Francesca Bosco, UNICRI Programme Officer, United Nations Interregional Crime and Justice Research Institute, talks about malware, cyberconflicts and the need for a convention on cyberspace.
Umberto Baricordi |
In response to George Waters
In addition, organizations are having to respond to increasing customer awareness about the value of their data growing pressure to not only keep it safe from malicious attack, but also use it responsibly, and not exploit it in the way organizations such as Cambridge Analytica have been accused of. |
Posted 5 years ago | |
George Waters |
In response to Hanka Lasek
Cyber-security isn’t just an issue of time and resource for organizations; it can also be one of cost. Indeed, according to Gartner, cyber security will cost businesses $96 billion in 2018. |
Posted 6 years ago | |
Hanka Lasek |
As such, the term ‘know your enemy is key’. From phishing, spear-phishing and whaling, ransomware and malware, to ghostware, blastware and DDoS, keeping on top of threats is increasingly difficult – especially because as soon as a solution to one issue is found, another version pops up. |
Posted 6 years ago | |
Jamyang Khachaturyan |
When it comes to cyber security and data privacy, there are almost endless scenarios to consider. While cyber-attacks and breaches are often referred to in the same way, there are actually many different types of threat, that all access and attack systems in various ways. Added to this, they are all constantly evolving to stay one step ahead of attempts to thwart them. |
Posted 6 years ago | |
Sigmund Gerhard |
Electronic security protocols also focus on real-time malware detection. Many use heuristic and behavioral analysis to monitor the behavior of a program and its code to defend against viruses or Trojans that change their shape with each execution (polymorphic and metamorphic malware). Security programs can confine potentially malicious programs to a virtual bubble separate from a user's network to analyze their behavior and learn how to better detect new infections. |
Posted 6 years ago | |
Анета Владимирова |
Here are the main techniques used to prevent web server attacks:
|
Posted 6 years ago | |
Tatum Okorie |
In response to Sanjeev Jehoram Moriarty
Sanjeev, I saw this question asked in a recent survey. Here are the results:
|
Posted 6 years ago | |
Sanjeev Jehoram Moriarty |
Aside from security incidents and subsequent actions, what are the major cybersecurity challenges experienced by small and mid-sized organizations? |
Posted 6 years ago | |
Dorothea Petrescu |
One of the most fatal consequences of social media is people getting addicted to it and using it timelessly irrespective of thinking upon the fact that they have only 24 hours in a day. This addiction leads to insomnia, mental stress, time killing and many health adversities in people, specially teenagers who are the future of any nation. |
Posted 6 years ago | |
Elsa Hollis Bianco |
Cybersecurity offers the following job opportunities.
|
Posted 6 years ago | |
Alonso Barela |
A scientific approach to cybersecurity challenges could enrich understanding of the existing landscape of systems, defenses, attacks, and adversaries. Clear and well-substantiated models could help identify potential payoffs and support of mission needs while avoiding likely dead ends and poor places to invest effort. |
Posted 6 years ago | |
Moses Mcgowen |
In the early days, the security focus was on protecting networks, servers, and client workstations. Today’s concerns include targeted attacks on electromechanical control systems and mobile devices. Systems of all kinds are becoming larger and more interconnected. Other changes in recent years include the character of the threat, its sophistication, goals and targets. |
Posted 6 years ago | |
Sofia Solano |
The cybersecurity task is daunting, and the world continues to change. We see increasing replacement of physical systems with digital ones, increasing use of digital systems by larger segments of the population, and increasing use of digital systems in ways that the designers and developers never intended. |
Posted 6 years ago | |
Asclepius Čtvrtník |
Desktop computers and laptops are commonly targeted to gather passwords or financial account information, or to construct a botnet to attack another target. Smartphones, tablet computers, smart watches, and other mobile devices such as quantified self devices like activity trackers have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. |
Posted 6 years ago | |
Valerija Vroomen |
In response to Waclaw Piatek
The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. However, it's necessary in order to protect information and other assets from cyberthreats, which take many forms. |
Posted 6 years ago | |
Dušan Saša |
Blockchain is very interesting technology that has became very popular lately. With all this hype around close-related to it cryptocurrencies, in the beginning of 2018 Bitcoin skyrocketed to from 900$ to 20000$ for several months. I think it is very innovative and certainly should be developed more in the future. |
Posted 6 years ago | |
Timaios Blazh Abdulrashid |
I believe “empty-handed” authentication will become the norm. Users won’t need to have a smart card, a one-time password device, smartphone call back or a password and ID to log into devices and services. Instead, when users log into their PC, the camera on their PC will detect and identify they are the PC owner through facial recognition. |
Posted 6 years ago | |
Milburn Phillips |
While it's difficult to predict what other developments blockchain systems will offer in regards to cybersecurity, professionals can make some educated guesses. Companies are targeting a range of use cases which the blockchain helps enable from medical records management, to decentralized access control, to identity management. As the application and utility of blockchain in a cybersecurity context emerges, there will be a healthy tension but also complementary integrations with traditional, proven, cybersecurity approaches. |
Posted 6 years ago | |
Waclaw Piatek |
Online consumers have been victimized by cyber-threats in the form of spyware; malicious computer viruses, worrms, or malware; and fraud or abusive sales tactics that lure consumers to invest in bogus products or services. Online consumers routinely fall victim to identity theft, as well as spam, phishing or pharming attacks. |
Posted 6 years ago | |
Greg |
In response to Harald Normansson
Every user must avoid the websites that are not using the HTTPS protocol and stores user data. This is one of the most important rules in internet! |
Posted 6 years ago | |
Harald Normansson |
In response to Prof. Dr.-Ing. Helga Breitner
Prof. Breitner, Websites and online services that don’t have the latest and most robust security, can effectively leave the information they might hold on you and the data flowing between your computer and a web server, at risk from hackers. |
Posted 6 years ago | |
Prof. Dr.-Ing. Helga Breitner |
Websites using the now-outdated HTTP web communication standard, rather than the more robust HTTPS, lack an encrypted connection between a computer or smartphone and the web site it connects to. This means the data flowing between the two points can be monitored by other companies or potentially snooped on and stolen by hackers for more nefarious purposes. |
Posted 6 years ago | |
Lütfiye Sehrazad Uzun |
Organizations must ensure that all big data bases are immune to security threats and vulnerabilities. During data collection, all the necessary security protections such as real-time management should be fulfilled. Keeping in mind the huge size of big data, organizations should remember the fact that managing such data could be difficult and requires extraordinary efforts. |
Posted 6 years ago | |
Susan Boil |
Listening to you talking about the cyber world reminded me of an acticle I read a week ago. (it is about the Internet compared to the human brain and the universe. it turns out they have much in common) |
Posted 6 years ago | |
Slobodan Pavlicic |
In response to Anahit Petrosyan
The most important activity to prevent common cyber attacks is to keep your enterprise technology up to date, and to apply the latest security patches as they're made available. |
Posted 6 years ago | |
Anahit Petrosyan |
The myriad of firmware and software systems running on IoT devices makes consumers and businesses highly susceptible to cyber attacks. |
Posted 6 years ago | |
future hacker |
The most paranoid computer security practitioners want every network connection they use to be secured. And it all starts with a VPN. Most of us are familiar with VPNs, from connecting remotely to our work networks. Corporate VPNs provide secure connectivity from your offsite remote location to the company network, but often offer no or limited protection to any other network location. |
Posted 6 years ago | |
Fabricio Ruiz |
Biometric authentication gains more and more popularity as an innovative cyber security solution. While some people see biometrics as a new and efficient way of improving the security for enterprises, others see it as a possible problem. A major issue is that biometric information can still be stolen or duplicated, just like a user’s login and password. However, in contrast to a password, the user can’t change the scans of their iris or get a new face. This creates new challenges for cybersecurity professionals in the future. |
Posted 6 years ago | |
Prof. Dr.-Ing. Helga Breitner |
In response to Klas Eriksen
Klas, You are exactly right. Artificial Intelligence (AI) and Machine Learning (ML) software can “learn” from the consequences of past events to reach the set goal. While many cybersecurity professionals use AI/ML tools for preventing cyber attacks, there is a chance that hackers will also use these innovative solutions for performing more sophisticated attacks. |
Posted 6 years ago | |
Amy O'Quinn |
No online regulations can be implemented at this point, because of fast expanding technology world. You can not control a thing you know so little about. If in the future some convention is imposed, I think it wont last long. |
Posted 6 years ago | |
Professor Dodds |
Nioh, thank you for the link. It looks like they picked the top ten challenges to discuss and I fully agree with their selection. |
Posted 6 years ago | |
Nioh1992 |
Here is one of the best lists of cybersecurity challenges I have come across that should be on your radar. |
Posted 6 years ago | |
Klas Eriksen |
Machine learning still needs to deal with a lot of challenges. It seems to me there are multiple ways cybercriminals can misuse it. |
Posted 6 years ago | |
Mathilde A. Allafort |
I am also very excited about Artificial Intelligence. Thank you for discussing the pluses and minuses of AI devices in such detail. |
Posted 6 years ago |
Please login to leave a response.