CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: A NEW THREAT


A new threat

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about cyberattacks, information systems and networks, iot, cybersecuirity risks, threats and vulnerabilities.

Arthur Duguay

In response to Clémence Marchal

Privacy and security are related. Privacy relates to any rights you have to control your personal information and how it’s used. Think about those privacy policies you’re asked to read and agree to when you download new smartphone apps.  Security, on the other hand, refers to how your personal information is protected. Your data — different details about you — may live in a lot of places. That can challenge both your privacy and your security.

Some people regard privacy and security as pretty much the same thing. That’s because the two sometimes overlap in a connected world. But they aren’t the same and knowing how they differ may help you to protect yourself in an increasingly connected world.

Clémence Marchal

In response to Liam Richardson

When it comes to privacy vs. security, it’s a good idea to have both. Each can impact your digital health. But what’s the difference?

Privacy and security are related. Privacy relates to any rights you have to control your personal information and how it’s used. Think about those privacy policies you’re asked to read and agree to when you download new smartphone apps.  Security, on the other hand, refers to how your personal information is protected. Your data — different details about you — may live in a lot of places. That can challenge both your privacy and your security.

Liam Richardson

When it comes to privacy vs. security, it’s a good idea to have both. Each can impact your digital health. But what’s the difference?

Claudia Mayer

Cyber security and data privacy may be big issues for businesses of all sizes, but with the right approach and by taking advantage of innovative solutions available to help combat cyber threats, organizations can take back control of their digital lives.

Ruben Gansen

In response to Fujiko Nakayama

Not a day seems to go by without news of another data breach or cyber security threat hitting the headlines. From Talk Talk and Tesco to Adidas and even Fortnum and Mason, no organization is safe. That’s without mentioning wider issues around how organizations are using people’s data.

Facebook and Cambridge Analytica have been under the spotlight, and Google also recently confirmed that private emails sent and received by Gmail users can sometimes be read by third-party app developers, not just machines.

Fujiko Nakayama

Not a day seems to go by without news of another data breach or cyber security threat hitting the headlines. From Talk Talk and Tesco to Adidas and even Fortnum and Mason, no organization is safe. That’s without mentioning wider issues around how organizations are using people’s data.

Bogdana Vankov

Not a day seems to go by without news of another data breach or cyber security threat hitting the headlines. From Talk Talk and Tesco to Adidas and even Fortnum and Mason, no organization is safe. That’s without mentioning wider issues around how organizations are using people’s data.

Sigmund Gerhard

Cyber-security threats affect all industries, regardless of size. The industries that reported the most cyberattacks in recent years are healthcare, manufacturing, finance, and government. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.

Teresa Guerrero

The threats countered by cyber-security are three-fold:

1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption.

2. Cyber attack often involves politically motivated information gathering.

3. Cyberterror is intended to undermine electronic systems to cause panic or fear.

Nikoleta Stavros

Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

Please login or register to leave a response.