CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: A NEW THREAT


A new threat

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about cyberattacks, information systems and networks, iot, cybersecuirity risks, threats and vulnerabilities.

Ruben Gansen

In response to Fujiko Nakayama

Not a day seems to go by without news of another data breach or cyber security threat hitting the headlines. From Talk Talk and Tesco to Adidas and even Fortnum and Mason, no organization is safe. That’s without mentioning wider issues around how organizations are using people’s data.

Facebook and Cambridge Analytica have been under the spotlight, and Google also recently confirmed that private emails sent and received by Gmail users can sometimes be read by third-party app developers, not just machines.

Fujiko Nakayama

Not a day seems to go by without news of another data breach or cyber security threat hitting the headlines. From Talk Talk and Tesco to Adidas and even Fortnum and Mason, no organization is safe. That’s without mentioning wider issues around how organizations are using people’s data.

Bogdana Vankov

Not a day seems to go by without news of another data breach or cyber security threat hitting the headlines. From Talk Talk and Tesco to Adidas and even Fortnum and Mason, no organization is safe. That’s without mentioning wider issues around how organizations are using people’s data.

Sigmund Gerhard

Cyber-security threats affect all industries, regardless of size. The industries that reported the most cyberattacks in recent years are healthcare, manufacturing, finance, and government. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.

Teresa Guerrero

The threats countered by cyber-security are three-fold:

1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption.

2. Cyber attack often involves politically motivated information gathering.

3. Cyberterror is intended to undermine electronic systems to cause panic or fear.

Nikoleta Stavros

Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

Please login or register to leave a response.