Posts Tagged ‘cyber security’

Role of Blockchain in Web 3.0

Role of Blockchain in Web 3.0

Web 3.0 is the third generation of internet services which provide websites and applications with the technology to run. Web 3.0 is set to be powered by AI and peer-to-peer applications like blockchain. The key difference between Web 2.0 and Web 3.0 is that Web 3.0 is more focused on using innovative technologies like machine learning and AI to create more personalized content for each user. It is also expected that Web 3.0 will be more secure than its predecessors because of the system it is built upon.

Blockchains are made up of blocks that store information. Each block has a unique “hash” that differentiates it from other blocks. These blocks are then connected by a chain in chronological order. The information stored in these blocks is permanent, which makes it a very secure way to complete online transactions.
This is why cryptocurrencies, like Bitcoin, are built on blockchain technology.

+++++++++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Internet of Thing Security Problem

The Internet of Things’ Persistent Security Problem

  • The threat of ransomware
  • IoT’s special vulnerabilities
  • Potential solutions

In what is currently a fragmented regulatory and standards landscape internationally, the EU has taken strongest interest in IoT, but from a competition perspective. The EU Commission is investigating competition questions related especially to the three dominant voice-assistants (Alexa, Google Assistant, Siri), a node for issues of data privacy and interoperability. Its recently released report hardly mentions security.

+++++++++++++++++
more on IoT in this iMS blog
https://blog.stcloudstate.edu/ims?s=internet+of+things

microcredentials Australia

Stacks on: Get the max from micro-credentials

https://www.smh.com.au/business/workplace/shift-to-short-courses-and-online-learning-to-expand-careers-20210322-p57cvl.html

“This measure will provide additional options for students and the recently unemployed to engage with higher education across a wider range of fields, which will help further the position of the nation and our workforce to move out of the economic downturn,” a department spokesman said.

“There is some crossover between the terms ‘micro-credential’ and ‘short course’; both are generally something shorter than a full qualification. The short courses are a type of micro-credential. The short course is a credit-bearing micro-credential, meaning that it can be used to ‘stack’ into a full qualification at a later time.”

” The Australian Cyber Security Growth Network said the cyber security workforce had grown by 4000 to 26,500 since 2017. The sector grew by 6 per cent a year, compared with overall national growth of 2 per cent a year.”

+++++++++++++++
more on microcredentials in this IMS blog
https://blog.stcloudstate.edu/ims?s=microcredential

defense in the AI era

U.S. is ‘not prepared to defend or compete in the A.I. era,’ says expert group chaired by Eric Schmidt – In a report, it warned that AI systems will be used in the “pursuit of power” and that “AI will not stay in the domain of superpowers or the realm of science fiction.” from r/Futurology

https://www.cnbc.com/2021/03/02/us-not-prepared-to-defend-or-compete-in-ai-era-says-eric-schmidt-group.html

The National Security Commission on AI warned in a 756-page report on Monday that China could soon replace the U.S. as the world’s “AI superpower” and said there are serious military implications to consider.

The 15 members of the commission include technologists, national security professionals, business executives and academic leaders. Among them are Amazon’s next CEO, Andy Jassy, Oracle CEO Safra Catz, Microsoft Chief Scientific Officer Eric Horvitz and Google Cloud AI chief Andrew Moore.

China has stated that it wants to be a global leader in AI by 2030. The report’s authors have said it is vital that the U.S. does all it can to eliminate the chance of this happening.
+++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

AI data and infodemic

AI progress depends on us using less data, not more

A minimal-data practice will enable several AI-driven industries — including cyber security, which is my own area of focus — to become more efficient, accessible, independent, and disruptive.

1. AI has a compute addiction. The growing fear is that new advancements in experimental AI research, which frequently require formidable datasets supported by an appropriate compute infrastructure, might be stemmed due to compute and memory constraints, not to mention the financial and environmental costs of higher compute needs.

MIT researchers estimated that “three years of algorithmic improvement is equivalent to a 10 times increase in computing power.”

2. Big data can mean more spurious noise. 

++++++++++++++
more on infodemic in this IMS blog
https://blog.stcloudstate.edu/ims?s=infodemic

Soviet Union Internet domain

TIL that the Soviet Union was issued a top-level internet domain just before its 1991 collapse. The domain was never deactivated and has since become a haven for cybercriminals due to its lack of regulation. from r/todayilearned

Tons of Hackers Are Hanging Out in Old Soviet Cyberspace

https://gizmodo.com/tons-of-hackers-are-hanging-out-in-old-soviet-cyberspac-510829003

Until recently, the .su domain has been the home of weirdbut legitimate sites. But when the administrators for Russia’s .ru got a little more strict about what they would and wouldn’t allow, scammers and hackers alike began to migrate to the out-dated .su, which saw its population of sites double in 2011, and again in 2012.

++++++++++++++

Old Soviet Union domain name attracts cybercriminal interest

https://www.foxnews.com/tech/old-soviet-union-domain-name-attracts-cybercriminal-interest

++++++++++++
more on the Internet in this IMS blog
https://blog.stcloudstate.edu/ims?s=Internet

Twitter hacked

Twitter Continues to Face Scrutiny Amidst Political Backlash Due to High-Profile Hack

By IGI Global on Oct 22, 2020
https://www.igi-global.com/newsroom/archive/year-old-hack-twitter-could/4668/
the New York Department of Financial Services (DFS) has released an investigation report on Twitter. This report outlines the high profile attack that overtook popular celebrity accounts (including former U.S. president Barack Obama, celebrity and businesswoman Kim Kardashian West, Amazon mogul Jeff Bezos, and other notable celebrities) and led to the theft of US$ 118,000 in bitcoin.
DFS has called on the U.S. government to regulate social media platforms, such as Twitter and Facebook, on cybersecurity, along with antitrust and content moderation.
Prof. Sachin Tiwari, from Jawaharlal Nehru University, India, analyzes the meaning and nature of cybercrime legislation as well as the scope of policy formation in the global narrative of cybersecurity in his article, “Cyber Crime Regulation, Challenges, and Response,” sourced from the  Encyclopedia of Criminal Activities and the Deep Web (IGI Global).
++++++++++++++++++++++++++++
more on Twitter in this IMS blog
https://blog.stcloudstate.edu/ims?s=twitter

EU sanctions hackers

EU sanctions China, Russia, and North Korea for past hacks

The EU has imposed today its first-ever economical sanctions following cyber-attacks from foreign adversaries.

https://www.zdnet.com/article/eu-sanctions-china-russia-and-north-korea-for-past-hacks/

+++++++++++++++++

EU sanctions Russian intelligence, North Korean, Chinese firms over alleged cyberattacks

https://www.reuters.com/article/us-eu-cybercrime-russia-sanctions-idUSKCN24V32Q

+++++++++++++++++++

Pompeo praises EU over sanctions targeting cyberattacks from China, Russia

https://www.msn.com/en-us/news/world/pompeo-praises-eu-over-sanctions-targeting-cyberattacks-from-china-russia/ar-BB17nVlN

++++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

Teaching Cybersecurity

Teaching Cybersecurity: What You Need to Know

Wednesday, Nov. 13 @ 4 pm CT

REGISTER HERE

In 2014, there were 1 million unfilled cybersecurity jobs globally. By 2021, it’s estimated that number will grow to 3.5 million. Exposing K-12 students to cybersecurity through a well-designed curriculum and set of activities will help alleviate the shortage by increasing the interest and skills of the new generation. Unfortunately, current secondary school curricula across the country leave students and educators with minimal or no exposure to cybersecurity topics.
Many K-12 school districts are looking for ways to create cybersecurity training programs. This edWebinar will focus on best practices for teaching and learning cybersecurity skills, including the following learning objectives:
  • What skills does the instructor need to teach an introductory cybersecurity course?
  • What are some best practices for teaching an introductory cybersecurity course?
  • Where can instructors get help teaching their courses?
  • What tools/resources do students and instructors need to teach an introductory cybersecurity course?
This edWebinar will be of interest to middle school through higher education teachers and school and district leaders. There will be time to have your questions answered at the end of the presentation. Learn more.

++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

1 2 3 4