SlideShare a Scribd company logo
1 of 21
Download to read offline
THE AGE OF CYBERSECURITY
By Ben Liu
With the rapid digitization
of consumers’ lives and
enterprise records,
cybersecurity is a rapidly
growing global issue that
will require the combined
cooperation of
consumers, corporations,
and government alike
Research from Juniper Research suggest that cybercrime
costs will rise to $2.1 trillion globally by 2019[1]
Technology and social
media is an indispensable
part of our lives. It gives us a
psychological boost – “we
use media to meet our real
needs, delight needs, and
secret needs” [2]
Thus, there is a media
symbiosis: we need media
and media need us
The need for technology
and media is for everyone –
not just younger
generations
Studies have shown from
the university of Illinois that
when older adults acquire
technologies and develop
digital literacies, they may
acquire a higher standard
of life [3]
This creates huge vulnerabilities, when we pour our
personal lives into the online world: online activity data,
user passwords, home addresses, private chats, etc.…
Everywhere that there is technology, there can exist a
cybersecurity vulnerability where our personal data is at
stake:
Bruce Schneier, a cyber-security expert and author worries
that readers may steer clear of digital books on sensitive
subjects such as health, sexuality, and security – including
his own works – out of fear that their reading is being
tracked. [4]
Cyber hacks have grown rapidly in recent years, causing a
spark in the cybersecurity industry
(25%)
0%
25%
50%
75%
100%
125%
150%
175%
200%
2011 2012 2013 2014 2015 2016 2017
BVP Cyber Index
Nasdaq Index
S&P Index
Dow Jones
Major Hacks
Dec 19, 2013
Target, 70MM
Apr 26, 2013
LivingSocial, 50MM
May 21, 2014
eBay, 145MM
Feb 4, 2015
Anthem, 80MM
Nov 24, 2014
Sony Pictures
BVP Cyber Index: 29 Publicly Traded Cybersecurity Companies 2011-2017 [5]
Research from Juniper Research forecasts the average
cost of a data breach in 2020 will exceed $150 million[1],
as more business infrastructure gets connected
Today, most businesses are still overconfident in their
cybersecurity – it’s low risk but with high damage
But corporations are not the only ones who should be
ramping up on the cybersecurity initiative… cybersecurity
starts with individuals like you and me…
According to Cisco, Facebook scams were the most
common form of malware distributed in 2015[6]
Facebook reported for 2015 that up to 2% of their monthly
average users were false = 31MM [7]
Twitter estimates 5% = 10.75MM [8]
LinkedIn openly admitted that “we don’t have a reliable
system for identifying and counting duplicate or
fraudulent accounts” [9]
Cyber criminals are now weaponizing social media sites
and their data
Anthem Inc, a major American health insurance company,
was hacked in 2015 leading to 78.8MM records stolen[10]
How did this happen –
LinkedIn was a key tool for
reconnaissance (scraping of
public social data and social
engineering tactics) for the
cyber criminals who
executed Anthem Health’s
2015 breach[9]
President Obama has issued an executive order aimed at
improving critical infrastructure
In addition, in 2016, Obama included a budget proposal
of $19BN for cybersecurity – a $5BN increase YoY [11]
But Cybersecurity cannot be fought just by the private
sector…
There is a need for a public campaign on cybersecurity
– similar to how campaigns were launched in the past to
raise awareness on issues like smoking or recycling[12]
Steven Weber, faculty director at the UC Berkeley Center
for Long-Term Cybersecurity acknowledged part of the
problem for many people is that cybersecurity still feels
like a technical issue related to the protection of
computer networks. It’s time to “demystify the network”
for folds outside the core tech sector, he said. [12]
The problem of
cybersecurity is like
second-hand smoke –
people are motivated by
the negative externalities
But cybersecurity doesn’t just come as a personal cost, it
affects the community as a whole – individuals,
businesses, and government alike need to work together
to prevent the rapid growth of digital threats
Works Cited
• [1] "Cybercrime Will Cost Businesses Over $2 Trillion by 2019." Cybercrime Will Cost Businesses Over $2 Trillion by 2019. N.p., n.d. Web.
05 Mar. 2017. < https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion>
• [2] Matrix, Sydney Eve. FILM 240. Module 01, Lecture 02 N.p.: n.p., n.d. Print.
• [3] Kim, Kyungo, Chodzko-Zajko Wojtek, Andiara Schwingel, and Deana C. McDonagh. "Understanding Older Individuals’ Emotional
Responses to New Technology Associated with Healthy Lifestyle Choice." Journal of Physical Education and Sort (2014): 138-47. Web.
• [4] Alter, Alexandra. "Your E-Book Is Reading You." The Wall Street Journal. Dow Jones & Company, 19 July 2012. Web. 05 Mar. 2017.
• [5] "| Bessemer Venture Partners." | Bessemer Venture Partners. N.p., n.d. Web. 05 Mar. 2017.
• [6] "Cisco 2016 Midyear Cybersecurity Report." TS Ad. N.p., n.d. Web. 05 Mar. 2017. <https://newsroom.cisco.com/press-release-
content?type=webcontent&articleId=1780586>
• [7] "SEC Filings Details." Facebook - Financials - SEC Filings Details. N.p., n.d. Web. 05 Mar. 2017.
• [8] D'Onfro, Jillian. "Twitter Admits 5% Of Its 'Users' Are Fake." Business Insider. Business Insider, 03 Oct. 2013. Web. 05 Mar. 2017.
• [9] "Why Social Media Sites Are The New Cyber Weapons Of Choice." Dark Reading. N.p., n.d. Web. 18 Mar. 2017."Executive Order --
Improving Critical Infrastructure Cybersecurity." National Archives and Records Administration. National Archives and Records
Administration, n.d. Web. 05 Mar. 2017.
• [10] Mathews, Anna Wilde. "Anthem: Hacked Database Included 78.8 Million People." The Wall Street Journal. Dow Jones & Company,
24 Feb. 2015. Web. 05 Mar. 2017.
• [11] Reuters. "Obama Budget Proposal Includes $19 Billion for Cybersecurity." Fortune.com. Fortune, 09 Feb. 2016. Web. 18 Mar. 2017.
• [12] "Thinking Ahead: Cybersecurity In The Trump Era." Dark Reading. N.p., n.d. Web. 05 Mar. 2017.
• All photos and images obtained from Pixabay <https://pixabay.com/>. “All images and videos on Pixabay are released free of
copyrights under Creative Commons CC0. You may download, modify, distribute, and use them royalty free for anything you like, even
in commercial applications. Attribution is not required.”

More Related Content

What's hot

Content as Advertisement
Content as AdvertisementContent as Advertisement
Content as AdvertisementRyan Noble
 
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...Peggy Men
 
How much is too much? Social media in moderation.
How much is too much? Social media in moderation.How much is too much? Social media in moderation.
How much is too much? Social media in moderation.Kaylee Pietroski
 
Damaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemDamaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemBrett Kammer
 
The New Ads: Content Marketing and Earned Media
The New Ads: Content Marketing and Earned MediaThe New Ads: Content Marketing and Earned Media
The New Ads: Content Marketing and Earned MediaDey Sheridan
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social NetworksCharlene Li
 
The Age of the Omni-Channel Shopper
The Age of the Omni-Channel ShopperThe Age of the Omni-Channel Shopper
The Age of the Omni-Channel ShopperKia Kortelainen
 
Online publishers versus Ad-blockers
Online publishers versus Ad-blockersOnline publishers versus Ad-blockers
Online publishers versus Ad-blockersYanwen Zhang
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYOlivia Charlebois
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeKrista Dunn
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Donovan Gopaul
 
How Creators are Thriving Digitally
How Creators are Thriving DigitallyHow Creators are Thriving Digitally
How Creators are Thriving DigitallyLeah Wells
 
The (Un)protected Consumer
The (Un)protected ConsumerThe (Un)protected Consumer
The (Un)protected Consumerjedo745
 
Ad Block - Blocking Ad Publishers' Success
Ad Block - Blocking Ad Publishers' SuccessAd Block - Blocking Ad Publishers' Success
Ad Block - Blocking Ad Publishers' SuccessShraddha Banglorewala
 
LEPC: Social media and disasters
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disastersDuty Officer
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media MarketingLinnea Jonsson
 
Richard Edelman -- New Media Academic Summit 2010
Richard Edelman -- New Media Academic Summit 2010Richard Edelman -- New Media Academic Summit 2010
Richard Edelman -- New Media Academic Summit 2010edelmanmarketing
 
Machine Learning: The Next Revolution in Online Advertising
Machine Learning: The Next Revolution in Online AdvertisingMachine Learning: The Next Revolution in Online Advertising
Machine Learning: The Next Revolution in Online AdvertisingCameron Hudson
 
Like Minds: Digital Journalism in 2008
Like Minds: Digital Journalism in 2008Like Minds: Digital Journalism in 2008
Like Minds: Digital Journalism in 2008Anthony Moor
 

What's hot (20)

Content as Advertisement
Content as AdvertisementContent as Advertisement
Content as Advertisement
 
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
 
How much is too much? Social media in moderation.
How much is too much? Social media in moderation.How much is too much? Social media in moderation.
How much is too much? Social media in moderation.
 
Damaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemDamaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating Them
 
The New Ads: Content Marketing and Earned Media
The New Ads: Content Marketing and Earned MediaThe New Ads: Content Marketing and Earned Media
The New Ads: Content Marketing and Earned Media
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social Networks
 
The Age of the Omni-Channel Shopper
The Age of the Omni-Channel ShopperThe Age of the Omni-Channel Shopper
The Age of the Omni-Channel Shopper
 
Online publishers versus Ad-blockers
Online publishers versus Ad-blockersOnline publishers versus Ad-blockers
Online publishers versus Ad-blockers
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in Cybercrime
 
Film 240 Flipbook
Film 240 Flipbook Film 240 Flipbook
Film 240 Flipbook
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
How Creators are Thriving Digitally
How Creators are Thriving DigitallyHow Creators are Thriving Digitally
How Creators are Thriving Digitally
 
The (Un)protected Consumer
The (Un)protected ConsumerThe (Un)protected Consumer
The (Un)protected Consumer
 
Ad Block - Blocking Ad Publishers' Success
Ad Block - Blocking Ad Publishers' SuccessAd Block - Blocking Ad Publishers' Success
Ad Block - Blocking Ad Publishers' Success
 
LEPC: Social media and disasters
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disasters
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media Marketing
 
Richard Edelman -- New Media Academic Summit 2010
Richard Edelman -- New Media Academic Summit 2010Richard Edelman -- New Media Academic Summit 2010
Richard Edelman -- New Media Academic Summit 2010
 
Machine Learning: The Next Revolution in Online Advertising
Machine Learning: The Next Revolution in Online AdvertisingMachine Learning: The Next Revolution in Online Advertising
Machine Learning: The Next Revolution in Online Advertising
 
Like Minds: Digital Journalism in 2008
Like Minds: Digital Journalism in 2008Like Minds: Digital Journalism in 2008
Like Minds: Digital Journalism in 2008
 

Viewers also liked

Affects of Media on the Mind
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the MindJanvi Pattni
 
Film assignment 2 - Connie Li
Film assignment 2 - Connie LiFilm assignment 2 - Connie Li
Film assignment 2 - Connie LiConnie Li
 
Comic Books - The Superhero of Multimodal Literacy
Comic Books - The Superhero of Multimodal LiteracyComic Books - The Superhero of Multimodal Literacy
Comic Books - The Superhero of Multimodal LiteracyErin Labrie
 
Film 240 Assignment 02 Flipbook
Film 240 Assignment 02 FlipbookFilm 240 Assignment 02 Flipbook
Film 240 Assignment 02 Flipbooktryevenharder
 
E-Books: The New Business of Writing for E-Reading
E-Books: The New Business of Writing for E-ReadingE-Books: The New Business of Writing for E-Reading
E-Books: The New Business of Writing for E-ReadingJackKHayward
 
The Death of Print Magazines
The Death of Print MagazinesThe Death of Print Magazines
The Death of Print MagazinesCharlie Hart
 
Joanna Moroz - FILM240 Flipbook
Joanna Moroz - FILM240 FlipbookJoanna Moroz - FILM240 Flipbook
Joanna Moroz - FILM240 FlipbookJoanna Moroz
 
Film 240 - flip book
Film 240 - flip bookFilm 240 - flip book
Film 240 - flip bookJamie Black
 
Flim 240 Flipbook
Flim 240 FlipbookFlim 240 Flipbook
Flim 240 FlipbookQianLi Chen
 
Flipbook- Taryn Cates
Flipbook- Taryn CatesFlipbook- Taryn Cates
Flipbook- Taryn CatesTaryn Cates
 
Michael Nguyen flipbook
Michael Nguyen flipbookMichael Nguyen flipbook
Michael Nguyen flipbookMichael Nguyen
 
Technology, pornography and visual taste
Technology, pornography and visual tasteTechnology, pornography and visual taste
Technology, pornography and visual tasteOlivia Hobbs
 
Olivia Hannigan - Flipbook
Olivia Hannigan - FlipbookOlivia Hannigan - Flipbook
Olivia Hannigan - FlipbookOlivia Hannigan
 
Is Our Addiction Killing Us?
Is Our Addiction Killing Us?Is Our Addiction Killing Us?
Is Our Addiction Killing Us?Valerie Khordoc
 
Who's Reading Over Your Shoulder?
Who's Reading Over Your Shoulder? Who's Reading Over Your Shoulder?
Who's Reading Over Your Shoulder? Hann9110
 
The Proliferation of Technology: Too Much of a Good Thing
The Proliferation of Technology: Too Much of a Good ThingThe Proliferation of Technology: Too Much of a Good Thing
The Proliferation of Technology: Too Much of a Good ThingJoshua Rosenbaum
 

Viewers also liked (20)

Affects of Media on the Mind
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the Mind
 
Film assignment 2 - Connie Li
Film assignment 2 - Connie LiFilm assignment 2 - Connie Li
Film assignment 2 - Connie Li
 
Comic Books - The Superhero of Multimodal Literacy
Comic Books - The Superhero of Multimodal LiteracyComic Books - The Superhero of Multimodal Literacy
Comic Books - The Superhero of Multimodal Literacy
 
Film 240 Assignment 02 Flipbook
Film 240 Assignment 02 FlipbookFilm 240 Assignment 02 Flipbook
Film 240 Assignment 02 Flipbook
 
E-Books: The New Business of Writing for E-Reading
E-Books: The New Business of Writing for E-ReadingE-Books: The New Business of Writing for E-Reading
E-Books: The New Business of Writing for E-Reading
 
In stagram ads
In stagram adsIn stagram ads
In stagram ads
 
The Death of Print Magazines
The Death of Print MagazinesThe Death of Print Magazines
The Death of Print Magazines
 
Joanna Moroz - FILM240 Flipbook
Joanna Moroz - FILM240 FlipbookJoanna Moroz - FILM240 Flipbook
Joanna Moroz - FILM240 Flipbook
 
Film 240 - flip book
Film 240 - flip bookFilm 240 - flip book
Film 240 - flip book
 
Brands & Content Creators
Brands & Content CreatorsBrands & Content Creators
Brands & Content Creators
 
Flim 240 Flipbook
Flim 240 FlipbookFlim 240 Flipbook
Flim 240 Flipbook
 
Flipbook- Taryn Cates
Flipbook- Taryn CatesFlipbook- Taryn Cates
Flipbook- Taryn Cates
 
Michael Nguyen flipbook
Michael Nguyen flipbookMichael Nguyen flipbook
Michael Nguyen flipbook
 
Technology, pornography and visual taste
Technology, pornography and visual tasteTechnology, pornography and visual taste
Technology, pornography and visual taste
 
Flipbook
FlipbookFlipbook
Flipbook
 
Olivia Hannigan - Flipbook
Olivia Hannigan - FlipbookOlivia Hannigan - Flipbook
Olivia Hannigan - Flipbook
 
Is Our Addiction Killing Us?
Is Our Addiction Killing Us?Is Our Addiction Killing Us?
Is Our Addiction Killing Us?
 
Who's Reading Over Your Shoulder?
Who's Reading Over Your Shoulder? Who's Reading Over Your Shoulder?
Who's Reading Over Your Shoulder?
 
The Proliferation of Technology: Too Much of a Good Thing
The Proliferation of Technology: Too Much of a Good ThingThe Proliferation of Technology: Too Much of a Good Thing
The Proliferation of Technology: Too Much of a Good Thing
 
Film240flipbook
Film240flipbookFilm240flipbook
Film240flipbook
 

Similar to Cybersecurity

Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityIJICTJOURNAL
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)Bradley Susser
 
WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011Vincent Ducrey
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 

Similar to Cybersecurity (20)

Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
GITA April 2015 Newsletter
GITA April 2015 NewsletterGITA April 2015 Newsletter
GITA April 2015 Newsletter
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 

Recently uploaded (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 

Cybersecurity

  • 1. THE AGE OF CYBERSECURITY By Ben Liu
  • 2. With the rapid digitization of consumers’ lives and enterprise records, cybersecurity is a rapidly growing global issue that will require the combined cooperation of consumers, corporations, and government alike
  • 3. Research from Juniper Research suggest that cybercrime costs will rise to $2.1 trillion globally by 2019[1]
  • 4. Technology and social media is an indispensable part of our lives. It gives us a psychological boost – “we use media to meet our real needs, delight needs, and secret needs” [2] Thus, there is a media symbiosis: we need media and media need us
  • 5. The need for technology and media is for everyone – not just younger generations Studies have shown from the university of Illinois that when older adults acquire technologies and develop digital literacies, they may acquire a higher standard of life [3]
  • 6. This creates huge vulnerabilities, when we pour our personal lives into the online world: online activity data, user passwords, home addresses, private chats, etc.…
  • 7. Everywhere that there is technology, there can exist a cybersecurity vulnerability where our personal data is at stake: Bruce Schneier, a cyber-security expert and author worries that readers may steer clear of digital books on sensitive subjects such as health, sexuality, and security – including his own works – out of fear that their reading is being tracked. [4]
  • 8. Cyber hacks have grown rapidly in recent years, causing a spark in the cybersecurity industry (25%) 0% 25% 50% 75% 100% 125% 150% 175% 200% 2011 2012 2013 2014 2015 2016 2017 BVP Cyber Index Nasdaq Index S&P Index Dow Jones Major Hacks Dec 19, 2013 Target, 70MM Apr 26, 2013 LivingSocial, 50MM May 21, 2014 eBay, 145MM Feb 4, 2015 Anthem, 80MM Nov 24, 2014 Sony Pictures BVP Cyber Index: 29 Publicly Traded Cybersecurity Companies 2011-2017 [5]
  • 9. Research from Juniper Research forecasts the average cost of a data breach in 2020 will exceed $150 million[1], as more business infrastructure gets connected Today, most businesses are still overconfident in their cybersecurity – it’s low risk but with high damage
  • 10. But corporations are not the only ones who should be ramping up on the cybersecurity initiative… cybersecurity starts with individuals like you and me…
  • 11. According to Cisco, Facebook scams were the most common form of malware distributed in 2015[6]
  • 12. Facebook reported for 2015 that up to 2% of their monthly average users were false = 31MM [7] Twitter estimates 5% = 10.75MM [8] LinkedIn openly admitted that “we don’t have a reliable system for identifying and counting duplicate or fraudulent accounts” [9]
  • 13. Cyber criminals are now weaponizing social media sites and their data Anthem Inc, a major American health insurance company, was hacked in 2015 leading to 78.8MM records stolen[10]
  • 14. How did this happen – LinkedIn was a key tool for reconnaissance (scraping of public social data and social engineering tactics) for the cyber criminals who executed Anthem Health’s 2015 breach[9]
  • 15. President Obama has issued an executive order aimed at improving critical infrastructure In addition, in 2016, Obama included a budget proposal of $19BN for cybersecurity – a $5BN increase YoY [11]
  • 16. But Cybersecurity cannot be fought just by the private sector…
  • 17. There is a need for a public campaign on cybersecurity – similar to how campaigns were launched in the past to raise awareness on issues like smoking or recycling[12]
  • 18. Steven Weber, faculty director at the UC Berkeley Center for Long-Term Cybersecurity acknowledged part of the problem for many people is that cybersecurity still feels like a technical issue related to the protection of computer networks. It’s time to “demystify the network” for folds outside the core tech sector, he said. [12]
  • 19. The problem of cybersecurity is like second-hand smoke – people are motivated by the negative externalities
  • 20. But cybersecurity doesn’t just come as a personal cost, it affects the community as a whole – individuals, businesses, and government alike need to work together to prevent the rapid growth of digital threats
  • 21. Works Cited • [1] "Cybercrime Will Cost Businesses Over $2 Trillion by 2019." Cybercrime Will Cost Businesses Over $2 Trillion by 2019. N.p., n.d. Web. 05 Mar. 2017. < https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion> • [2] Matrix, Sydney Eve. FILM 240. Module 01, Lecture 02 N.p.: n.p., n.d. Print. • [3] Kim, Kyungo, Chodzko-Zajko Wojtek, Andiara Schwingel, and Deana C. McDonagh. "Understanding Older Individuals’ Emotional Responses to New Technology Associated with Healthy Lifestyle Choice." Journal of Physical Education and Sort (2014): 138-47. Web. • [4] Alter, Alexandra. "Your E-Book Is Reading You." The Wall Street Journal. Dow Jones & Company, 19 July 2012. Web. 05 Mar. 2017. • [5] "| Bessemer Venture Partners." | Bessemer Venture Partners. N.p., n.d. Web. 05 Mar. 2017. • [6] "Cisco 2016 Midyear Cybersecurity Report." TS Ad. N.p., n.d. Web. 05 Mar. 2017. <https://newsroom.cisco.com/press-release- content?type=webcontent&articleId=1780586> • [7] "SEC Filings Details." Facebook - Financials - SEC Filings Details. N.p., n.d. Web. 05 Mar. 2017. • [8] D'Onfro, Jillian. "Twitter Admits 5% Of Its 'Users' Are Fake." Business Insider. Business Insider, 03 Oct. 2013. Web. 05 Mar. 2017. • [9] "Why Social Media Sites Are The New Cyber Weapons Of Choice." Dark Reading. N.p., n.d. Web. 18 Mar. 2017."Executive Order -- Improving Critical Infrastructure Cybersecurity." National Archives and Records Administration. National Archives and Records Administration, n.d. Web. 05 Mar. 2017. • [10] Mathews, Anna Wilde. "Anthem: Hacked Database Included 78.8 Million People." The Wall Street Journal. Dow Jones & Company, 24 Feb. 2015. Web. 05 Mar. 2017. • [11] Reuters. "Obama Budget Proposal Includes $19 Billion for Cybersecurity." Fortune.com. Fortune, 09 Feb. 2016. Web. 18 Mar. 2017. • [12] "Thinking Ahead: Cybersecurity In The Trump Era." Dark Reading. N.p., n.d. Web. 05 Mar. 2017. • All photos and images obtained from Pixabay <https://pixabay.com/>. “All images and videos on Pixabay are released free of copyrights under Creative Commons CC0. You may download, modify, distribute, and use them royalty free for anything you like, even in commercial applications. Attribution is not required.”