Click me
Transcribed

Blockchain Could Lead Us To A Decentralized Web

How YBER RIME WilH Make the INTERNET BETTER -yet some experts have claimed trying to secure the Internet is more trouble than it's worth, or a Zero-Sum game. In 2016, cybercrime cost the global economy over $450 BILLION According to a Ponemon Institute survey of international companies Cybercrime Cybercrime activity 2017 average annual cost of cyber security: Is On The Rise SH .the fastest-growing crime $11.7 2017 average number of security breaches 138 Million .stealing intellectual property 22.7% 27.4% .causing the greatest transfer of economic wealth in history increase from 2016 increase from 2016 .costing companies millions-even billions THE COSTE OF CYBERCRIME In 2012, hacking group Cutting Sword of Justice Used a scam email with a bad link to partially wipe or completely destroy 35,000 Saudi Aramco computers Forced the company to Use typewriters Give away O OLYMPIA carina 1 and faxes oil for free In 2011, LulzSec hackers Buy 50,000 new hard drives Cost the company Attacked Sony's $171 million PlayStation Network affecting 77 million accounts Caused the site to be DOWN FOR A MONTH For those who aren't taking dedicated measures to profect their data, the costs can include: Lost business revenue | Loss of company assets | Damage to reputation | Litigation THE ZERO SUM GAME What it is: In mass surveillance. Tradeoff between national security and personal privacy Argument A situation in which one person or group can win something only by causing another person or group to lose it Security In cybersecurity: No matter a company's efforts to maintain security, in the end the company will not win is a Zero-Sum Game Why? Human Element Laziness Greed Little or no desire to follow security protocol or improve existing policies Security software companies claim to be able to prevent all types of attacks and prey on: Fear Uncertainty Doubt Security and commerce are in opposition to each other Security software companies need cyber threats to generate sales Companies rely on software to maintain security In mass surveillance: Governments should be Held accountable to their citizens and pursue transparency Why? Leaving Americans unprotected isn't an option Innovation in digital Counterargument Security is NOT a Zero-Sum Game In cybersecurity: Companies should Maintain security protocol & pursue the infrastructure should thrive improvement of security measures in the American democracy REGARDLESS OF IF THE INTERNET CAN EVER TRULY BE SECURE, businesses and individuals are using a variety of tools to protect their data Virtual Private Network (VPN) Security Options Used Today ProtonMail What it is: A technology that creates a secure network while using a public network What it is: Switzerland-based company offering end-to-end encrypted email How it works: How it works: Uses a combination of dedicated connections and encryption protocols to create virtual P2P connections The service encrypts all email messages in the user's web browser before it even reaches the ProtonMail servers Benefits: Benefits: Help protect from Wi-Fi spoofing Honeypot attacks Firesheep Allow users to spoof their physical location ProtonMail does nof store passwords and therefore can't decrypt messages If the server is compromised, hackers won't have access to users' email Allow users to subvert government filters Company cannot be compelled to expose their technology to any government authority What it is: brave What it is: A search engine established in 2008 that doesn't track users An ad-blocking web browser with a connected cloud service DuckDuckGo enabling the placement of select ads that don't track a user's online activities How it works: Search ads will not be blocked Doesn't collect or share personal information Available on desktop and mobile How it works: Does not use cookies Default setting will block all display ads Block programmatic ad networks' Placement of third-party cookies Ad-click confirmation signals Analytics scripts Signaling Will use anonymous targeting for future ads Does not store IP addresses or unique User agent strings Benefits: Benefits: Prevents search Increased page load speed for users2-3xs faster Greater online privacy Offers a range of options for leakage by default Privacy Customization A Brave "vault" will Be controlled by the user Offers search results without being intrusive Allow syncing bookmarks with passwords across devices Not be connected to personally identifiable information (PII) But with every cyber attack claiming the data of millions, the world is starting to wonder: IS DATA EVER TRULY SAFE ON THE INTERNET AND HOW CAN WE MAKE IT SAFER? The Future of Cybersecurity DECENTRALIZEO WEB Today Google, Facebook, and Apple control the Internet by requiring users to connect with each other using their platforms, but.. THE NEW INTERNET WILL USE REVOLUTIONARY TECHNOLOGY THAT WAS FIRST INVENTED IN 2009 FOR PAYMENTS What it is: Uses crypto token - The Profocols Applications | Infrastructure| Governance of the Web Removes the middleman a long private key Would need more energy than is present in entire solar system to hack Such as banks and data banks like Facebook Giving power back to users BENEFITS: Decentralized Does not require trust ALIGNS INCENTIVES OF USERS AND DEVELOPERS Run by a group of developers, businesses, and users - not a single company PROTECTS THE NETWORK WITH CRYPTO TOKENS secured by mathematics and cryptography ENCOURAGES INNOVATION BY PROVIDING PROTOCOL AS A SHARED RESOURCE Results Unbundling of data silos No central companies to leak data Lower barrier of entry will provide: users will own their data Hackers will have to target individual users Will be impossible to simultaneously steal from millions Freedom to innovate & choose Understandably, Internet users are getting excited about blockchain technology. The next step? SPREADING THE WORD Sources: duckduckgo.com/privacy merriam-webster.com/dictionary/zero-sum%20game ischoolonline.syr.edu/blog/what-is-the-decentralized-web money.cnn.com/2015/08/05/technology/aramco-hack/index.html shareable.net/blog/21-technologies-that-will-decentralize-the-world criticalhit.net/gaming/these-are-the-men-who-hacked-the-psn-in-2011 hiscox.co.uk/cyber-readiness-report/docs/cyber-readiness-report-2017.pdf aei.org/publication/cybersecurity-and-commerce-its-not-a-zero-sum-game blockstack.org/videos/the-conference-the-future-of-the-internet-is-decentralized cio.com/article/2908864/security0/5-costly-consequences-of-smb-cybercrime.html cnbc.com/2017/02/07/cybercrime-costs-the-global-economy-450-billion-ceo.html infosecisland.com/blogview/18588-The-Nature-of-Infosec-A-Zero-Sum-Game.html fortune.com/2015/05/01/how-cyber-attacks-became-more-profitable-than-the-drug-trade searchenginewatch.com/2016/03/01/going-over-to-the-duck-side-a-week-with-duckduckgo cnbc.com/2017/07/25/stay-protected-from-the-USs-fastest-growing-crime-cyber-attacks.html insidesources.com/ex-nso-head-chinese-hacking-is-the-greatest-transfer-of-wealth-in-history forbes.com/sites/roberthof/2016/01/20/brave-softwares-new-browser-nukes-ads-that-track-you csoonline.com/articde/2130877/data-breach/the-16-biggest-data-breaches-of-the-21st-century.html gizmodo.com/5990192/vpns-what-they-do-how-they-work-and-why-youre-dumb-for-not-using-one lawgazette.co.uk/comment-and-opinion/security-and-privacy-is-not-a-zero-sum-game/5039382.article techcrunch.com/2014/06/23/protonmail-is-a-swiss-secure-mail-provider-that-wont-give-you-up-to-the-nsa accenture.com/120171006T095146Z Presented by CyberSecurityDegrees.com DEVELOPED BY N NOWSOURCING W /us-en/ acnmedia/PDF-62/Accenture-2017CostCybercrime-US-FINAL.pdf SES BLOCKCHAIN TECHNOLOGY TO DECENTRALIZE

Blockchain Could Lead Us To A Decentralized Web

shared by NowSourcing on Jan 05
19 views
2 shares
0 comments
Cyber crime could have the effect of eliminating itself before much longer. We sure can't keep going like this.

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size