CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: A COMPLEX WORLD


A complex world

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about hackers, cybercriminals, profile crackers, cyberwarriors, cyberspies and organized criminal groups.

Baldur Helgason

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.  Here is a pretty comprehensive list of the different types of cyberattacks.

Magdalena Novak

Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared.  Can anyone discuss the extent to which government spies on us in the EU and the USA?

Mārtiņš Gustavs Krūmiņš

A world awash with data allows little privacy. Your mobile phone, even when turned off, can tell others where you are and whom you have been calling or texting. New television sets can record your conversation and send it away. Fibre optic cables underground can detect any movements without our knowledge.

Regina Jankauskas

Who are the cybercriminals?  For the most part, the largest demographic of members participating in underground communities are lone actors with a clean criminal record and without any ties to organized syndicates. These criminals tend to maintain a stable day job while partaking in illegal activities mostly on an occasional basis. Often these actors are introduced to the life of cybercrime during their early college years and remain active many years to follow.

George Waters

In response to Prof. Dr.-Ing. Helga Breitner

Here are some the newest and most dangerous types of cyber attacks:  state sponsored attacks, disinformation, ransomeware, IoT botnets, spearphishing and whaling attacks, business process compromise attacks, machine learning-enabled attacks.

Whaling uses deceptive email messages targeting high-level decision makers within an organization, such as CEOs, CFOs, and other executives. Such individuals have access to highly valuable information, including trade secrets and passwords to administrative company accounts.

The attacker sends emails on issues of critical business importance, masquerading as an individual or organization with legitimate authority. For example, an attacker may send an email to a CEO requesting payment, pretending to be a client of the company.

Prof. Dr.-Ing. Helga Breitner

Here are some the newest and most dangerous types of cyber attacks:  state sponsored attacks, disinformation, ransomeware, IoT botnets, spearphishing and whaling attacks, business process compromise attacks, machine learning-enabled attacks.

Fujiko Nakayama

Israel raises up a new cyber army, already at school. The Education Minister Naftali Bennett, as Israel Hayom reported, announced an innovative program for high school seniors interested in pursuing careers in software engineering. It will be closely coordinated with the Israel National Cyber Directorate in the prime minister’s office. In the 2018-2019 school year, it will train 100 seniors to become computer hackers and another 240 12th grade students to become cyber protectors.

Edward Wachter

In response to Innocenzo Clarisse

Hi there.I am wondering does the organized crime exist in cyber space and how popular is it among terrorist groups at all? Regards.








·         

Innocenzo,

Dozens of cybercrime groups have reached the level of sophistication where their technical capabilities are on a par with those of a nation-state, it has been claimed.

Gangs are capable of building complex systems aimed at stealing money and intellectual property on a grand scale, costing almost the same to the global economy as counterfeiting or the narcotics trade — more than $400bn a year.

Анета Владимирова

Dorothea. 


Wow.  It never occurred to me that was one way to rob a bank!

Dorothea Petrescu

Cyber terrorism takes many forms. One of the more popular is to threaten a large bank. The terrorists hack into the system and then leave an encrypted message for senior directors, which threatens the bank. In essence, the message says that if they do not pay a set amount of money, then the terrorists will use anything from logic bombs to electromagnetic pulses and high-emission radio frequency guns to destroy the banks files. What adds to the difficulty to catch the criminals is that the criminals may be in another country. A second difficulty is that most banks would rather pay the money than have the public know how vulnerable they are.

YogaFan

Innocenzo, it certainly does.  Terrorism in cyberspace is often referred to as cyberterrorism.  NATO defines cyberterrorism as "[a] cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal" (source Wikipedia).

PSJunkie

It is my opinion that the European Union should invite private sector companies, civil companies, as well as security experts to cybersecurity discussions in order to achieve a balanced approach when discussing new legislation.

Slobodan Pavlicic

Before watching this video it did not occur to me that there exist multiple cybercriminal profiles.  I actually thought all cyber criminals were very much alike.

Innocenzo Clarisse

Hi there.I am wondering does the organized crime exist in cyber space and how popular is it among terrorist groups at all? Regards.








·         
tobias sorensen

I think it is impossible to attaining 100% security while still staying connected. It is like all other thing that we do, you'll naver have the totaly security, it is a part of our life, and since these systems are complex and made by many different companies, there will always be someone able to sneak into someone's computer or phone and cause damage, steal data and all the rest.


 

Please login or register to leave a response.