0% found this document useful (0 votes)
152 views45 pages

Artificial Intelligence Knowledge

We are Archangel, an Independent Brand For Cyber Security Product from indonesia Discover Our Product Knowledge in here.... https://www.archangel.id/ https://shop.the-archangel.com/
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views45 pages

Artificial Intelligence Knowledge

We are Archangel, an Independent Brand For Cyber Security Product from indonesia Discover Our Product Knowledge in here.... https://www.archangel.id/ https://shop.the-archangel.com/
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

PT SYDECO

is
Presenting

Artificial Intelligence
better protection against
Frauds and Cyber attacks
WORLD
INDONESIA

41%

INDONESIA
INDONESIA

33%
INDONESIA
INDONESIA

155%
INDONESIA
INDONESIA

INDONESIA
INDONESIA
$228
INDONESIA

ACCORDING to the recent Google Temasek research

In 2017 e-commerce sales of first-hand goods will reach


US$10.9 billion in gross merchandise value

Up from US$5.5 billion in 2015

Growing 41% CAGR.


REMARK

IF THE USE OF INTERNET IS GROWING FAST

IF E-COMMERCE AND M-COMMERCE ARE ALSO


GROWING THAT FAST

CRIME IS NOT LEFT BEHIND


HAVE BEEN HACKED
UBER 57M ACCOUNTS HACKED (RANSOM PAID $ 100k)
IMGUR 1.7M EMAILS AND PASSWORDS BREACHED IN 2014 HACK
JP MORGAN 83 M customers and small businesses
T-MOBILE 15M personal data stolen
HEALTH CARE SECTOR More than 101 M personal data stolen
ASHLEY MADISON 32M data stolen
HOME DEPOT 53 M email addresses stolen and 56 M payment cards
EBAY 145M users’ credentials and physical addresses
TARGET SHOPPIMG 110 M personal and financial data
US GOVERNEMENT 21.5 M data and 5 M finger prints
...

Source: http:// fortune.com/2015/10/02/heres-whos-been-hacked-in-the-past-two-years/


https://moneymorning.com/2015/10/27/how-many-fortune-500-companies...
http://time.com/money/3528487/data-breach-identity-theft-jp-morgan-kmart-staples/
HAVE BEEN HACKED

Twitter, Facebook, Whatsap, Apple, The Times The Wall


Street Journal, The Washington Post, Linkedin, Oracle,
Dropbox, Snapchat, Verizon, e-mails providers,
Governments (US, Philippines…), Universities…

4.93 million Gmail accounts hacked


500 million Yahoo accounts hacked

Source: https://www.identityforce.com/blog/2016-data-breaches
HAVE BEEN HACKED
International Olympic Committee, Exxon Mobil, Baker
Hughes, Royal Dutch Shell, BP, ConocoPhillips,
Chesapeake Energy, BG Group, ArcelorMittal, Coca-Cola…

“I divide the entire set of Fortune Global 2000 firms into


two categories: those that know they’ve been
compromised and those that don’t yet know.”
(Mr. Dmitri Alperovitch, then McAfee’s vice president for threat research)

Source: https://www.thestreet.com/story/13927497/1/all-companies-have-been-...
HAVE BEEN HACKED
AND THEY LOST
Taiwan Bank LOSS $ 60 Million
Bangladesh Bank LOSS $ 81 Million
Italia Bank 400.000 Accounts Attacked
British Bank £ 650 MILLION
Russian Central Bank RUB 2 Million
Tesco Bank £ 2,500 Million
Indonesian Banks Rp 130 Milliar
Danamon Bank Rp 400 Million
BRI MATARAN Bank Rp 1,500 Million
CIMB Niaga Bank Rp 121 Million

FRAUDS

The first goal of hackers is gain.


Either they take it immediately from the banks or they get
it in the form of ransom, or they steal the private data of
the customers of their direct victims to attack the small
traders and their customers.

The studies showed that what hackers are stealing are


mainly customer names, payment card numbers, email
addresses and passwords, addresses, birth dates, phone
numbers and Social Security numbers.

Each of us is a potential victim


FRAUDS ON INTERNET CARDS – NON
PRESENT
FRAUDS
Vulnerabilities
IN THE SHOP
CARDS ARE PRESENT

It is very easy to understand that card payment system is quite vulnerable, when
one considers the complexity of its operation.

1. DUE TO THE NUMBER OF HUMAN OR MECHANICAL


FACTORS THAT ARE INVOLVED

cardholder
Scheme

portal
software
vendor

card itself
(payment brand's
issuer
network) (buyer's bank)
hardware
merchant manufacturer

processors Acquirer
(the merchant's
bank)
Vulnerabilities
Payment by cards is made in two stages

The first stage


Is the most dangerous because it is during this phase that sensitive authentication data is
transmitted from the buyer to the seller.
This is the authorization phase during which sensitive data passes through interfaces that
communicate with the outside world (POI Device, POS, Payment Processor Link) and
Processing Modules that perform the transfer and storage of sensitive data on hard disks
(Router, S & F, TOR, Batch).

The second stage : the settlement phase


which is the second phase without transmission of sensitive data, therefore less
dangerous.
Vulnerabilities
The authorization phase

Gateway Acquirer
Routes Transmits
request request

Multiple Processor Multiple Processor


Routes Routes
request request

Merchant’s Payment brand’s


payment software
Processes payment
network Scheme
Transmits request
Transmits request

Issuer
Checks
available
credit of founds
Merchant’s Cardholder
payment hardware Swipes the
Accepts and transmits card
the card data
Vulnerabilities
2. DUE TO THE DIFFERENT STATES OF THE DATA

Data that are transferred from the POS are at different times in different states.
In transit, at rest or stored.

Data IN MEMORY
they are stored in the memory of the seller's computer.

Data AT REST
They are queued for a shorter or longer period on the hard disk (data base or
log files) while waiting to be processed.

Data IN MOTION
They travel during their transfer via LAN or serial connection.
Vulnerabilities
Key vulnerability areas
Retail Store Payment Processor
Data in memory Data Center

POS Machine Application code


& configuration Data in transit
Memory
Payment-
Payment Processing
Application Host

POS App Data in transit

Hard Drive Data in transit

Data in transit
Application code

Data at rest
POI Device
FRAUDS

« To successfully fight fraudsters, the


industry needs to close the security gaps,
continue to improve and consumers must
be proactive. »

Al PASCAL, senior vice president, research director and head of fraud & security,
Javelin Strategy & Research
It is in this perspective of total security that
PT SYDECO has created
SST

BECAUSE THE KEYS USED TO ENCRYPT DOCUMENTS OR


MESSAGES ARE WHAT THE HACKERS ARE LOOKING FOR IN A
COMPUTER, PT SYDECO HAS CREATED A SYSTEM OF
PROTECTION BASED ON ARTIFICIAL INTELLIGENCE THAT IS
NOT USING ANY KEY TO PROTECT DATA. THIS SYSTEM IS

SST ©
SST
SST SYSTEM

SST© a new product resulting from the


research of PT SYDECO, is the intelligent
system that makes cryptography an obsolete
means of protection. SST© allows you to
safely store, send and receive unencrypted
data on and from a mobile phone or any other
mobile or non-mobile device, such as a These data have the same degree of security that a
computer, using the internet to do so. quantum computer confers to fiber optic cable
transport in the sense that if interception occurs, the
message becomes unreadable: with SST©, the
message that is sent automatically evaporates if it is
intercepted or if it reaches the wrong destination. The
same applies if an unauthorized person tries to
appropriate or read the message.

The system is equipped with intelligent


agents that protect data either
automatically or on demand, which keeps
them safe from any intrusion and / or
sends them.
SST
The protection of data is conferred by their
transformation into writings in the form of
progressive waves of lengths and colors
varying according to the content they carry
or contain

The intelligent agent of the transmitter


protects the data and writes them as waves,
while the intelligent agent of the receiver
replaces the data in the original text for
reading before saving them if required.
These intelligent agents are not likely to be
corrupted or attacked because they are not
located in the mobile medium or in the
computer.
SST may also protect the content of
telephone conversations in the same way.
SST
Server is sending to the
The Sender wants sender his own
to send a Intelligent Agent
message identified by his DNA
I.A. DNA
ABC
The Intelligent Agent The Sender types the
translates the message message on a virtual
and writes the message keyboard
under the form of waves

The Sender is sending his message to


the Server
The I.A. is going back with the
message

Server translates the message in a The Server stores the


language known by the I.A. of the message in the vault of
Sender
Recipient and stores it in the vault the Sender which is in a
of the Recipient which is in a protected area, and
protected area where it will stay

Recipient
Recipient requests access to
his vault
Server sends I.A.
Recipient to the
application of the I.A. DNA XYZ
The message will stay in Recipient
the vault of the Recipient
Thanks to his I.A., Recipient can read
The message can be automatically destroyed the message on his interface
Information Memorandum
SSP

BECAUSE

THE PAYMENT SYSTEM BY CARD IS HIGHLY VULNERABLE

THE MOBILE SUPPORTS ARE HIGHLY VULNERABLE


SSP

PT SYDECO
Has created

For ONLINE and IN SHOP shopping


SSP
SSP©

SSP© is an innovation in the back-end infrastructure of payments and in the financial inclusion
allowing small actors to access to the financial services.

SSPcl
SSPcl is a totally new concept in the system of payment, contactless, using Smartphone without
any bank or credit card (without any scheme) and absolutely secure as there is no transfer of
sensitive data such as identity, account number, .... It authorizes peer 2 peer payments, cash and
immediate transfer, payment of invoices, quick payment and plenty of other financial and
business possibilities that are very useful in the active life for the professionals and the
consumers.

SSPsc
SSPsc makes affordable for everyone, at low cost, the mobile payment service. Everyone can
have an e-wallet and make mobile payment even without Smartphone, and therefore access the
financial services using just a mobile phone in order to improve their live and livelihoods.

SSP© is protected by
System

Main server is :

No sensitive data in the Mirror


- Highly protected application
- Isolated from Internet No data in the Customers' money is in
Smartphone the bank of the Customer
No data trace in the
Confidentiality memory of the REAL TIME
Off line Integrity Smartphone
Availability No direct transaction
between Customer and
Seller

STRONG
AUTHENTICATION
PROTECTED BY SST©
No transmission of personal data
No intermediary
Asymmetrical & Parallel System

One Way
System

Payement P2P
Transfer
B2B & B2C

E-Commerce
Withdrawal

Shopping Real Time

POS POS
Tablet
One Wallet
BNI

BRI BCA
6 BANKS
1 WALLET

MANDIRI DANAMON

UOB
Archangel
ARCHANGEL
ARCHANGEL is a Smart Box that creates an internal network within a
company or office and through which all data transmitted via the
internet, either via WIFI or cable, must pass.

Its function is to protect all computers or other mobile devices


belonging to this network against cyber attack from outside and to
protect each computer belonging to this network against the spread
of a virus or a worm from an infected computer to another computer
on the network.

ARCHANGEL is equipped with 3 INTELLIGENT AGENTS, 2 BRAINS, 3


FIREWALLS, to stop the maximum of attacks and to impeach the attacks
that could penetrate the BOX to send back any information to the hacker, a
ROUTER and 2 SWITCH, each part of it being made by PT SYDECO.
Archangel
ARCHANGEL
ARCHANGEL is a SMART BOX because it has 3 INTELLIGENT AGENTS (IA) and 2 e-learning
Machines :

IA 1 IA 2 IA 3

In the HONEYPOT who Who is Who receives


is analysing the data filtering the the result of the
and sending data and analysis made
their characteristics to transferring by BRAIN 1 and
BRAIN 1 (e-learning them to integrates them
Machine) in order to the in the system of
be studied SWITCH protection
Archangel
ARCHANGEL

SERVER 1 (BRAIN 1) is transferring the characteristics to SERVER 2 (BRAIN 2)

in order to study the evolution of the attacks and anticipate the future ones
Archangel
ARCHANGEL

ARCHANGEL is the latest from PT SYDECO technology, a 100%


Indonesian product. Together with SSP© (Secure System of
Payment) and SST© (Secure System of Transmission), ARCHANGEL
constitutes the best arsenal of protection for internet users, the
best defence against all CYBER ATTACKS.

ARCHANGEL is protected by
Archangel
COMPARATIVE
TECHNICAL SHEET
McAfee Network Security Platform
Archangel FortiGate 3600C HP TippingPoint NX S5200NX
NS9100

POWER DEVICE
Nominal Voltage DC 12 V AC 120 / 230 V AC 120 / 230 V AC 120 / 230 V
Frequency Required 50 Hz 50 / 60 Hz 50 / 60 Hz 50 / 60 Hz

Power Consumption
10 Watt 512 Watt 750 Watt 1130 Watt
Operational

POWER
Power Redundancy Yes Optional
MISCELLANEOUS
Rack Mounting Kit Included Included Included
Height(Rack Units) 3m 2m 2m
NETWORKING

Remote Management Protocol HTTP, SNMP, SSH HTTP, SNMP

Alarm, Fan, Link/Activity, Power,


Status Indicators Power, Fan, eth
Status

Network / Transport Protocol TCP/IP IPSec

IPv6 support, IPv4 support, triple


IPv6 support, IPv4 support, NAT
firewall protection, IDS, IPS, VPN,
Support, VPN acceleration Intrusion Detection System (IDS),
Features Honeypot, Intrusion Prevention System (IPS)
capability, VPN support, firewall Intrusion Prevention System (IPS)
Artificial Intelligence,
protection, traffic shaping
NAT support, Log Attacker

Connectivity Technology Wired Wired Wired Wired


Archangel
COMPARATIVE
TECHNICAL SHEET
SECURITY

Secure System of Transmission 256-bit AES, SHA-1, SSL,


Security RSA, AES, Triple-DES, SHA-1 SHA-256
(SST) TLS 1.2

SYSTEM REQUIREMENTS

Apple MacOS X 10.6 or later,


OS Required Linux OS
Microsoft Windows Vista / XP / 7 / 8

SPEEDS

Data Transfer rate 2 Gbps 1 Gbps 3 Gbps 1 Gbps

Firewall 125 Mpps 90 Mpps

ENVIRONMENTAL PARAMETERS

Min Operating Temperature 68 oF 32 oF 32 oF 32 oF

Max Operating Temperature 122 oF 104 oF 104 oF 95 oF


Archangel
COMPARATIVE
TECHNICAL SHEET
HEADER

Brand Sydeco Fortinet HP McAfee

Product Line Archangel Fortinet FortiGate HP TippingPoint NX Network Security Playform

Model - 3600C S5200NX NS9100

Packaged Quantity 1 1 1 1

Compatibility PC Mac, PC PC PC

CABLE DETAILS

USB Cable, Console Cable, Network


Type Network Cable, VGA Cable
Cable

SOFTWARE

Type Source Code, Web App & Utilities Drivers & Utilities

DIMENSIONS & WEIGHT

Width 5.11 in 17.5 in 16.8 in 17.2 in

Depth 5.11 in 21.7 in 21.8 in 28.8 in

Height 2.69 in 5.2 in 3.5 in 3.4 in

Weight 48.68 lbs 42.11 lbs 67.02 lbs

GENERAL

Manufacturer Sydeco Fortinet HP McAfee


THEY TRUST US

PT BLISS OVIS
INDONESIA
• Jl. Perumas, Perumahan Jogja Regency Kav. D. 10,
Yogyakarta 55283
• Tel . (+62) 274- 488.272
• www.syde.co
• https://s6pay.com
• www.sytrasec.com
• www.the-archangel.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy