Cybersecurity

Ben Liu
Ben LiuVP Finance em Sprout: Junior Achievement
THE AGE OF CYBERSECURITY
By Ben Liu
With the rapid digitization
of consumers’ lives and
enterprise records,
cybersecurity is a rapidly
growing global issue that
will require the combined
cooperation of
consumers, corporations,
and government alike
Research from Juniper Research suggest that cybercrime
costs will rise to $2.1 trillion globally by 2019[1]
Technology and social
media is an indispensable
part of our lives. It gives us a
psychological boost – “we
use media to meet our real
needs, delight needs, and
secret needs” [2]
Thus, there is a media
symbiosis: we need media
and media need us
The need for technology
and media is for everyone –
not just younger
generations
Studies have shown from
the university of Illinois that
when older adults acquire
technologies and develop
digital literacies, they may
acquire a higher standard
of life [3]
This creates huge vulnerabilities, when we pour our
personal lives into the online world: online activity data,
user passwords, home addresses, private chats, etc.…
Everywhere that there is technology, there can exist a
cybersecurity vulnerability where our personal data is at
stake:
Bruce Schneier, a cyber-security expert and author worries
that readers may steer clear of digital books on sensitive
subjects such as health, sexuality, and security – including
his own works – out of fear that their reading is being
tracked. [4]
Cyber hacks have grown rapidly in recent years, causing a
spark in the cybersecurity industry
(25%)
0%
25%
50%
75%
100%
125%
150%
175%
200%
2011 2012 2013 2014 2015 2016 2017
BVP Cyber Index
Nasdaq Index
S&P Index
Dow Jones
Major Hacks
Dec 19, 2013
Target, 70MM
Apr 26, 2013
LivingSocial, 50MM
May 21, 2014
eBay, 145MM
Feb 4, 2015
Anthem, 80MM
Nov 24, 2014
Sony Pictures
BVP Cyber Index: 29 Publicly Traded Cybersecurity Companies 2011-2017 [5]
Research from Juniper Research forecasts the average
cost of a data breach in 2020 will exceed $150 million[1],
as more business infrastructure gets connected
Today, most businesses are still overconfident in their
cybersecurity – it’s low risk but with high damage
But corporations are not the only ones who should be
ramping up on the cybersecurity initiative… cybersecurity
starts with individuals like you and me…
According to Cisco, Facebook scams were the most
common form of malware distributed in 2015[6]
Facebook reported for 2015 that up to 2% of their monthly
average users were false = 31MM [7]
Twitter estimates 5% = 10.75MM [8]
LinkedIn openly admitted that “we don’t have a reliable
system for identifying and counting duplicate or
fraudulent accounts” [9]
Cyber criminals are now weaponizing social media sites
and their data
Anthem Inc, a major American health insurance company,
was hacked in 2015 leading to 78.8MM records stolen[10]
How did this happen –
LinkedIn was a key tool for
reconnaissance (scraping of
public social data and social
engineering tactics) for the
cyber criminals who
executed Anthem Health’s
2015 breach[9]
President Obama has issued an executive order aimed at
improving critical infrastructure
In addition, in 2016, Obama included a budget proposal
of $19BN for cybersecurity – a $5BN increase YoY [11]
But Cybersecurity cannot be fought just by the private
sector…
There is a need for a public campaign on cybersecurity
– similar to how campaigns were launched in the past to
raise awareness on issues like smoking or recycling[12]
Steven Weber, faculty director at the UC Berkeley Center
for Long-Term Cybersecurity acknowledged part of the
problem for many people is that cybersecurity still feels
like a technical issue related to the protection of
computer networks. It’s time to “demystify the network”
for folds outside the core tech sector, he said. [12]
The problem of
cybersecurity is like
second-hand smoke –
people are motivated by
the negative externalities
But cybersecurity doesn’t just come as a personal cost, it
affects the community as a whole – individuals,
businesses, and government alike need to work together
to prevent the rapid growth of digital threats
Works Cited
• [1] "Cybercrime Will Cost Businesses Over $2 Trillion by 2019." Cybercrime Will Cost Businesses Over $2 Trillion by 2019. N.p., n.d. Web.
05 Mar. 2017. < https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion>
• [2] Matrix, Sydney Eve. FILM 240. Module 01, Lecture 02 N.p.: n.p., n.d. Print.
• [3] Kim, Kyungo, Chodzko-Zajko Wojtek, Andiara Schwingel, and Deana C. McDonagh. "Understanding Older Individuals’ Emotional
Responses to New Technology Associated with Healthy Lifestyle Choice." Journal of Physical Education and Sort (2014): 138-47. Web.
• [4] Alter, Alexandra. "Your E-Book Is Reading You." The Wall Street Journal. Dow Jones & Company, 19 July 2012. Web. 05 Mar. 2017.
• [5] "| Bessemer Venture Partners." | Bessemer Venture Partners. N.p., n.d. Web. 05 Mar. 2017.
• [6] "Cisco 2016 Midyear Cybersecurity Report." TS Ad. N.p., n.d. Web. 05 Mar. 2017. <https://newsroom.cisco.com/press-release-
content?type=webcontent&articleId=1780586>
• [7] "SEC Filings Details." Facebook - Financials - SEC Filings Details. N.p., n.d. Web. 05 Mar. 2017.
• [8] D'Onfro, Jillian. "Twitter Admits 5% Of Its 'Users' Are Fake." Business Insider. Business Insider, 03 Oct. 2013. Web. 05 Mar. 2017.
• [9] "Why Social Media Sites Are The New Cyber Weapons Of Choice." Dark Reading. N.p., n.d. Web. 18 Mar. 2017."Executive Order --
Improving Critical Infrastructure Cybersecurity." National Archives and Records Administration. National Archives and Records
Administration, n.d. Web. 05 Mar. 2017.
• [10] Mathews, Anna Wilde. "Anthem: Hacked Database Included 78.8 Million People." The Wall Street Journal. Dow Jones & Company,
24 Feb. 2015. Web. 05 Mar. 2017.
• [11] Reuters. "Obama Budget Proposal Includes $19 Billion for Cybersecurity." Fortune.com. Fortune, 09 Feb. 2016. Web. 18 Mar. 2017.
• [12] "Thinking Ahead: Cybersecurity In The Trump Era." Dark Reading. N.p., n.d. Web. 05 Mar. 2017.
• All photos and images obtained from Pixabay <https://pixabay.com/>. “All images and videos on Pixabay are released free of
copyrights under Creative Commons CC0. You may download, modify, distribute, and use them royalty free for anything you like, even
in commercial applications. Attribution is not required.”
1 de 21

Recomendados

Social Media: Who is Really in Charge of Our Feeds? por
Social Media: Who is Really in Charge of Our Feeds?Social Media: Who is Really in Charge of Our Feeds?
Social Media: Who is Really in Charge of Our Feeds?Laura Penstone
452 visualizações24 slides
Creating Buzz: Marketing in the Age of Social Media por
Creating Buzz: Marketing in the Age of Social MediaCreating Buzz: Marketing in the Age of Social Media
Creating Buzz: Marketing in the Age of Social MediaAlex S.
546 visualizações23 slides
Prodcut placement, shameless marketing? pdf por
Prodcut placement, shameless marketing?  pdfProdcut placement, shameless marketing?  pdf
Prodcut placement, shameless marketing? pdfAlexander Birt
404 visualizações21 slides
Social Media: Corporate Reputation at Risk por
Social Media: Corporate Reputation at RiskSocial Media: Corporate Reputation at Risk
Social Media: Corporate Reputation at RiskAlex Schaerer
463 visualizações23 slides
Marketing to Children in a Digital Age por
Marketing to Children in a Digital AgeMarketing to Children in a Digital Age
Marketing to Children in a Digital AgeMaytha Nassor
823 visualizações24 slides
FILM240 Flipbook por
FILM240 FlipbookFILM240 Flipbook
FILM240 FlipbookJessica Cooke
2.2K visualizações21 slides

Mais conteúdo relacionado

Mais procurados

Content as Advertisement por
Content as AdvertisementContent as Advertisement
Content as AdvertisementRyan Noble
648 visualizações22 slides
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti... por
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...Peggy Men
771 visualizações23 slides
How much is too much? Social media in moderation. por
How much is too much? Social media in moderation.How much is too much? Social media in moderation.
How much is too much? Social media in moderation.Kaylee Pietroski
1K visualizações23 slides
Damaging Effects of Blocking Ads and Mitigating Them por
Damaging Effects of Blocking Ads and Mitigating ThemDamaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemBrett Kammer
531 visualizações22 slides
The New Ads: Content Marketing and Earned Media por
The New Ads: Content Marketing and Earned MediaThe New Ads: Content Marketing and Earned Media
The New Ads: Content Marketing and Earned MediaDey Sheridan
502 visualizações23 slides
The Future Of Social Networks por
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social NetworksCharlene Li
28K visualizações26 slides

Mais procurados(20)

Content as Advertisement por Ryan Noble
Content as AdvertisementContent as Advertisement
Content as Advertisement
Ryan Noble648 visualizações
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti... por Peggy Men
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
Peggy Men771 visualizações
How much is too much? Social media in moderation. por Kaylee Pietroski
How much is too much? Social media in moderation.How much is too much? Social media in moderation.
How much is too much? Social media in moderation.
Kaylee Pietroski1K visualizações
Damaging Effects of Blocking Ads and Mitigating Them por Brett Kammer
Damaging Effects of Blocking Ads and Mitigating ThemDamaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating Them
Brett Kammer531 visualizações
The New Ads: Content Marketing and Earned Media por Dey Sheridan
The New Ads: Content Marketing and Earned MediaThe New Ads: Content Marketing and Earned Media
The New Ads: Content Marketing and Earned Media
Dey Sheridan502 visualizações
The Future Of Social Networks por Charlene Li
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social Networks
Charlene Li28K visualizações
The Age of the Omni-Channel Shopper por Kia Kortelainen
The Age of the Omni-Channel ShopperThe Age of the Omni-Channel Shopper
The Age of the Omni-Channel Shopper
Kia Kortelainen2.4K visualizações
Online publishers versus Ad-blockers por Yanwen Zhang
Online publishers versus Ad-blockersOnline publishers versus Ad-blockers
Online publishers versus Ad-blockers
Yanwen Zhang1.9K visualizações
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY por Olivia Charlebois
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
Olivia Charlebois394 visualizações
The Role of Social Media in Cybercrime por Krista Dunn
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in Cybercrime
Krista Dunn470 visualizações
Film 240 Flipbook por Courtney Lailey
Film 240 Flipbook Film 240 Flipbook
Film 240 Flipbook
Courtney Lailey695 visualizações
Data:The Fine Balance.We Trade Privacy for Convenience and Security. por Donovan Gopaul
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Donovan Gopaul134 visualizações
How Creators are Thriving Digitally por Leah Wells
How Creators are Thriving DigitallyHow Creators are Thriving Digitally
How Creators are Thriving Digitally
Leah Wells466 visualizações
The (Un)protected Consumer por jedo745
The (Un)protected ConsumerThe (Un)protected Consumer
The (Un)protected Consumer
jedo745419 visualizações
Ad Block - Blocking Ad Publishers' Success por Shraddha Banglorewala
Ad Block - Blocking Ad Publishers' SuccessAd Block - Blocking Ad Publishers' Success
Ad Block - Blocking Ad Publishers' Success
Shraddha Banglorewala673 visualizações
LEPC: Social media and disasters por Duty Officer
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disasters
Duty Officer373 visualizações
Social Media Marketing por Linnea Jonsson
Social Media MarketingSocial Media Marketing
Social Media Marketing
Linnea Jonsson533 visualizações
Richard Edelman -- New Media Academic Summit 2010 por edelmanmarketing
Richard Edelman -- New Media Academic Summit 2010Richard Edelman -- New Media Academic Summit 2010
Richard Edelman -- New Media Academic Summit 2010
edelmanmarketing4.8K visualizações
Machine Learning: The Next Revolution in Online Advertising por Cameron Hudson
Machine Learning: The Next Revolution in Online AdvertisingMachine Learning: The Next Revolution in Online Advertising
Machine Learning: The Next Revolution in Online Advertising
Cameron Hudson537 visualizações
Like Minds: Digital Journalism in 2008 por Anthony Moor
Like Minds: Digital Journalism in 2008Like Minds: Digital Journalism in 2008
Like Minds: Digital Journalism in 2008
Anthony Moor837 visualizações

Destaque

Affects of Media on the Mind por
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the MindJanvi Pattni
401 visualizações20 slides
Film assignment 2 - Connie Li por
Film assignment 2 - Connie LiFilm assignment 2 - Connie Li
Film assignment 2 - Connie LiConnie Li
579 visualizações21 slides
Comic Books - The Superhero of Multimodal Literacy por
Comic Books - The Superhero of Multimodal LiteracyComic Books - The Superhero of Multimodal Literacy
Comic Books - The Superhero of Multimodal LiteracyErin Labrie
437 visualizações25 slides
Film 240 Assignment 02 Flipbook por
Film 240 Assignment 02 FlipbookFilm 240 Assignment 02 Flipbook
Film 240 Assignment 02 Flipbooktryevenharder
834 visualizações23 slides
E-Books: The New Business of Writing for E-Reading por
E-Books: The New Business of Writing for E-ReadingE-Books: The New Business of Writing for E-Reading
E-Books: The New Business of Writing for E-ReadingJackKHayward
391 visualizações24 slides
In stagram ads por
In stagram adsIn stagram ads
In stagram adsHyla Nayeri
524 visualizações21 slides

Destaque(20)

Affects of Media on the Mind por Janvi Pattni
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the Mind
Janvi Pattni401 visualizações
Film assignment 2 - Connie Li por Connie Li
Film assignment 2 - Connie LiFilm assignment 2 - Connie Li
Film assignment 2 - Connie Li
Connie Li579 visualizações
Comic Books - The Superhero of Multimodal Literacy por Erin Labrie
Comic Books - The Superhero of Multimodal LiteracyComic Books - The Superhero of Multimodal Literacy
Comic Books - The Superhero of Multimodal Literacy
Erin Labrie437 visualizações
Film 240 Assignment 02 Flipbook por tryevenharder
Film 240 Assignment 02 FlipbookFilm 240 Assignment 02 Flipbook
Film 240 Assignment 02 Flipbook
tryevenharder834 visualizações
E-Books: The New Business of Writing for E-Reading por JackKHayward
E-Books: The New Business of Writing for E-ReadingE-Books: The New Business of Writing for E-Reading
E-Books: The New Business of Writing for E-Reading
JackKHayward391 visualizações
In stagram ads por Hyla Nayeri
In stagram adsIn stagram ads
In stagram ads
Hyla Nayeri524 visualizações
The Death of Print Magazines por Charlie Hart
The Death of Print MagazinesThe Death of Print Magazines
The Death of Print Magazines
Charlie Hart633 visualizações
Joanna Moroz - FILM240 Flipbook por Joanna Moroz
Joanna Moroz - FILM240 FlipbookJoanna Moroz - FILM240 Flipbook
Joanna Moroz - FILM240 Flipbook
Joanna Moroz638 visualizações
Film 240 - flip book por Jamie Black
Film 240 - flip bookFilm 240 - flip book
Film 240 - flip book
Jamie Black418 visualizações
Brands & Content Creators por McKenzie Thomson
Brands & Content CreatorsBrands & Content Creators
Brands & Content Creators
McKenzie Thomson484 visualizações
Flim 240 Flipbook por QianLi Chen
Flim 240 FlipbookFlim 240 Flipbook
Flim 240 Flipbook
QianLi Chen474 visualizações
Flipbook- Taryn Cates por Taryn Cates
Flipbook- Taryn CatesFlipbook- Taryn Cates
Flipbook- Taryn Cates
Taryn Cates295 visualizações
Michael Nguyen flipbook por Michael Nguyen
Michael Nguyen flipbookMichael Nguyen flipbook
Michael Nguyen flipbook
Michael Nguyen374 visualizações
Technology, pornography and visual taste por Olivia Hobbs
Technology, pornography and visual tasteTechnology, pornography and visual taste
Technology, pornography and visual taste
Olivia Hobbs430 visualizações
Flipbook por Sydney Dunstan
FlipbookFlipbook
Flipbook
Sydney Dunstan467 visualizações
Olivia Hannigan - Flipbook por Olivia Hannigan
Olivia Hannigan - FlipbookOlivia Hannigan - Flipbook
Olivia Hannigan - Flipbook
Olivia Hannigan564 visualizações
Is Our Addiction Killing Us? por Valerie Khordoc
Is Our Addiction Killing Us?Is Our Addiction Killing Us?
Is Our Addiction Killing Us?
Valerie Khordoc382 visualizações
Who's Reading Over Your Shoulder? por Hann9110
Who's Reading Over Your Shoulder? Who's Reading Over Your Shoulder?
Who's Reading Over Your Shoulder?
Hann9110460 visualizações
The Proliferation of Technology: Too Much of a Good Thing por Joshua Rosenbaum
The Proliferation of Technology: Too Much of a Good ThingThe Proliferation of Technology: Too Much of a Good Thing
The Proliferation of Technology: Too Much of a Good Thing
Joshua Rosenbaum493 visualizações

Similar a Cybersecurity

Keep in touch for cyber peace_20150212 por
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
757 visualizações27 slides
Top Cyber News MAGAZINE. Troels Oerting por
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
29 visualizações28 slides
Trends_in_my_profession(revised) por
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Mantenso Skido-Achulo
121 visualizações8 slides
1402.1842.pdf por
1402.1842.pdf1402.1842.pdf
1402.1842.pdfsanthoshyadav23
73 visualizações6 slides
comm120 week 6 discussion.docx por
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
3 visualizações2 slides
comm120 week 6 discussion.docx por
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
4 visualizações2 slides

Similar a Cybersecurity(20)

Keep in touch for cyber peace_20150212 por Kunihiro Maeda
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda757 visualizações
Top Cyber News MAGAZINE. Troels Oerting por TopCyberNewsMAGAZINE
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE29 visualizações
Trends_in_my_profession(revised) por Mantenso Skido-Achulo
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
Mantenso Skido-Achulo121 visualizações
1402.1842.pdf por santhoshyadav23
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
santhoshyadav2373 visualizações
comm120 week 6 discussion.docx por write12
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
write123 visualizações
comm120 week 6 discussion.docx por write31
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
write314 visualizações
Cyber savvy (2) por naveen p
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p511 visualizações
Governmental Support For Cyber Physical System Research por Martha Malone
Governmental Support For Cyber Physical System ResearchGovernmental Support For Cyber Physical System Research
Governmental Support For Cyber Physical System Research
Martha Malone5 visualizações
Cybersecurity Business Risk, Literature Review por Enow Eyong
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
Enow Eyong2.4K visualizações
Cyber attack awareness and prevention in network security por IJICTJOURNAL
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
IJICTJOURNAL6 visualizações
What Are Strategies Used For The Home And Professional... por Vickie Western
What Are Strategies Used For The Home And Professional...What Are Strategies Used For The Home And Professional...
What Are Strategies Used For The Home And Professional...
Vickie Western3 visualizações
B susser researchpaper (3) por Bradley Susser
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
Bradley Susser996 visualizações
Delusions of-safety-cyber-savvy-ceo por João Rufino de Sales
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
João Rufino de Sales1.8K visualizações
WEF - Personal Data New Asset Report2011 por Vincent Ducrey
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011
Vincent Ducrey2.1K visualizações
Cybersecurity PowerPoint Presentation por Ritik Kumar
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar10.3K visualizações
Cyber Security Incident Response por PECB
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB 11K visualizações

Último

Classification of crude drugs.pptx por
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
83 visualizações13 slides
Ch. 7 Political Participation and Elections.pptx por
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptxRommel Regala
90 visualizações11 slides
Narration ppt.pptx por
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptxTARIQ KHAN
131 visualizações24 slides
Are we onboard yet University of Sussex.pptx por
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
93 visualizações7 slides
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
359 visualizações50 slides
ICS3211_lecture 08_2023.pdf por
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
127 visualizações30 slides

Último(20)

Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1483 visualizações
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala90 visualizações
Narration ppt.pptx por TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN131 visualizações
Are we onboard yet University of Sussex.pptx por Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc93 visualizações
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP359 visualizações
ICS3211_lecture 08_2023.pdf por Vanessa Camilleri
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri127 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 574 visualizações
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239291 visualizações
Class 10 English notes 23-24.pptx por TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN125 visualizações
231112 (WR) v1 ChatGPT OEB 2023.pdf por WilfredRubens.com
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdf
WilfredRubens.com151 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA244 visualizações
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL95 visualizações
MIXING OF PHARMACEUTICALS.pptx por Anupkumar Sharma
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptx
Anupkumar Sharma66 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington148 visualizações
Class 10 English lesson plans por TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN280 visualizações
Java Simplified: Understanding Programming Basics por Akshaj Vadakkath Joshy
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming Basics
Akshaj Vadakkath Joshy273 visualizações
Psychology KS5 por WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch81 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por SukhwinderSingh895865
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865518 visualizações
Solar System and Galaxies.pptx por DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar89 visualizações

Cybersecurity

  • 1. THE AGE OF CYBERSECURITY By Ben Liu
  • 2. With the rapid digitization of consumers’ lives and enterprise records, cybersecurity is a rapidly growing global issue that will require the combined cooperation of consumers, corporations, and government alike
  • 3. Research from Juniper Research suggest that cybercrime costs will rise to $2.1 trillion globally by 2019[1]
  • 4. Technology and social media is an indispensable part of our lives. It gives us a psychological boost – “we use media to meet our real needs, delight needs, and secret needs” [2] Thus, there is a media symbiosis: we need media and media need us
  • 5. The need for technology and media is for everyone – not just younger generations Studies have shown from the university of Illinois that when older adults acquire technologies and develop digital literacies, they may acquire a higher standard of life [3]
  • 6. This creates huge vulnerabilities, when we pour our personal lives into the online world: online activity data, user passwords, home addresses, private chats, etc.…
  • 7. Everywhere that there is technology, there can exist a cybersecurity vulnerability where our personal data is at stake: Bruce Schneier, a cyber-security expert and author worries that readers may steer clear of digital books on sensitive subjects such as health, sexuality, and security – including his own works – out of fear that their reading is being tracked. [4]
  • 8. Cyber hacks have grown rapidly in recent years, causing a spark in the cybersecurity industry (25%) 0% 25% 50% 75% 100% 125% 150% 175% 200% 2011 2012 2013 2014 2015 2016 2017 BVP Cyber Index Nasdaq Index S&P Index Dow Jones Major Hacks Dec 19, 2013 Target, 70MM Apr 26, 2013 LivingSocial, 50MM May 21, 2014 eBay, 145MM Feb 4, 2015 Anthem, 80MM Nov 24, 2014 Sony Pictures BVP Cyber Index: 29 Publicly Traded Cybersecurity Companies 2011-2017 [5]
  • 9. Research from Juniper Research forecasts the average cost of a data breach in 2020 will exceed $150 million[1], as more business infrastructure gets connected Today, most businesses are still overconfident in their cybersecurity – it’s low risk but with high damage
  • 10. But corporations are not the only ones who should be ramping up on the cybersecurity initiative… cybersecurity starts with individuals like you and me…
  • 11. According to Cisco, Facebook scams were the most common form of malware distributed in 2015[6]
  • 12. Facebook reported for 2015 that up to 2% of their monthly average users were false = 31MM [7] Twitter estimates 5% = 10.75MM [8] LinkedIn openly admitted that “we don’t have a reliable system for identifying and counting duplicate or fraudulent accounts” [9]
  • 13. Cyber criminals are now weaponizing social media sites and their data Anthem Inc, a major American health insurance company, was hacked in 2015 leading to 78.8MM records stolen[10]
  • 14. How did this happen – LinkedIn was a key tool for reconnaissance (scraping of public social data and social engineering tactics) for the cyber criminals who executed Anthem Health’s 2015 breach[9]
  • 15. President Obama has issued an executive order aimed at improving critical infrastructure In addition, in 2016, Obama included a budget proposal of $19BN for cybersecurity – a $5BN increase YoY [11]
  • 16. But Cybersecurity cannot be fought just by the private sector…
  • 17. There is a need for a public campaign on cybersecurity – similar to how campaigns were launched in the past to raise awareness on issues like smoking or recycling[12]
  • 18. Steven Weber, faculty director at the UC Berkeley Center for Long-Term Cybersecurity acknowledged part of the problem for many people is that cybersecurity still feels like a technical issue related to the protection of computer networks. It’s time to “demystify the network” for folds outside the core tech sector, he said. [12]
  • 19. The problem of cybersecurity is like second-hand smoke – people are motivated by the negative externalities
  • 20. But cybersecurity doesn’t just come as a personal cost, it affects the community as a whole – individuals, businesses, and government alike need to work together to prevent the rapid growth of digital threats
  • 21. Works Cited • [1] "Cybercrime Will Cost Businesses Over $2 Trillion by 2019." Cybercrime Will Cost Businesses Over $2 Trillion by 2019. N.p., n.d. Web. 05 Mar. 2017. < https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion> • [2] Matrix, Sydney Eve. FILM 240. Module 01, Lecture 02 N.p.: n.p., n.d. Print. • [3] Kim, Kyungo, Chodzko-Zajko Wojtek, Andiara Schwingel, and Deana C. McDonagh. "Understanding Older Individuals’ Emotional Responses to New Technology Associated with Healthy Lifestyle Choice." Journal of Physical Education and Sort (2014): 138-47. Web. • [4] Alter, Alexandra. "Your E-Book Is Reading You." The Wall Street Journal. Dow Jones & Company, 19 July 2012. Web. 05 Mar. 2017. • [5] "| Bessemer Venture Partners." | Bessemer Venture Partners. N.p., n.d. Web. 05 Mar. 2017. • [6] "Cisco 2016 Midyear Cybersecurity Report." TS Ad. N.p., n.d. Web. 05 Mar. 2017. <https://newsroom.cisco.com/press-release- content?type=webcontent&articleId=1780586> • [7] "SEC Filings Details." Facebook - Financials - SEC Filings Details. N.p., n.d. Web. 05 Mar. 2017. • [8] D'Onfro, Jillian. "Twitter Admits 5% Of Its 'Users' Are Fake." Business Insider. Business Insider, 03 Oct. 2013. Web. 05 Mar. 2017. • [9] "Why Social Media Sites Are The New Cyber Weapons Of Choice." Dark Reading. N.p., n.d. Web. 18 Mar. 2017."Executive Order -- Improving Critical Infrastructure Cybersecurity." National Archives and Records Administration. National Archives and Records Administration, n.d. Web. 05 Mar. 2017. • [10] Mathews, Anna Wilde. "Anthem: Hacked Database Included 78.8 Million People." The Wall Street Journal. Dow Jones & Company, 24 Feb. 2015. Web. 05 Mar. 2017. • [11] Reuters. "Obama Budget Proposal Includes $19 Billion for Cybersecurity." Fortune.com. Fortune, 09 Feb. 2016. Web. 18 Mar. 2017. • [12] "Thinking Ahead: Cybersecurity In The Trump Era." Dark Reading. N.p., n.d. Web. 05 Mar. 2017. • All photos and images obtained from Pixabay <https://pixabay.com/>. “All images and videos on Pixabay are released free of copyrights under Creative Commons CC0. You may download, modify, distribute, and use them royalty free for anything you like, even in commercial applications. Attribution is not required.”