SlideShare a Scribd company logo
1 of 22
The Good,
the Bad and
the Ugly
of cyber security
Data is the new oil
The Good, the Bad and the Ugly of cyber security by
What is cybersecurity about?
The Good, the Bad and the Ugly of cyber security by
Data
Confidentiality
Availability Integrity
The primary objective
of Secure
Information Systems
is to store, transfer
and process data in
accordance with such
principles
The main cybersecurity tradeoff
The Good, the Bad and the Ugly of cyber security by
Security
Functionality Ease of use
You can choose just
two of them
Group work exercise - 10 min
The Good, the Bad and the Ugly of cyber security by
Who is looking for
your data and why?
Malicious actors: academic view
The Good, the Bad and the Ugly of cyber security by
Motivation: academic view
The Good, the Bad and the Ugly of cyber security by
Malicious actors and motivation in details
The Good, the Bad and the Ugly of cyber security by
Corporations Cybercriminals Nation states
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
● Follow Privacy Policy
● Advertising goods for
free service
Monetize data in:
Ethical/legal way Unethical/illegal way
● Abuse Privacy Policy
● Resell data to data
brokers
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
Personally identifiable information
○ Home address
○ Email address
○ Passport number
○ Date of birth
○ Genetic information
○ Telephone number
Digital Profile
○ Habits
○ Attributes
○ Preferences
○ Traits
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
What’s Even Creepier Than Target Guessing That You’re Pregnant?
https://slate.com/human-interest/2014/06/big-data-whats-even-creepier-than-target-guessing-that-youre-pregnant.html
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
Facebook decided to acquire
WhatsApp for $19 billion; that is,
to pay $31 for each of its 600
million users
$15 $40
Your hidden price
Cybercriminals motivation
The Good, the Bad and the Ugly of cyber security by
● Use your data
○ Steal and resell your data
○ Use financial information to steal money
○ Use your data for blackmail or ransom
● Use your equipment
○ Mine digital currency
○ Organize attacks/DDoS
○ Launder money
#organizedCriminals
#hacktivists
#terrorists
Cybercriminals motivation
Cryptojacking
The Good, the Bad and the Ugly of cyber security by
The Good, the Bad and the Ugly of cyber security by
Cybercriminals motivation
ATM skimming
https://www.welivesecurity.co
m/2017/09/14/cryptocurrency
-web-mining-union-profit/
Cybercrime economy
The Good, the Bad and the Ugly of cyber security by
● A zero-day Adobe exploit can cost $30,000.
● A zero-day iOS exploit can cost up to $250,000.
● Malware exploit kits cost $200-$600 per exploit.
https://venturebeat.com/2018/04/21/the-web-of-profit-a-look-at-the-cybercrime-economy/
https://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economy
State Nations motivation
The Good, the Bad and the Ugly of cyber security by
● Internal
○ Propaganda
○ Leverage points
● External
○ Espionage
○ Sabotage
#APT28
#PLA Unit 61398
#Unit 8200
#spyware
State
Nations
Motivation
Stuxnet worm
The Good, the Bad and the Ugly of cyber security by
https://www.wired.com/2014/
11/countdown-to-zero-day-
stuxnet/
State Nations motivation
Petya/NotPetya Ransomware
The Good, the Bad and the Ugly of cyber security byhttps://www.wired.com/story/petya-ransomware-ukraine/
State Nations motivation
Blackout in Ukraine
The Good, the Bad and the Ugly of cyber security by
https://www.wired.com/story/v
ideo-hackers-take-over-
power-grid-computer-mouse/
How to differentiate cybersecurity specialist?
The Good, the Bad and the Ugly of cyber security by
The Good, the Bad and the Ugly of cyber security by

More Related Content

What's hot

Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
David Dubree
 

What's hot (20)

Cyber security ln
Cyber security lnCyber security ln
Cyber security ln
 
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and TestHow to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Exhibitor session: Fortinet
Exhibitor session: FortinetExhibitor session: Fortinet
Exhibitor session: Fortinet
 
Cogniware 2019
Cogniware 2019Cogniware 2019
Cogniware 2019
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Cyber Liability Insurance
Cyber Liability InsuranceCyber Liability Insurance
Cyber Liability Insurance
 
LAW
LAWLAW
LAW
 
The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Sensecy cti vs cti
Sensecy cti vs cti Sensecy cti vs cti
Sensecy cti vs cti
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 

Similar to Ethics and technologies - Cybersecurity landscape

Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
solomon24
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 

Similar to Ethics and technologies - Cybersecurity landscape (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 

More from Roman Trukhin (15)

Culture map - Book Review
Culture map - Book Review Culture map - Book Review
Culture map - Book Review
 
Security awareness for Applied Science Faculty of Ukrainian Catholic University
Security awareness for Applied Science Faculty of Ukrainian Catholic UniversitySecurity awareness for Applied Science Faculty of Ukrainian Catholic University
Security awareness for Applied Science Faculty of Ukrainian Catholic University
 
How people behave
How people behave How people behave
How people behave
 
Estimation
EstimationEstimation
Estimation
 
Web design crash course
Web design crash courseWeb design crash course
Web design crash course
 
Three-Way-Ballot system
Three-Way-Ballot systemThree-Way-Ballot system
Three-Way-Ballot system
 
NodeJS overview
NodeJS overviewNodeJS overview
NodeJS overview
 
Nobel Prize
Nobel PrizeNobel Prize
Nobel Prize
 
MacOS Philosophy
MacOS PhilosophyMacOS Philosophy
MacOS Philosophy
 
Great Pacific Garbage
Great Pacific GarbageGreat Pacific Garbage
Great Pacific Garbage
 
Future of images in the web
Future of images in the webFuture of images in the web
Future of images in the web
 
Fonts: how it's made?
Fonts: how it's made?Fonts: how it's made?
Fonts: how it's made?
 
CSS3.0
CSS3.0CSS3.0
CSS3.0
 
Bitcoin p2p money
Bitcoin p2p moneyBitcoin p2p money
Bitcoin p2p money
 
Scrum in 15 minutes
Scrum in 15 minutesScrum in 15 minutes
Scrum in 15 minutes
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Ethics and technologies - Cybersecurity landscape

  • 1. The Good, the Bad and the Ugly of cyber security
  • 2. Data is the new oil The Good, the Bad and the Ugly of cyber security by
  • 3. What is cybersecurity about? The Good, the Bad and the Ugly of cyber security by Data Confidentiality Availability Integrity The primary objective of Secure Information Systems is to store, transfer and process data in accordance with such principles
  • 4. The main cybersecurity tradeoff The Good, the Bad and the Ugly of cyber security by Security Functionality Ease of use You can choose just two of them
  • 5. Group work exercise - 10 min The Good, the Bad and the Ugly of cyber security by Who is looking for your data and why?
  • 6. Malicious actors: academic view The Good, the Bad and the Ugly of cyber security by
  • 7. Motivation: academic view The Good, the Bad and the Ugly of cyber security by
  • 8. Malicious actors and motivation in details The Good, the Bad and the Ugly of cyber security by Corporations Cybercriminals Nation states
  • 9. Corporation motivation The Good, the Bad and the Ugly of cyber security by ● Follow Privacy Policy ● Advertising goods for free service Monetize data in: Ethical/legal way Unethical/illegal way ● Abuse Privacy Policy ● Resell data to data brokers
  • 10. Corporation motivation The Good, the Bad and the Ugly of cyber security by Personally identifiable information ○ Home address ○ Email address ○ Passport number ○ Date of birth ○ Genetic information ○ Telephone number Digital Profile ○ Habits ○ Attributes ○ Preferences ○ Traits
  • 11. Corporation motivation The Good, the Bad and the Ugly of cyber security by What’s Even Creepier Than Target Guessing That You’re Pregnant? https://slate.com/human-interest/2014/06/big-data-whats-even-creepier-than-target-guessing-that-youre-pregnant.html
  • 12. Corporation motivation The Good, the Bad and the Ugly of cyber security by Facebook decided to acquire WhatsApp for $19 billion; that is, to pay $31 for each of its 600 million users $15 $40 Your hidden price
  • 13. Cybercriminals motivation The Good, the Bad and the Ugly of cyber security by ● Use your data ○ Steal and resell your data ○ Use financial information to steal money ○ Use your data for blackmail or ransom ● Use your equipment ○ Mine digital currency ○ Organize attacks/DDoS ○ Launder money #organizedCriminals #hacktivists #terrorists
  • 14. Cybercriminals motivation Cryptojacking The Good, the Bad and the Ugly of cyber security by
  • 15. The Good, the Bad and the Ugly of cyber security by Cybercriminals motivation ATM skimming https://www.welivesecurity.co m/2017/09/14/cryptocurrency -web-mining-union-profit/
  • 16. Cybercrime economy The Good, the Bad and the Ugly of cyber security by ● A zero-day Adobe exploit can cost $30,000. ● A zero-day iOS exploit can cost up to $250,000. ● Malware exploit kits cost $200-$600 per exploit. https://venturebeat.com/2018/04/21/the-web-of-profit-a-look-at-the-cybercrime-economy/ https://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economy
  • 17. State Nations motivation The Good, the Bad and the Ugly of cyber security by ● Internal ○ Propaganda ○ Leverage points ● External ○ Espionage ○ Sabotage #APT28 #PLA Unit 61398 #Unit 8200 #spyware
  • 18. State Nations Motivation Stuxnet worm The Good, the Bad and the Ugly of cyber security by https://www.wired.com/2014/ 11/countdown-to-zero-day- stuxnet/
  • 19. State Nations motivation Petya/NotPetya Ransomware The Good, the Bad and the Ugly of cyber security byhttps://www.wired.com/story/petya-ransomware-ukraine/
  • 20. State Nations motivation Blackout in Ukraine The Good, the Bad and the Ugly of cyber security by https://www.wired.com/story/v ideo-hackers-take-over- power-grid-computer-mouse/
  • 21. How to differentiate cybersecurity specialist? The Good, the Bad and the Ugly of cyber security by
  • 22. The Good, the Bad and the Ugly of cyber security by

Editor's Notes

  1. https://timreview.ca/article/838
  2. https://timreview.ca/article/838
  3. https://techcrunch.com/2015/10/13/whats-the-value-of-your-data/ https://www.huffpost.com/entry/why-googles-spying-on-use_b_3530296
  4. https://techcrunch.com/2015/10/13/whats-the-value-of-your-data/ https://www.huffpost.com/entry/why-googles-spying-on-use_b_3530296
  5. https://slate.com/human-interest/2014/06/big-data-whats-even-creepier-than-target-guessing-that-youre-pregnant.html
  6. https://www.welivesecurity.com/2017/09/14/cryptocurrency-web-mining-union-profit/
  7. https://www.welivesecurity.com/2017/09/14/cryptocurrency-web-mining-union-profit/
  8. https://venturebeat.com/2018/04/21/the-web-of-profit-a-look-at-the-cybercrime-economy/ https://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economy
  9. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
  10. https://www.wired.com/story/petya-ransomware-ukraine/
  11. https://www.wired.com/story/video-hackers-take-over-power-grid-computer-mouse/