CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: COMING CHALLENGES


Coming challenges

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about malware, cyberconflicts and the need for a convention on cyberspace.

Greg

In response to Harald Normansson

Prof. Breitner,

Websites and online services that don’t have the latest and most robust security, can effectively leave the information they might hold on you and the data flowing between your computer and a web server, at risk from hackers.

Every user must avoid the websites that are not using the HTTPS protocol and stores user data. This is one of the most important  rules in internet!

Harald Normansson

In response to Prof. Dr.-Ing. Helga Breitner

Websites using the now-outdated HTTP web communication standard, rather than the more robust HTTPS, lack an encrypted connection between a computer or smartphone and the web site it connects to. This means the data flowing between the two points can be monitored by other companies or potentially snooped on and stolen by hackers for more nefarious purposes.

Prof. Breitner,

Websites and online services that don’t have the latest and most robust security, can effectively leave the information they might hold on you and the data flowing between your computer and a web server, at risk from hackers.

Prof. Dr.-Ing. Helga Breitner

Websites using the now-outdated HTTP web communication standard, rather than the more robust HTTPS, lack an encrypted connection between a computer or smartphone and the web site it connects to. This means the data flowing between the two points can be monitored by other companies or potentially snooped on and stolen by hackers for more nefarious purposes.

Lütfiye Sehrazad Uzun

Organizations must ensure that all big data bases are immune to security threats and vulnerabilities. During data collection, all the necessary security protections such as real-time management should be fulfilled. Keeping in mind the huge size of big data, organizations should remember the fact that managing such data could be difficult and requires extraordinary efforts.

Susan Boil

Listening to you talking about the cyber world reminded me of an acticle I read a week ago. (it is about the Internet compared to the human brain and the universe. it turns out they have much in common)
Also watching you talk about Internet, AI and cyber security is very inspiring to me. We don't see much women involved in such matters!

Slobodan Pavlicic

In response to Anahit Petrosyan

The myriad of firmware and software systems running on IoT devices makes consumers and businesses highly susceptible to cyber attacks.
A lot of this technology is not designed with cybersecurity in mind, nor to be used for commercial purposes – of which it sometimes is. Insecure web interfaces, data transfers, payment and authentication methods can leave users open to attacks.

The most important activity to prevent common cyber attacks is to keep your enterprise technology up to date, and to apply the latest security patches as they're made available.

Anahit Petrosyan

The myriad of firmware and software systems running on IoT devices makes consumers and businesses highly susceptible to cyber attacks.
A lot of this technology is not designed with cybersecurity in mind, nor to be used for commercial purposes – of which it sometimes is. Insecure web interfaces, data transfers, payment and authentication methods can leave users open to attacks.

future hacker

The most paranoid computer security practitioners want every network connection they use to be secured. And it all starts with a VPN. Most of us are familiar with VPNs, from connecting remotely to our work networks. Corporate VPNs provide secure connectivity from your offsite remote location to the company network, but often offer no or limited protection to any other network location. 

Fabricio Ruiz

Biometric authentication gains more and more popularity as an innovative cyber security solution. While some people see biometrics as a new and efficient way of improving the security for enterprises, others see it as a possible problem.

A major issue is that biometric information can still be stolen or duplicated, just like a user’s login and password. However, in contrast to a password, the user can’t change the scans of their iris or get a new face. This creates new challenges for cybersecurity professionals in the future.

Prof. Dr.-Ing. Helga Breitner

In response to Klas Eriksen

Machine learning still needs to deal with a lot of challenges.   It seems to me there are multiple ways cybercriminals can misuse it.

Klas,

You are exactly right.  Artificial Intelligence (AI) and Machine Learning (ML) software can “learn” from the consequences of past events to reach the set goal. While many cybersecurity professionals use AI/ML tools for preventing cyber attacks, there is a chance that hackers will also use these innovative solutions for performing more sophisticated attacks.
AI and ML may be used for performing different types of attacks – from sending vast amounts of spam/fraud/phishing messages via chatbots to AI-powered password guessing to performing cryptographic attacks.

Amy O'Quinn

No online regulations can be implemented at this point, because of fast expanding technology world. You can not control a thing you know so little about. If in the future some convention is imposed, I think it wont last long.

Professor Dodds

Nioh, thank you for the link.  It looks like they picked the top ten challenges to discuss and I fully agree with their selection.

Nioh1992

Here is one of the best lists of cybersecurity challenges I have come across that should be on your radar.

Klas Eriksen

Machine learning still needs to deal with a lot of challenges.   It seems to me there are multiple ways cybercriminals can misuse it.

Mathilde A. Allafort

I am also very excited about Artificial Intelligence.  Thank you for discussing the pluses and minuses of AI devices in such detail.

Please login or register to leave a response.