CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: A COMPLEX WORLD


A complex world

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about hackers, cybercriminals, profile crackers, cyberwarriors, cyberspies and organized criminal groups.

Signe Lundblad

Privacy vs. security will remain a hot topic. Why? Because your information will likely pop up in more and more places. Your world is getting more connected, not less, and your information has value. People will try to profit from it in legal and illegal ways. The best advice about privacy vs. security: Take care of both.

Lalita Demetriou

In response to János Pataky

Many organizations also fail to consider how telecoms, and increasingly, video factor into their overarching cyber-security strategy. Of course, it is essential for any business to have effective communications, from informal conversations between colleagues, to confidential client discussions. However, voice and video are just as susceptible to hacks as other systems.

This is especially true when it comes to VoIP. Every communication made over IP – including voice - is potentially valuable to hackers and open to attack. This isn’t something organizations tend to consider when using Skype, for example, but voice and video should be treated with the same attention as any other security and data risk.

Stojan Mikhailov

In response to Michael Dunst

Cloud computing is convenient, increasingly popular, and is generally considered to be secure. However, this is not always the case. In a public cloud, all data is stored within the provider’s network, and, as such, is open to attack. Even a private cloud, which is not open to the world, with data stored in a private network, is still not infallible.

As both public and private clouds are essentially centralized systems with just one point of vulnerability, it is relatively easy for someone to ‘leave the door open’ either through incompetence or maliciously.

János Pataky

Many organizations also fail to consider how telecoms, and increasingly, video factor into their overarching cyber-security strategy. Of course, it is essential for any business to have effective communications, from informal conversations between colleagues, to confidential client discussions. However, voice and video are just as susceptible to hacks as other systems.

Michael Dunst

Cloud computing is convenient, increasingly popular, and is generally considered to be secure. However, this is not always the case. In a public cloud, all data is stored within the provider’s network, and, as such, is open to attack. Even a private cloud, which is not open to the world, with data stored in a private network, is still not infallible.

Fabricio Ruiz

The way people work is rapidly evolving, enabled in large part by advances in technology. In many ways, this is a hugely positive thing as employees are able to work anytime, anywhere. However, the use of personal smartphones, tablets and laptops to carry out business does increase the risk of data loss – either through human error or by providing a way in for cyber criminals.

Teresa Guerrero

Common methods attackers use to control computers or networks include viruses, worms, spyware, Trojans, and ransomware. Viruses and worms can self-replicate and damage files or systems, while spyware and Trojans are often used for surreptitious data collection. Ransomware waits for an opportunity to encrypt all the user’s information and demands payment to return access to the user. Malicious code often spreads via an unsolicited email attachment or a legitimate-looking download that actually carries a malware payload.

Kaan Buğra Kundakçı

Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.

Zoe Miller

In response to tobias sorensen

I think it is impossible to attaining 100% security while still staying connected. It is like all other thing that we do, you'll naver have the totaly security, it is a part of our life, and since these systems are complex and made by many different companies, there will always be someone able to sneak into someone's computer or phone and cause damage, steal data and all the rest.


 

There is no way to stay safe in the internet, the only ones that know how to say safe are the same people that give up trouble in the internet and steal our data. Imagine you are a hacker but not the real sense, you are a person that has to pass a wall, not to do cyber robberies. How many way of passing through the wall can you think of in the first minute? Now imagine you are a cyber security expect again not in the real sense and you protect what is behind this wall. This time you have to think what might occur to me to use in order to pass through the wall.

This is the problem with good and evil, evil is always a step ahead because you don't have to act upon someone elses' actions, you have a much simpler problem.

Igor Konoplyanka

With the ever increasing demand of internet, everyone is connected through internet like never before. Internet is responsible for our easy bill payments and error-free bank transactions. But, with the increase in cyber crimes, how can we completely rely on the connections? Security is our primary concern. So, hiring the security professionals is not only important but is difficult as well.

Gaetano Albertini

Cross-site scripting is the nightmare of Javascript. Because Javascript can run pages locally on the client system as opposed to running everything on the server side, this can cause headaches for a programmer if variables can be changed directly on the client’s webpage. There are a number of ways to protect against this, the easiest of which is input validation.

Анета Владимирова

WEP cracking is the method of exploiting security vulnerabilities in wireless networks and gaining unauthorized access.  There are basically two types of cracks.  Active cracking: Until the WEP security has been cracked this type of cracking has no effect on the network traffic.  Passive cracking: It is easy to detect compared to passive cracking. This type of attack has increased load effect on the network traffic.

George Waters

Historically, organizations and governments have taken a reactive, “point product” approach to combating cyberthreats, cobbling together individual security technologies – one on top of another – to protect their networks and the valuable data within them. Not only is this method expensive and complex, but news of devastating cyber breaches continues to dominate headlines, rendering this method ineffective. In fact, given the pervasiveness of data breaches, the topic of cybersecurity has catapulted to the top of the priority list for boards of directors, which are seeking a far less risky way. 

Jacquette Ionas Tennfjord

Cyber security is the practice of protecting information and data from outside sources on the Internet. Cybersecurity professionals provide protection for networks, servers, intranets and computer systems. It also ensures that only authorized people have access to that information. In an office setting, one individual might go to another’s computer, install a flash drive and copy confidential information. This falls more under the category of information security. If someone halfway across world manages to hack into another company’s network and breach their system, this company is in need of better cyber security.

Moses Mcgowen

In response to Magdalena Novak

Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared.  Can anyone discuss the extent to which government spies on us in the EU and the USA?

Many actors affect cybersecurity, including boards of directors, shareholders, regulators, standards bodies, citizens, nongovernmental organizations, manufacturers, and researchers. As a result, there are often conflicting views and interests. 

Jamison Shields

Companies face an ever-shifting threat to their digital assets, whether as a result of malicious attacks, structural failures, human errors, or natural disasters, that can lead to a compromise of confidential information. Robust cybersecurity and data privacy policies and procedures work hand-in-glove to protect companies and their data, customers, and shareholders from the risks and ramifications posed by these data breaches.

Yasmine Loewen

In response to Baldur Helgason

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.  Here is a pretty comprehensive list of the different types of cyberattacks.

Both “cyber security” and “cyber crime” are terms widely used but often poorly understood. Worse, they often get included in the same discussions, with many governments approaching policy making from a misguided perspective.

Christin Bustamante

The recent headline-grabbing outbreaks of WannaCry and NotPetya ransomware were a very public reminder of just how much the criminal hacking of corporate networks has evolved in recent years.  Here you can read more about what happened.

Aisha Kamila Kuhn

In response to Baldur Helgason

In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.

As the cyberthreat landscape continues to grow and emerging threats, such as the internet of things, require hardware and software skills, it is estimated that there are 1 million unfilled cybersecurity jobs worldwide. IT professionals and other computer specialists are needed in security jobs.

Baldur Helgason

In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.

Timaios Blazh Abdulrashid

Cybersecurity itself has been and will always be, quite literally, an arms race; nation states, organized crime syndicates, disgruntled individuals attacking nation states, enterprises, high profile organizations with the mass populous, both human and device, ready for weaponization at any time.

inesa sokoll

Rather than being purpose built, security will become more organic and autonomous like your own immune system.  Security will continually evolve in an ever-changing cyber-environment.

Continual training and adaptation will allow systems to not only recognize new threats but respond to them.  Anomaly detection in particular will become more pervasive and IoT ecosystems will rely on this as a line of defense for trusting data from peers.

Milburn Phillips

Cybercriminals are going to create jobs for security professionals over the next few years. And they’re going to do it at a remarkable rate.  Sadly, there seems to be no end to hackers who want to access your business and customer data and then use that information to their own malicious ends.  Each year brings with it savvier hackers. Which means that each year also brings new defense mechanisms as well.

Nicolao Barros

In response to Magdalena Novak

Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared.  Can anyone discuss the extent to which government spies on us in the EU and the USA?

Magdalena,

I am glad you bring up privacy.  With every connected device comes some vulnerability. IoT-related cyber incidents can put business, employee, and client information at risk of being destroyed, altered, stolen and exposed, or even held for ransom. Another concern with IoT data collection is over the confidentiality, privacy and integrity of business data. It is important to understand the data collection and privacy policies of IoT devices, before you buy or download them.

Baldur Helgason

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.  Here is a pretty comprehensive list of the different types of cyberattacks.

Magdalena Novak

Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared.  Can anyone discuss the extent to which government spies on us in the EU and the USA?

Mārtiņš Gustavs Krūmiņš

A world awash with data allows little privacy. Your mobile phone, even when turned off, can tell others where you are and whom you have been calling or texting. New television sets can record your conversation and send it away. Fibre optic cables underground can detect any movements without our knowledge.

Regina Jankauskas

Who are the cybercriminals?  For the most part, the largest demographic of members participating in underground communities are lone actors with a clean criminal record and without any ties to organized syndicates. These criminals tend to maintain a stable day job while partaking in illegal activities mostly on an occasional basis. Often these actors are introduced to the life of cybercrime during their early college years and remain active many years to follow.

George Waters

In response to Prof. Dr.-Ing. Helga Breitner

Here are some the newest and most dangerous types of cyber attacks:  state sponsored attacks, disinformation, ransomeware, IoT botnets, spearphishing and whaling attacks, business process compromise attacks, machine learning-enabled attacks.

Whaling uses deceptive email messages targeting high-level decision makers within an organization, such as CEOs, CFOs, and other executives. Such individuals have access to highly valuable information, including trade secrets and passwords to administrative company accounts.

The attacker sends emails on issues of critical business importance, masquerading as an individual or organization with legitimate authority. For example, an attacker may send an email to a CEO requesting payment, pretending to be a client of the company.

Prof. Dr.-Ing. Helga Breitner

Here are some the newest and most dangerous types of cyber attacks:  state sponsored attacks, disinformation, ransomeware, IoT botnets, spearphishing and whaling attacks, business process compromise attacks, machine learning-enabled attacks.

Fujiko Nakayama

Israel raises up a new cyber army, already at school. The Education Minister Naftali Bennett, as Israel Hayom reported, announced an innovative program for high school seniors interested in pursuing careers in software engineering. It will be closely coordinated with the Israel National Cyber Directorate in the prime minister’s office. In the 2018-2019 school year, it will train 100 seniors to become computer hackers and another 240 12th grade students to become cyber protectors.

Edward Wachter

In response to Innocenzo Clarisse

Hi there.I am wondering does the organized crime exist in cyber space and how popular is it among terrorist groups at all? Regards.








·         

Innocenzo,

Dozens of cybercrime groups have reached the level of sophistication where their technical capabilities are on a par with those of a nation-state, it has been claimed.

Gangs are capable of building complex systems aimed at stealing money and intellectual property on a grand scale, costing almost the same to the global economy as counterfeiting or the narcotics trade — more than $400bn a year.

Анета Владимирова

Dorothea. 


Wow.  It never occurred to me that was one way to rob a bank!

Dorothea Petrescu

Cyber terrorism takes many forms. One of the more popular is to threaten a large bank. The terrorists hack into the system and then leave an encrypted message for senior directors, which threatens the bank. In essence, the message says that if they do not pay a set amount of money, then the terrorists will use anything from logic bombs to electromagnetic pulses and high-emission radio frequency guns to destroy the banks files. What adds to the difficulty to catch the criminals is that the criminals may be in another country. A second difficulty is that most banks would rather pay the money than have the public know how vulnerable they are.

YogaFan

Innocenzo, it certainly does.  Terrorism in cyberspace is often referred to as cyberterrorism.  NATO defines cyberterrorism as "[a] cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal" (source Wikipedia).

PSJunkie

It is my opinion that the European Union should invite private sector companies, civil companies, as well as security experts to cybersecurity discussions in order to achieve a balanced approach when discussing new legislation.

Slobodan Pavlicic

Before watching this video it did not occur to me that there exist multiple cybercriminal profiles.  I actually thought all cyber criminals were very much alike.

Innocenzo Clarisse

Hi there.I am wondering does the organized crime exist in cyber space and how popular is it among terrorist groups at all? Regards.








·         
tobias sorensen

I think it is impossible to attaining 100% security while still staying connected. It is like all other thing that we do, you'll naver have the totaly security, it is a part of our life, and since these systems are complex and made by many different companies, there will always be someone able to sneak into someone's computer or phone and cause damage, steal data and all the rest.


 

Please login or register to leave a response.