Professional Documents
Culture Documents
Lesson A Cybercrime Tsunami
Lesson A Cybercrime Tsunami
Look at the words and word combinations in bold to make sure you know
them, as this will facilitate your understanding of the abstract.
A CYBERCRIME TSUNAMI
While it is true that violent crime has dropped precipitously in the developed world
over the past 2 decades, in fact there is a tsunami of criminal activity on the horizon.
It is in the form of cybercrime, and its impact on individual, corporate and national
security will be profound in 2023 and the years to come.
Today’s transnational organized-crime groups are technologically sophisticated, and
their business plans have a lot in common with global technology companies. Their
illicit enterprises employ the latest business-management strategies well before
they appear in the Harvard Business Review. Modern criminal start-ups are using
gamification techniques, as well as offering incentives such as sports cars to
hackers who invent the most profitable scams.
And cybercrime is about to go 3D (enter the 3rd dimension – leaping into the world
that surrounds us). Physical objects, increasingly embedded with computer chips,
are becoming hosts of information technology. Televisions, cars, refrigerators,
smoke detectors and pacemakers now connect to the internet in a phenomenon
known as the internet of things (IOT).
The insecurity of IOT is troubling, as all objects around us morph into computer
code. Smart homes and smart grids sound like a great idea, until one realizes that the
computer code driving these is entirely hackable. And it’s not just bits and bytes
that get manipulated, but atoms too, allowing malicious people to manipulate objects
half a world away.
- how much will cybercrime cost businesses a year in the near future?
- how many new devices will be connected to the internet by 2030?
- how much will IOT generate in value to global economy in 2 years’
time/ by 2025?
- how much might businesses have to invest in cyber-security measures
next year?
COUNTER-AT-HACK
III. What could be done about this world-wide wave of cybercrime? How can
businesses fight back? Working in teams and using the following clues, work
up strategies of the most effective ways to fight cyber-crime.
Clues:
Ingredients of security: identity, virtualization, threat intelligence
Virtualization: run sessions off one big server, virtual sessions are easy to
monitor, up-to-date software, flag up and close down suspicious activity: snooping
around one’s network, browsing the internet, transferring info at odd hours.
Threat intelligence: attackers are vulnerable, defenders can turn the tables on
them: infiltrate chat rooms and marketplaces, honeypots, honeynets, identify
enemies, hire ex-spies.
Solid cyber-security is like is like a strong immune system. Good health plus
personal and public hygiene give it the best chance, but not invincibility.
Manual typewriters and carbon paper will be the must-have technology of the
future.