Security and Encryption (20)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- The Guardian
- 2022
This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.
- The Guardian
- 2022
-
- The Guardian
- 2022
Opinion- Cyber security the next generation of technology. Talent is vital
This article goes over the impact cybercrime has had on technology spaces in Nigeria and stresses the importance of technology students receiving cybersecurity education.
What are the benefits of increasing cybersecurity education and diversifying the backgrounds those who choose to major in cybersecurity? How does the quality of post-secondary CS education impact the growth of the technology sector and those who are general users of the technology ecosystem? Who is responsible for ensuring there are enough technology professionals educated in cybersecurity?
- Deloitte
- 2022
This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.
- Deloitte
- 2022
- Deloitte
- 2022
Nigeria Cybersecurity Outlook 2022
This article goes over the current state of cybersecurity in Nigeria. It talks about cybercrime that has interfered with personal and business data privacy over the past year, how it may increase, and what is being done to protect sensistive data. The article also goes over what a deepfake is and explains that there has been a rise in deepfake cybercrime in Nigeria in 2021.
Who is impacted by digital activism and what are its benefits and harms? What are the benefits and harms of using AI to prevent AI cybersecurity attacks? Are there stakeholders impacted by Nigerian cybercrime outside of Nigeria, if so who? What are some ways to repair a global reputation and demonstrate safe and secure cybersystems? Whose responsibility is it to develop a culture of accountability and trust?
-
- Carnegie Endowment for International Peace
- 2022
This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.
- Carnegie Endowment for International Peace
- 2022
Cybersecurity in Nigeria’s Financial Industry: Enhancing Consumer Trust and Security
This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.
Who should be responsible for protecting fintech customers’ cybersecurity? Who is impacted by fintech cybercrime? What are the harms, specific to fintech industries, of weak cybersecurity systems and how does this hurt tech sector business growth?
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Cyberspace and Internet Imaginations: “Burning Chrome” by William Gibson
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
How can malware be used for good, and when should it be used for good? How do imaginations of the internet influence how people perceive this mysterious yet pervasive network? In what ways would making aspects of the internet into tangible images help people understand it better? How should the most powerful stakeholders in a given digital architecture be challenged? How might immersion into cyberspace give people more agency?
-
- 5 min
- The New York Times
- 2019
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
- The New York Times
- 2019
-
- 5 min
- The New York Times
- 2019
Hackers Holding Baltimore Hostage
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
How can hacking affect whole cities? Should entire cities trust digital systems to contain all of their important information?
-
- 5 min
- Kinolab
- 1993
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
- Kinolab
- 1993
Systems Errors in Entertainment Areas
Jurassic Park is an under-review theme park where innovator John Hammond has managed to use computational genomics to revive the dinosaurs. The park is managed by a complex security system, involving an internet of things which connects security cameras, other monitors, and defense systems to the computers in the control room. Computer programmer Dennis Nedry, under command of a briber, uses malware to hack the computer systems and steal dinosaur DNA, turning the park into a very hostile environment for the scientists once the safety mechanisms fail.
How can workplaces be protected against hacks from someone who works within said workplace? Should safety systems be under the control of a small number of people or computers? Should volatile environments, such as nuclear power plants or dinosaur parks, be trusted with a security system involving a hackable internet of things? What are the alternatives? Is convenience worth the cost in this case?