adds, “We are and avoiding public Wi-Fi for
already working with complex online banking and other
technologies such as cloud financial transactions.”
computing, Internet of Things Dr Amirudin believes that this
and Big Data, and it will get even holds especially true in an
more complex with emerging organisational setting.
trends of fintech, blockchain, Individuals need to be made
artificial intelligence and aware of the different kinds of
autonomous vehicles, so we need cyber threats so that they can
a diversified cybersecurity protect their workstations and, in
workforce that will be able to turn, enforce protection for the
respond to the increasing entire organisation.
number of cyber attacks.” “If an organisation thinks that
This can only be achieved it is protected because it has high-
when there is close collaboration end antiviruses and firewalls in
between education institutes, place, it cannot be more wrong,
industries and government because an organisation’s
bodies, ensuring that emerging weakest link is its people.”
talents in this field are trained For instance, attacks and
and guided in the right direction. exploits can occur if an employee
Syed Zainudeen believes clicks on a malicious link in an
cybersecurity courses in email, website or application
Malaysia are mostly at basic or advertisement. It can lead to
intermediate level, but are on par various types of malware
with international standards. infection, such as ransomware,
However, with the number of which locks down files or
Internet users growing at an devices, a Trojan virus, which
unprecedented rate, it is not steals credentials, and
humanly possible for the handful cryptomining malware, which
of security professionals to uses up computing resources.
safeguard all. As Dr Amirudin “In complex cybercrime cases,
points out, “With the current there are multiple actors
risks, threats and number of involved in the scam, malware
attacks, cybersecurity approach distribution, remote command
is no longer only technical, but and control and financial
also holistic, which includes a lot transactions. The crime scene, so
of people and processes too.” to speak, is spread across
multiple end-users’ devices, third-
Everyone is responsible party applications and cloud-
based services, which require
Organised cybercrime speed and cooperation from the
uses technology and social various parties involved,” says
engineering to lure online users Shah.
to click on freebies, too-good-to- “We foresee greater challenges
be-true deals and fake content in with the adoption of Internet of
hopes of embedding malicious Things, Industry 4.0 and
software that can compromise a digitalisation in the Critical
device’s security settings and National Information
steal users’ personal information. Infrastructure.”
Looking at these, the protective Looking at these challenges,
approach cannot depend on a cybersecurity experts definitely
handful of experts alone, rather, have an uphill task ahead of
it should include every single them. From keeping up with
entity that is a part of cyberspace. security threats to developing
Both Shah and Dr Amirudin advanced security software and
reveal from their experiences picking up online scams, they
that the wider public is quite now have an additional task of
naïve about cybersecurity and educating the public.
cyber threats, thus the need to Dr Amirudin and Shah believe
educate audiences on their roles Malaysia has what it takes to rise
in strengthening cybersecurity. to these challenges. The only
Shah stresses, “The challenge is thing missing from the equation
in minimising the risk with the is more experts who can join the
use of multilevel defence battle.
THE STAR, TUESDAY 16 APRIL 2019 Computing, Technology, Arts & Design 3
Nilai University

Fulfilling
aims to produce
competent IT and
computer science
graduates who are
knowledgeable

the demand
about the industry
but versatile enough
to adapt to the
changes Industry
4.0 will bring.
JACK Ma, founder of Chinese
behemoth e-commerce platform
Alibaba, said that technology
exists for people. How will There are gaps in
computer science and
information technology (IT)
employment waiting
contribute to the betterment of to be filled in the IT
our lives?
Organisations depend on
industry, both locally
computer science and IT and internationally.
professionals to create systems
and networks that will securely
Malaysia is still not
process, transmit, store and producing enough
exchange all forms of electronic graduates to meet
data. Evidently, it has
revolutionised the very fabric of the demand, but
society. Nilai University
In an Edge Financial Daily
article titled M’sia expected to certainly hopes to
spend US$17.6b on technology in fulfil at least part
2018, International Data
Corporation Malaysia research of it.
director Pranabesh Nath
mentioned that by 2021, at least
20% of Malaysia’s gross domestic creative thinking courses with
product will be digitised. emphasis on skills development
in the technical areas of
School of Computing computer hardware and
software architecture,
Nilai University offers the including the design of
Diploma in Business Information technological information and
Technology and Diploma in computing systems as solutions
Computer Science, both of which to business support.
are internationally recognised. l Bachelor of Information
The first offers students a Technology (Hons) (Internet
balanced curriculum of business Engineering and Cloud
knowledge and IT literacy, while Computing) – Emphasises the
the second prepares students to concept and fundamental
execute a wide range of services, principles of Internet
including software analysis and engineering and cloud
management, database computing. Students will be
administration and design, equipped with the knowledge
programming, and web, and skills necessary to plan,
multimedia and systems design, implement, manage
development. and maintain computer
The entry requirements for networking of cloud and
either option are: Internet, as well as security
l Sijil Pelajaran Malaysia – components of both.
Three Cs, including one in
mathematics School of Computing head
l Unified Examination Harlina Harun shares, “In the
Certificate – Three Bs, including final year, undergraduate
one in mathematics students are required to
l Sijil Tinggi Pelajaran conduct research and submit a
Malaysia/A-Levels – One C and final-year project where they
one credit in SPM Mathematics will apply and develop
l Sijil Kemahiran Malaysia/ innovative processes in image
Sijil Kecekapan Kemahiran/ processing, speech processing,
Malaysian Qualifications data science, cloud computing,
Framework Level 3 certificate security, machine learning,
in a related field – Pass either game and animation software
certificate as well as SPM, with tools, decision support systems
one credit in SPM Mathematics and networking. Final-year
students will also undergo 16
Both programmes take 2.5 weeks of internship.”
years to complete and are Harlina adds that IT jobs are
equivalent to the first year of the available in almost any
three bachelor’s programmes industry, including education,
listed below. Diploma graduates aviation, medicine, military,
proceed directly to year two of hospitality, tourism and
the bachelor’s programmes. finance. More importantly, IT
l Bachelor of Computer graduates will have the know-
Science (Hons) (Software how to be self-employed.
Engineering) – Aims to provide However, there are gaps in
students with a solid foundation employment waiting to be filled
of the concept and underlying in the IT industry, both locally
principles of software and internationally. Malaysia is
engineering. The syllabus still not producing enough
contains more software-related graduates to meet the demand,
courses and places greater but Nilai University certainly
emphasis on cultivating hopes to fulfil at least part of it.
understanding of and Nilai University has intakes
experience in the software in April and May. Up to 100%
process. This programme equips scholarships await, so enquire
students with the knowledge today.
and skills necessary to analyse,
design, develop, test and n For more information, call
implement, evaluate, maintain Nilai University’s education
and document large-scale counsellors at 06-850 2308
software systems. (Monday to Friday, 9am to
l Bachelor of Information 5pm) or visit www.nilai.edu.my.
Technology (Hons) – Provides Alternatively, visit the campus
students with technical and in Nilai.
4 Course Focus THE STAR, TUESDAY 16 APRIL 2019

Introducing
order and
structure in
Internet forums
SIFTING through the Internet’s sea of content the “cold start” problem.
can be exhausting. When you look online for Lim, Carman and Wong’s research could
quality answers, how do you decide what to improve how content is organised in
read? Imagine this challenge in massive websites such as Reddit. The algorithms they
Internet forums such as Reddit, where tested can be used to predict which users will
thousands of new posts and comments are contribute quality content and which ones
submitted by users daily. are malicious and unhelpful. Their study
How can social media sites organise all focused on measuring user expertise, with
this content so that you, the individual user, the assumption that users of higher expertise
can easily find what’s relevant, accurate or tend to produce content of higher quality.
meaningful? Three Monash University
academics contributed towards answering
this question through their research on
Features to measure user
algorithms. expertise

Using big data to predict good The researchers experimented with


various online features to estimate user
content expertise or ability to produce good
comments. The features were used to deduce
Lim Wern Han from Monash Malaysia, the credit gained by users for their
Mark James Carman from Monash contribution. Information can then be
University Caulfield Campus and Jojo Wong propagated through a statistical pairwise
from Monash University Clayton Campus comparison approach to quantify user
drew on their experience in data science to expertise.
propose and test several algorithms for how Users should be rewarded with higher
well they could predict quality content on scores for posting content that is better than
Reddit, one of the world’s most popular average rather than having their scores
websites. inflated or normalised, as is done by some
They found that it is possible to predict if a Internet forums. Meanwhile, users who
forum user will produce quality comments submit poor-quality or malicious content
in the future by using algorithms that learn should be penalised.
user behaviours over large sets of data. Based on their relative performance, users’
These findings can be applied beyond Reddit posts can be better promoted or restricted by
to other websites such as online question- websites. The identified experts can even be
answering platforms. approached to contribute new quality
This application is especially useful for content or solve complex problems.
websites that lack the manpower of editors
or moderators yet handle thousands of user-
submitted comments.
Quality comments can be
predicted
The Reddit challenge User votes can be used to predict a user’s
The scope of the study was five popular likelihood of submitting quality comments.
subforums on Reddit: Science, World News, The research outcome enables social
Gaming, Explain Like I’m Five, and (the platforms to circumvent expensive
United States) Politics, which encompass processing of natural language and other
300,000 posts and 1.5 million comments. multimedia content. With the high volume of
Given the volume of content, it is a user-generated content today, such
challenge for Reddit users to capability is highly desired.
quickly identify helpful comments Using algorithms, social platforms
in popular discussions, despite can improve how their content is
the voting feature Reddit has. ranked or organised for reader
Users can upvote a comment consumption – resulting in a high
they like or show their density of knowledge on the World
disapproval by giving a downvote. Wide Web.
However, the system is limited in
its ability to identify quality n For information on the programmes
comments and push good content available at Monash University
to the top of the page quickly, Malaysia’s School of
as it takes time for votes Information Technology,
to be collected – visit www.monash.edu.
something known as my/it

Lim and two fellow Monash researchers are paving the way to improved information literacy
and optimisation on Internet forums.

You might also like