- MISSING MH370: Man claims possible sighting of airliner
- MISSING MH370: Raja Bomoh arrives to help find missing plane
- MISSING MH370: Investigators chasing 'every angle'
- MISSING MH370: How can jet disappear?
- MISSING MH370: Pilot: I established contact with plane
- MISSING MH370: Boeing joining Malaysia crash investigation
- MISSING MH370: Mystery deepens as oil, debris links ruled out
- UPDATE: Missing aircraft's pilot makes contact, rescue mission resumes
- MISSING MH370: A missing plane and emotional reunion on Twitter
- MISSING MH370: China 'deploys satellites' in search for Malaysia plane
- MISSING MH370: Help from bomohs must be in accordance to Islam
- MISSING MH370: MAS to allocate 31,000 Yuan financial assistance
- MISSING MH370 : Businessman who cancels flight shocked over missing MAS plane
- MISSING MH370: Timeline of flight MH370
- MISSING MH370: No objects found More
M'sia needs to produce own cyber security software
KUALA LUMPUR: Malaysia needs to produce its own cyber information security software as depending on foreign software may risk information leaks and intelligence breaches, said a software expert here today.
Universiti Putra Malaysia (UPM) Computer Science and Information Technology Faculty dean Prof Dr Ramlan Mahmod said infiltration could happen covertly as currently there was a lack of understanding on source code logic streams used by foreign software.
"At the moment, there is no software capable of checking the source code of software to ensure the software used is confirmed safe.
"For the realisation of this information technology, the country needs to acquire 'technical knowhow' in information security and expertise in various fields such as computer science, mathematics and engineering," he told Bernama.
He said to acquire the expertise, the nation needed to carry out the foundation work such as training more experts in information technology and by bringing in more external technologies into the country.
Dr Ramlan said information leaks could happen in two situations, that is when the data was in transmission and hacking of existing data in storage.
"To prevent hackers from attacking data in transmission or unauthorised access to data storage, the information could be encrypted or hidden.
"This is the basis of information and software development important to ensure our cyber defence," he said.
He said the government needed to play a major role to set up a strong system of cyber defence as it needed financial commitment, expertise, legislation and continuous monitoring.
"Cyber security is the same as national security involving many operational aspects such as prevention, defence, detecting, intelligence and attack.
"It also needs sophiscated technical knowledge in information security and continuous upgrading of capability considering hackers are also improving their attacks," he said. -- BERNAMA