Artificial Intelligence Knowledge
Artificial Intelligence Knowledge
is
Presenting
Artificial Intelligence
better protection against
Frauds and Cyber attacks
WORLD
INDONESIA
41%
INDONESIA
INDONESIA
33%
INDONESIA
INDONESIA
155%
INDONESIA
INDONESIA
INDONESIA
INDONESIA
$228
INDONESIA
Source: https://www.identityforce.com/blog/2016-data-breaches
HAVE BEEN HACKED
International Olympic Committee, Exxon Mobil, Baker
Hughes, Royal Dutch Shell, BP, ConocoPhillips,
Chesapeake Energy, BG Group, ArcelorMittal, Coca-Cola…
Source: https://www.thestreet.com/story/13927497/1/all-companies-have-been-...
HAVE BEEN HACKED
AND THEY LOST
Taiwan Bank LOSS $ 60 Million
Bangladesh Bank LOSS $ 81 Million
Italia Bank 400.000 Accounts Attacked
British Bank £ 650 MILLION
Russian Central Bank RUB 2 Million
Tesco Bank £ 2,500 Million
Indonesian Banks Rp 130 Milliar
Danamon Bank Rp 400 Million
BRI MATARAN Bank Rp 1,500 Million
CIMB Niaga Bank Rp 121 Million
…
FRAUDS
It is very easy to understand that card payment system is quite vulnerable, when
one considers the complexity of its operation.
cardholder
Scheme
portal
software
vendor
card itself
(payment brand's
issuer
network) (buyer's bank)
hardware
merchant manufacturer
processors Acquirer
(the merchant's
bank)
Vulnerabilities
Payment by cards is made in two stages
Gateway Acquirer
Routes Transmits
request request
Issuer
Checks
available
credit of founds
Merchant’s Cardholder
payment hardware Swipes the
Accepts and transmits card
the card data
Vulnerabilities
2. DUE TO THE DIFFERENT STATES OF THE DATA
Data that are transferred from the POS are at different times in different states.
In transit, at rest or stored.
Data IN MEMORY
they are stored in the memory of the seller's computer.
Data AT REST
They are queued for a shorter or longer period on the hard disk (data base or
log files) while waiting to be processed.
Data IN MOTION
They travel during their transfer via LAN or serial connection.
Vulnerabilities
Key vulnerability areas
Retail Store Payment Processor
Data in memory Data Center
Data in transit
Application code
Data at rest
POI Device
FRAUDS
Al PASCAL, senior vice president, research director and head of fraud & security,
Javelin Strategy & Research
It is in this perspective of total security that
PT SYDECO has created
SST
SST ©
SST
SST SYSTEM
Recipient
Recipient requests access to
his vault
Server sends I.A.
Recipient to the
application of the I.A. DNA XYZ
The message will stay in Recipient
the vault of the Recipient
Thanks to his I.A., Recipient can read
The message can be automatically destroyed the message on his interface
Information Memorandum
SSP
BECAUSE
PT SYDECO
Has created
SSP© is an innovation in the back-end infrastructure of payments and in the financial inclusion
allowing small actors to access to the financial services.
SSPcl
SSPcl is a totally new concept in the system of payment, contactless, using Smartphone without
any bank or credit card (without any scheme) and absolutely secure as there is no transfer of
sensitive data such as identity, account number, .... It authorizes peer 2 peer payments, cash and
immediate transfer, payment of invoices, quick payment and plenty of other financial and
business possibilities that are very useful in the active life for the professionals and the
consumers.
SSPsc
SSPsc makes affordable for everyone, at low cost, the mobile payment service. Everyone can
have an e-wallet and make mobile payment even without Smartphone, and therefore access the
financial services using just a mobile phone in order to improve their live and livelihoods.
SSP© is protected by
System
Main server is :
STRONG
AUTHENTICATION
PROTECTED BY SST©
No transmission of personal data
No intermediary
Asymmetrical & Parallel System
One Way
System
Payement P2P
Transfer
B2B & B2C
E-Commerce
Withdrawal
POS POS
Tablet
One Wallet
BNI
BRI BCA
6 BANKS
1 WALLET
MANDIRI DANAMON
UOB
Archangel
ARCHANGEL
ARCHANGEL is a Smart Box that creates an internal network within a
company or office and through which all data transmitted via the
internet, either via WIFI or cable, must pass.
IA 1 IA 2 IA 3
in order to study the evolution of the attacks and anticipate the future ones
Archangel
ARCHANGEL
ARCHANGEL is protected by
Archangel
COMPARATIVE
TECHNICAL SHEET
McAfee Network Security Platform
Archangel FortiGate 3600C HP TippingPoint NX S5200NX
NS9100
POWER DEVICE
Nominal Voltage DC 12 V AC 120 / 230 V AC 120 / 230 V AC 120 / 230 V
Frequency Required 50 Hz 50 / 60 Hz 50 / 60 Hz 50 / 60 Hz
Power Consumption
10 Watt 512 Watt 750 Watt 1130 Watt
Operational
POWER
Power Redundancy Yes Optional
MISCELLANEOUS
Rack Mounting Kit Included Included Included
Height(Rack Units) 3m 2m 2m
NETWORKING
SYSTEM REQUIREMENTS
SPEEDS
ENVIRONMENTAL PARAMETERS
Packaged Quantity 1 1 1 1
Compatibility PC Mac, PC PC PC
CABLE DETAILS
SOFTWARE
Type Source Code, Web App & Utilities Drivers & Utilities
GENERAL
PT BLISS OVIS
INDONESIA
• Jl. Perumas, Perumahan Jogja Regency Kav. D. 10,
Yogyakarta 55283
• Tel . (+62) 274- 488.272
• www.syde.co
• https://s6pay.com
• www.sytrasec.com
• www.the-archangel.com