CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: A COMPLEX WORLD


A complex world

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about hackers, cybercriminals, profile crackers, cyberwarriors, cyberspies and organized criminal groups.

Igor Konoplyanka

With the ever increasing demand of internet, everyone is connected through internet like never before. Internet is responsible for our easy bill payments and error-free bank transactions. But, with the increase in cyber crimes, how can we completely rely on the connections? Security is our primary concern. So, hiring the security professionals is not only important but is difficult as well.

Gaetano Albertini

Cross-site scripting is the nightmare of Javascript. Because Javascript can run pages locally on the client system as opposed to running everything on the server side, this can cause headaches for a programmer if variables can be changed directly on the client’s webpage. There are a number of ways to protect against this, the easiest of which is input validation.

Анета Владимирова

WEP cracking is the method of exploiting security vulnerabilities in wireless networks and gaining unauthorized access.  There are basically two types of cracks.  Active cracking: Until the WEP security has been cracked this type of cracking has no effect on the network traffic.  Passive cracking: It is easy to detect compared to passive cracking. This type of attack has increased load effect on the network traffic.

George Waters

Historically, organizations and governments have taken a reactive, “point product” approach to combating cyberthreats, cobbling together individual security technologies – one on top of another – to protect their networks and the valuable data within them. Not only is this method expensive and complex, but news of devastating cyber breaches continues to dominate headlines, rendering this method ineffective. In fact, given the pervasiveness of data breaches, the topic of cybersecurity has catapulted to the top of the priority list for boards of directors, which are seeking a far less risky way. 

Jacquette Ionas Tennfjord

Cyber security is the practice of protecting information and data from outside sources on the Internet. Cybersecurity professionals provide protection for networks, servers, intranets and computer systems. It also ensures that only authorized people have access to that information. In an office setting, one individual might go to another’s computer, install a flash drive and copy confidential information. This falls more under the category of information security. If someone halfway across world manages to hack into another company’s network and breach their system, this company is in need of better cyber security.

Moses Mcgowen

In response to Magdalena Novak

Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared.  Can anyone discuss the extent to which government spies on us in the EU and the USA?

Many actors affect cybersecurity, including boards of directors, shareholders, regulators, standards bodies, citizens, nongovernmental organizations, manufacturers, and researchers. As a result, there are often conflicting views and interests. 

Jamison Shields

Companies face an ever-shifting threat to their digital assets, whether as a result of malicious attacks, structural failures, human errors, or natural disasters, that can lead to a compromise of confidential information. Robust cybersecurity and data privacy policies and procedures work hand-in-glove to protect companies and their data, customers, and shareholders from the risks and ramifications posed by these data breaches.

Yasmine Loewen

In response to Baldur Helgason

A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.  Here is a pretty comprehensive list of the different types of cyberattacks.

Both “cyber security” and “cyber crime” are terms widely used but often poorly understood. Worse, they often get included in the same discussions, with many governments approaching policy making from a misguided perspective.

Christin Bustamante

The recent headline-grabbing outbreaks of WannaCry and NotPetya ransomware were a very public reminder of just how much the criminal hacking of corporate networks has evolved in recent years.  Here you can read more about what happened.

Aisha Kamila Kuhn

In response to Baldur Helgason

In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.

As the cyberthreat landscape continues to grow and emerging threats, such as the internet of things, require hardware and software skills, it is estimated that there are 1 million unfilled cybersecurity jobs worldwide. IT professionals and other computer specialists are needed in security jobs.

Baldur Helgason

In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.

Timaios Blazh Abdulrashid

Cybersecurity itself has been and will always be, quite literally, an arms race; nation states, organized crime syndicates, disgruntled individuals attacking nation states, enterprises, high profile organizations with the mass populous, both human and device, ready for weaponization at any time.

inesa sokoll

Rather than being purpose built, security will become more organic and autonomous like your own immune system.  Security will continually evolve in an ever-changing cyber-environment.

Continual training and adaptation will allow systems to not only recognize new threats but respond to them.  Anomaly detection in particular will become more pervasive and IoT ecosystems will rely on this as a line of defense for trusting data from peers.

Milburn Phillips

Cybercriminals are going to create jobs for security professionals over the next few years. And they’re going to do it at a remarkable rate.  Sadly, there seems to be no end to hackers who want to access your business and customer data and then use that information to their own malicious ends.  Each year brings with it savvier hackers. Which means that each year also brings new defense mechanisms as well.

Nicolao Barros

In response to Magdalena Novak

Privacy interest in cybersecurity involves establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared.  Can anyone discuss the extent to which government spies on us in the EU and the USA?

Magdalena,

I am glad you bring up privacy.  With every connected device comes some vulnerability. IoT-related cyber incidents can put business, employee, and client information at risk of being destroyed, altered, stolen and exposed, or even held for ransom. Another concern with IoT data collection is over the confidentiality, privacy and integrity of business data. It is important to understand the data collection and privacy policies of IoT devices, before you buy or download them.

Please login or register to leave a response.