CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: A NEW THREAT


A new threat

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about cyberattacks, information systems and networks, iot, cybersecuirity risks, threats and vulnerabilities.

Juniper Womack

With the vast amount of data being captured by sensors and devices, transmitted and then stored, you need to ensure that every piece of data is secure and used as the consumer expects throughout its lifecycle. You should consider how you'll get security updates to remote devices. And you should collect only the data you need. Finally, companies should provide notice to consumers of how their data will be used and ideally give them a choice of whether or not to provide that data. The best advice: consider security at the outset, not at the end of the development process.

Gaetano Albertini

SSL is identity verification, not hard data encryption. It is designed to be able to prove that the person you are talking to on the other end is who they say they are. SSL and its big brother TLS are both used almost everyone online, but the problem is because of this it is a huge target and is mainly attacked via its implementation (The Heartbleed bug for example) and its known methodology. As a result, SSL can be stripped in certain circumstances, so additional protections for data-in-transit and data-at-rest are very good ideas.

Professor Dodds

The pervasiveness of data breaches has firmly placed the topic of cybersecurity on the agenda of the Board of Directors. It is part of their responsibility as members of the board to understand the threat landscape, current best practices, and what the company is doing to protect the employees, customers, constituents and shareholders. This has led to the creation and administration of cyber committees, working alongside other risk committees.

David Smith

In response to Varfolomei Krupin

From tweaking web browser extensions and settings, to using VPNs and anonymous search engines; plenty of tools can help you enjoy the fruit of the internet without sacrificing your online privacy.

its true , but should i always hide ? just a question for you , otherwise i agree with you, 

David Smith

In response to Gaetano Albertini

Some governments carry out online surveillance and don’t really allow their citizens to web browse privately. In the UK, the Investigatory Powers Act allows government authorities to legally spy on the browsing and internet use of British citizens.

Its fine you brought up this , but where do you stand on it ? For or against? " In the UK, the Investigatory Powers Act allows government authorities to legally spy on the browsing and internet use of British citizens." thats true unfortunetaly , and im against giving so much power to governemnt over me and my personal life. Its almost the same with the apps in youtube , facebook , instagram , whatsapp etc. True they target you on interest , but to do that they browse and collect information about you. 

Zephyr Brassington

Unfortunately, cyber adversaries have learned to launch automated and sophisticated attacks using these tactics – at lower and lower costs. As a result, keeping pace with cybersecurity strategy and operations can be a challenge, particularly in government and enterprise networks where, in their most disruptive form, cyberthreats often take aim at secret, political, military or infrastructural assets of a nation, or its people.

Bojan Skinner

Social Media Cyber-Bullying is really a serious issue when many of the people unintentionally fall prey to terrorist activities, false claims and cyber crime tending to the extent of even provoking kids and teenagers to commit suicides.

Yasmine Loewen

Cyberspace is notoriously vulnerable to varied and changing attacks by hackers, criminals, terrorists, and state actors. Critical infrastructure, including the electric power grid, air traffic control system, financial system, and communication networks, depends on information technology for its operation and thus is susceptible to cyberattack.

Asclepius Čtvrtník

The computer systems of financial regulators and financial institutions like the U.S. Securities and Exchange Commission, SWIFT, investment banks, and commercial banks are prominent hacking targets for cybercriminals interested in manipulating markets and making illicit gains.Web sites and apps that accept or store credit card numbers, brokerage accounts, and bank account information are also prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the black market.

Mellisa Mckennon

The promise of machine learning in cybersecurity lies in its ability to detect as-yet-unknown threats, particularly those that may lurk in networks for long periods of time seeking their ultimate goals. Machine learning technology does this by distinguishing atypical from typical behavior, while noting and correlating a great number of simultaneous events and data points.

Oberto

Applications used to access Internet resources may contain security vulnerabilities such as memory safety bugs or flawed authentication checks. The most severe of these bugs can give network attackers full control over the computer. Most security applications and suites are incapable of adequate defense against these kinds of attacks.  Here you can learn more about Application Security.

inesa sokoll

Ransomware is the bane of cybersecurity, IT, data professionals, and executives.  Perhaps nothing is worse than a spreading virus that latches onto customer and business information that can only be removed if you meet the cybercriminal’s egregious demands. And usually, those demands land in the hundreds of thousands (if not millions) of dollars.

elvira eva becket

In response to Gaetano Albertini

Some governments carry out online surveillance and don’t really allow their citizens to web browse privately. In the UK, the Investigatory Powers Act allows government authorities to legally spy on the browsing and internet use of British citizens.

The cyber-threats to any nation can range from disruption of an agency's networks or information services to the public to cyber-warfare. Depending on the agency, type of cyber-attack, its scope, duration, and effectiveness, the consequences for the online and offline operation of local, federal, or state government components can range from annoying delays in communications to serious damage to infrastructure threatening life or property.

Varfolomei Krupin

From tweaking web browser extensions and settings, to using VPNs and anonymous search engines; plenty of tools can help you enjoy the fruit of the internet without sacrificing your online privacy.

Gaetano Albertini

Some governments carry out online surveillance and don’t really allow their citizens to web browse privately. In the UK, the Investigatory Powers Act allows government authorities to legally spy on the browsing and internet use of British citizens.

Please login or register to leave a response.