CYBERSECURITY AND PRIVACY WITH FRANCESCA BOSCO: COMING CHALLENGES


Coming challenges

Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about malware, cyberconflicts and the need for a convention on cyberspace.

Sigmund Gerhard

Electronic security protocols also focus on real-time malware detection. Many use heuristic and behavioral analysis to monitor the behavior of a program and its code to defend against viruses or Trojans that change their shape with each execution (polymorphic and metamorphic malware). Security programs can confine potentially malicious programs to a virtual bubble separate from a user's network to analyze their behavior and learn how to better detect new infections.

Анета Владимирова

Here are the main techniques used to prevent web server attacks:

  • Patch Management
  • Secure installation and configuration of the O.S
  • Safe installation and configuration of the web server software
  • Scanning system vulnerability
  • Anti-virus and firewalls
  • Remote administration disabling
  • Removing of unused and default account
  • Changing of default ports and settings to customs port and settings
Tatum Okorie

In response to Sanjeev Jehoram Moriarty

Aside from security incidents and subsequent actions, what are the major cybersecurity challenges experienced by small and mid-sized organizations?

Sanjeev,

I saw this question asked in a recent survey.  Here are the results:

  • 28% of respondents say their biggest cybersecurity challenge is that their organization depends upon too many manual or informal processes for cybersecurity.
  • 27% of respondents say their biggest cybersecurity challenge is that it is difficult to manage the complexity of too many disconnected cybersecurity tools.
  • 27% of respondents say their biggest cybersecurity challenge is that business managers don’t understand or support strong cybersecurity.
  • 25% of respondents say their biggest cybersecurity challenge is that their organization doesn’t provide an appropriate level of cybersecurity training for non-technical employees, leading to increased risk.
  • 24% of respondents say their biggest cybersecurity challenge is that their organization lacks the right skills to deal with modern types of cyber threats.
Sanjeev Jehoram Moriarty

Aside from security incidents and subsequent actions, what are the major cybersecurity challenges experienced by small and mid-sized organizations?

Dorothea Petrescu

One of the most fatal consequences of social media is people getting addicted to it and using it timelessly irrespective of thinking upon the fact that they have only 24 hours in a day. This addiction leads to insomnia, mental stress, time killing and many health adversities in people, specially teenagers who are the future of any nation.

Elsa Hollis Bianco

Cybersecurity offers the following job opportunities.

  • Information Security Analyst
  • Chief Information Security Officer
  • Cryptographer
  • Forensics Expert
  • Security Administrator
  • Security Architect
  • Lead Software Security Engineer
  • Penetration Tester
Alonso Barela

A scientific approach to cybersecurity challenges could enrich understanding of the existing landscape of systems, defenses, attacks, and adversaries. Clear and well-substantiated models could help identify potential payoffs and support of mission needs while avoiding likely dead ends and poor places to invest effort.

Moses Mcgowen

In the early days, the security focus was on protecting networks, servers, and client workstations. Today’s concerns include targeted attacks on electromechanical control systems and mobile devices. Systems of all kinds are becoming larger and more interconnected. Other changes in recent years include the character of the threat, its sophistication, goals and targets.

Sofia Solano

The cybersecurity task is daunting, and the world continues to change. We see increasing replacement of physical systems with digital ones, increasing use of digital systems by larger segments of the population, and increasing use of digital systems in ways that the designers and developers never intended.

Asclepius Čtvrtník

Desktop computers and laptops are commonly targeted to gather passwords or financial account information, or to construct a botnet to attack another target. Smartphones, tablet computers, smart watches, and other mobile devices such as quantified self devices like activity trackers have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach.

Valerija Vroomen

In response to Waclaw Piatek

Online consumers have been victimized by cyber-threats in the form of spyware; malicious computer viruses, worrms, or malware; and fraud or abusive sales tactics that lure consumers to invest in bogus products or services. Online consumers routinely fall victim to identity theft, as well as spam, phishing or pharming attacks.

The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. However, it's necessary in order to protect information and other assets from cyberthreats, which take many forms.

Dušan Saša

Blockchain is very interesting technology that has became very popular lately. With all this hype around close-related to it cryptocurrencies, in the beginning of 2018 Bitcoin skyrocketed to from 900$ to 20000$ for several months. I think it is very innovative and certainly should be developed more in the future.

Timaios Blazh Abdulrashid

I believe “empty-handed” authentication will become the norm. Users won’t need to have a smart card, a one-time password device, smartphone call back or a password and ID to log into devices and services.  Instead, when users log into their PC, the camera on their PC will detect and identify they are the PC owner through facial recognition.

Milburn Phillips

While it's difficult to predict what other developments blockchain systems will offer in regards to cybersecurity, professionals can make some educated guesses.  Companies are targeting a range of use cases which the blockchain helps enable from medical records management, to decentralized access control, to identity management.  As the application and utility of blockchain in a cybersecurity context emerges, there will be a healthy tension but also complementary integrations with traditional, proven, cybersecurity approaches.

Waclaw Piatek

Online consumers have been victimized by cyber-threats in the form of spyware; malicious computer viruses, worrms, or malware; and fraud or abusive sales tactics that lure consumers to invest in bogus products or services. Online consumers routinely fall victim to identity theft, as well as spam, phishing or pharming attacks.

Please login or register to leave a response.