CYBERSECURITY AND PRIVACY WITH FREDERIKE KALTHEUNER: WHAT IS NEEDED


What is needed

Frederike Kaltheuner, Data Exploitation programme lead at Privacy International, talks about profiling, data harvesting, prediction, automated systems, AI, informed decision and the Cambridge Analytica scandal.

Borislav Bossakov

We’re all going to witness this Personal Identifiable Information (PII) revolution and we should embrace it with both hands to give us the protection that is so badly needed in the decades to come, where the digital form will dominate even more than it already does and those 1’s and 0’s become more valuable than anything on paper by 100 fold or more.

Baldur Helgason

In response to Sung-soo Han

Cyber-attacks or incidents that threaten the command and control structure of the national government or its assets including national defense, emergency response, and economic systems are of growing concern. The digital infrastructure of the nation must be treated as a strategic national asset. The new mission is to deter, detect, and defend against disruptions and attacks of all descriptions.

Have you heard of WikiLeaks?  WikiLeaks was founded in 2006 by Julian Assange as a "multi-national media organization and associated library." WikiLeaks operated under the principle of "principled leaking," in order to fight societal corruption. The not-for-profit functions as a whistleblowing organization that serves as an archive of classified documents. Originally, WikiLeaks was operated with the principles of a wiki site, meaning that users could post documents, edit others' documents, and help decide which materials were posted. 

Sung-soo Han

Cyber-attacks or incidents that threaten the command and control structure of the national government or its assets including national defense, emergency response, and economic systems are of growing concern. The digital infrastructure of the nation must be treated as a strategic national asset. The new mission is to deter, detect, and defend against disruptions and attacks of all descriptions.

Magdalena Novak

Cybersecurity encompasses an array of challenges to protect digital information and the systems they depend upon to affect communication. The interconnected world of computers forms the Internet, which offers new challenges for nations because regional or national borders do not control the flow of information as it is currently managed.

Dorothea Petrescu

In response to George Waters

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access. Two-factor authentication methods rely on users providing a password as well as a second factor, usually either a security token or a biometric factor like a fingerprint or facial scan.

George,

Are there any alternatives to two-factor identification?  I have been researching the 2FA apps available on the web but could not find any that are free, easy to use, and reliable all at the same time.

George Waters

In response to future hacker

One tool that can help you protect your privacy and you online identity is two-factor authentication.  It is fast becoming a must in today’s world, where passwords are stolen by the hundreds of millions annually. Whenever possible, use and require 2FA for websites storing your personal information or email. If your computing device supports 2FA, turn it on there. When 2FA is required, it ensures an attacker can’t simply guess or steal your password.

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access. Two-factor authentication methods rely on users providing a password as well as a second factor, usually either a security token or a biometric factor like a fingerprint or facial scan.

future hacker

How can a financial institution determine if a transaction is fraudulent? In most cases, the daily transaction volume is far too high for humans to manually review each transaction. Instead, AI is used to create systems that learn what types of transactions are fraudulent. FICO, the company that creates the well-known credit ratings used to determine creditworthiness, uses neural networks to predict fraudulent transactions. Factors that may affect the neural network’s final output include recent frequency of transactions, transaction size, and the kind of retailer involved.

future hacker

One tool that can help you protect your privacy and you online identity is two-factor authentication.  It is fast becoming a must in today’s world, where passwords are stolen by the hundreds of millions annually. Whenever possible, use and require 2FA for websites storing your personal information or email. If your computing device supports 2FA, turn it on there. When 2FA is required, it ensures an attacker can’t simply guess or steal your password.

Prof. Dr.-Ing. Helga Breitner

In response to Doris Donald

Judging by the look of your face can be something really misleading. There is a pattern, but that can not define anyone. The question is what should be done with this data collected, can it be a proof of something ?

Doris,

Civil rights right organizations and privacy campaigners express concern that privacy is being compromised by the use of surveillance technologies. Some fear that it could lead to a “total surveillance society,” with the government and other authorities having the ability to know the whereabouts and activities of all citizens around the clock. This knowledge has been, is being, and could continue to be deployed to prevent the lawful exercise of rights of citizens to criticize those in office, specific government policies or corporate practices. Many centralized power structures with such surveillance capabilities have abused their privileged access to maintain control of the political and economic apparatus, and to curtail populist reforms.

Doris Donald

Judging by the look of your face can be something really misleading. There is a pattern, but that can not define anyone. The question is what should be done with this data collected, can it be a proof of something ?

Professor Dodds

Excellent video. I agree with the author’s attitude about certification. I’ve taught courses (cryptography, Internet security, defensive coding practices, etc.) that have enabled my students to get certified in Cybersecurity.

Claudia Andre Langlois

@Sebastian,


Think about this: whatever data Cambridge Analytica has on us, it has been handed over voluntarily to one of the world's biggest corporations – by no one else but us!  Here is some more information on the scandal.

Sebastian Evander

Cambridge Analytica is a good sample of people that were only interested in making money. I am not surprised of what they did, I think we will have many other like them in the future, 

Roberto Berti

The tech trends you discuss are quite worrying for me too.  The fact that I am constantly being profiled by automated systems which then make judgments about me is terrifying.

Please login or register to leave a response.