VR

Technology In Education

Education In Advanced Cyber And Engineering Sciences (Including Teaching AI)

Written By Miroslav Konstantinovic 06/01/2017
We are not going to go any deeper with this statistics here, but one can see the overall situation when it comes to cyber crime against the organizations and people.

These attacks can come in many forms. The most common are hacks by a malicious software. The damage that this program can do is different for various companies and people. But, most of the respondents in the aforementioned survey reported that their reputation was the most damaging impact of a cyber breach.

There has been a different approach over the years to fight against these criminal people. At first, it was only with anti-virus software. But, this alone proved ineffective. Then, the infrastru-ctural way by means of firewalls and alike was added to the response system. The idea was to face the threats early on and counter attack them so that the damage done to us would be minimal. This counter-attack should happen on several levels (or layers, if you will). However, this too was not enough. Today, we realize that the best way to prevent the attack, or to reduce the damage to the most minimal level, is (and always has been) only up to us users alone. So, we add user element to the fighting system, and it should be complete and enough for now.

Now that we know what this fighting "machine" against the cyber crime is comprised of, how do we use it? Is there a space for improvement? And, what are the various threats that exist today and how to effectively fight back against them? That is what this education will explain in great detail.
The Internet is one of the greatest things that ever happened to mankind. It offers so many opportunities and has a great potential. However, as the network grows and the technologies advance, so is a possibility of us being vulnerable and get hacked. This education is to teach the users how to behave online, what preventive measures to take regarding their safety and security. On the other hand, development of the IT sector in the recent years has opened doors to many engineering related advancements as well.
 
Cyber security can be defined as the precautions taken to protect information, organization resources and people against unauthorized access or attacks.

I can remember a time before the 1990s when the Internet did not exist. There were so-called bulletin board systems (BBS), that served much like today's Internet. It offered many of the features the Internet has, but the network was so much simpler. And, we needed a terminal software in order to be able to connect to the network. The BBS is considered to be the predecessor of the Internet. Even in the Internet's very early years, the cyber security was a thing that we could only see in the science fiction movies of the time. However, as the network evolved, so was the possibility of us being attacked, both in professional and private life. The people then realized that they urgently needed to find ways and mechanisms to defend themselves. That is when the cyber security was born.

A web portal, called PwC, issued an ebook as a result of a survey that they conducted last year (2016) on the matter of cyber crime and how much we are prepared, if at all, to meet those threats head on. The numbers they pulled out are very disturbing. For instance, cyber crime is the second most reported economic crime and only keeps climbing. Furthermore, over a quarter of the respondents said they had been affected by it, and (listen to this!) another 18% did not know whether they had or not been attacked. Preposterous.

Moving on with the statistics. 32% of the organizations were affected, and 34% think they will be in the next two years. Almost two-thirds of the CEOs are concerned about the cyber security, but less than half of board members request information about their organization's state of against-cyber-crime readiness. And only 37% of organizations have a cyber incident response plan. Most companies do not understand the risks faced, therefore are still not yet adequately prepared for an eventual cyber attack.