Amidst fears of children being vulnerable to online bullying and other pitfalls on social media, schools across the State will now have to pay special attention to cybersecurity and ensure that their students are taught about the safe use of technology.
One of the draft rules of the Karnataka Educational Institutions (Classification, Regulation and Prescription of Curricula, etc) Amendment Rules-2017 states that students need to be educated on the consequences of cyber-bullying and harassment. Social networking sites should be blocked at all times in schools, and sites containing adult content need to be restricted.
The draft rules tackle the topic of unsupervised access to the Net, and notes that children in computer labs or those who have access to electronic devices need to be supervised by teachers or staff at all times. Every school has to maintain a record and report all cases of cyber-bullying and harassment, with sensitivity
I don’t blame her. During her time, internet was not something 10 year olds had much access to and even if they did it was to play games. Now kids play games, read articles and books, chat with their friends and stream videos online.
The New Year is almost upon us and with it new development in cyber security. 2017 was “exciting” year for many of us in the industry and the trend will continue into 2018. Here are some predictions of developments I see in the New Year:
With abundance of free and commercial statistical AI implementations, it’s just a matter of time before bad guys jumped on an AI trend. State actors have been using it for a while, passing the technology to closely associated proxies and should be the year for a wider cyber-criminal adoption of AI. Some of possibilities for AI-related attacks include:
Spam/fraud/phishing messaging utilizing chat bots. When you are involved in multi-stage phishing attacks or email scams, automation is the way to go. Intelligence gathering for advanced attacks. AI can be used for automated collection of relevant intelligence on organization, it’s systems and identities, before attacks. This includes farming
2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.
Let’s take a look at some of the issues that have challenged the cybersecurity community.
The expanding attack surface
2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.
Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new
Given what’s happened in 2017 — the Equifax breach, state-sponsored attacks, Russian manipulation of social media, Wannacry, and more phishing scams than we can count — you might not be looking forward to 2018. Breaches will be bigger, hackers will be smarter, and security teams and budgets won’t seem to keep pace.
There is reason to be optimistic, though. Yes, some things will get worse before they get better, but we expect real progress in a few areas. Here’s what we think will happen next year.
1. Many, if not most, U.S. companies will not meet GDPR compliance by deadline
Cybercrimes take place online. There are two overarching areas of cybercrime:
cyber-dependent crimes – which can only be committed through the use of online devices and where the devices are both the tool to commit the crime and the target of the crime, and
cyber-enabled crimes – traditional crimes which can be increased in scale by using computers.
These crimes take on a number of different formats – from hacking and use of the dark web to trolling on social media and phishing or identity thefts. The aims of such activities may be to commit sexual offences such as grooming or sharing indecent images, to control or disrupt computer systems, or steal money, information or data.
The dark web is used by criminals to trade illegal items online including drugs and firearms.
Hacking is the unauthorised use of or access into computers or networks by using security vulnerabilities or bypassing usual security steps to gain