The document discusses cyber security challenges for smart communities. It notes that cyber threats are becoming more sophisticated and pose risks to critical infrastructure. Establishing effective cooperation between public and private sectors is important for developing strategies to address cyber challenges in smart communities. As communities become more connected through information and communication technologies, demand for robust cyber security will continue to grow.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
Research Article published in the 3rd Annual Cyber Security for Energy & Utilities.
23 - 26 March 2014 - The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, United Arab Emirates
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
Research Article published in the 3rd Annual Cyber Security for Energy & Utilities.
23 - 26 March 2014 - The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, United Arab Emirates
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
Cosmin Vilcu este expert în soluții de securitate IT, iar în prezent ocupă funcția de Regional Senior Sales Manager for Eastern Europe & CIS la SonicWall. Cosmin a pus bazele echipei SonicWall în România la începutul anului 2016. Întreaga experiență a fost construită în domeniul tehnologic, Cosmin lucrând în decursul anilor pentru companii precum Kaspersky, Omnilogic, Romtelecom, GTS Telecom, Telemobil sau Romservice. Este certificat SonicWall Network Security.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
Adrian Ifrim with more than twelve years of experience in the financial, telecom and IT security sectors, currently serving as Senior Manager within the Cyber Risk Advisory team of Deloitte Romania. In addition, he is an expert in information security with focus on penetration testing services and currently holds the Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP) and System Security Certified Practitioner (SSCP) certifications.
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
Cosmin Vilcu este expert în soluții de securitate IT, iar în prezent ocupă funcția de Regional Senior Sales Manager for Eastern Europe & CIS la SonicWall. Cosmin a pus bazele echipei SonicWall în România la începutul anului 2016. Întreaga experiență a fost construită în domeniul tehnologic, Cosmin lucrând în decursul anilor pentru companii precum Kaspersky, Omnilogic, Romtelecom, GTS Telecom, Telemobil sau Romservice. Este certificat SonicWall Network Security.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
Adrian Ifrim with more than twelve years of experience in the financial, telecom and IT security sectors, currently serving as Senior Manager within the Cyber Risk Advisory team of Deloitte Romania. In addition, he is an expert in information security with focus on penetration testing services and currently holds the Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP) and System Security Certified Practitioner (SSCP) certifications.
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
Nobody cares about your boring planner story.Andy Boenau
How can we share our contributions with other people in a way that educations AND inspires? The answer lies in human psychology. Tell interesting and compelling stories that focus on the human experience.
“You do what? Plan stuff? Meh.” Let’s face it. The professional planning industry has an image problem. Planners are viewed as a generic mob best known for blue tops, khaki bottoms, and pointing at maps. Or worse, we get labeled as centralized busybodies determined to impose regulations that make life a little less worth living.
Marketers have known for ages that people love stories, especially stories they can relate to.
During this talk, the audience learned why non-planners roll their eyes at us, how other professions have solved the communication problem, and heard practical examples they could take home and apply to their work.
[Originally presented at the American Planning Association's 2015 National Conference.]
APA Learning Objectives for AICP credit:
(1) Understand why non-professional planners (ordinary people) mentally check out when you talk about your goals and projects.
(2) Learn how professionals in other fields have solved this problem.
(3) Take home some practical examples to generate excitement and endorsement for your work as a professional planner.
About the speaker:
Andy Boenau, AICP leads the urban planning practice at Timmons Group. His primary focus is helping to create comfortable and inviting places for people to walk and ride a bicycle. Andy’s projects often involve retrofitting public streets to enhance livability. He also provides public engagement and new media consultation as part of his work.
Andy produces Urbanism Speakeasy, an award-winning podcast about human-scale design, livability, and community activism. He also created the short film "Walk Don't Walk", Walkability Award winner at the 2014 New Urbanism Film Festival. Andy loves having a microphone in hand, whether it’s delivering keynotes, producing webinars, or spicing up sessions at professional planning conferences.
__________________________
Inspirational contributions and influence from Frank Zappa, George Lois, Russell Brand, and Peter Norton.
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.
Information security threats encountered by Malaysian public sector data cen...nooriasukmaningtyas
Data centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and managing the risks associated with data centers have become a major challenge as this will enable organizations to optimize their resources to focus on the most hazardous threats to prevent the potential risks and damages. The objective of this paper is to identify major ICT security threats to data centers in the Malaysian public sector and their causes. The data for this study was collected through interview sessions. A total of 33 respondents from various government organizations were interviewed. The results revealed that the technical threats, spyware, phishing, bluesnarfing threats, social engineering and virus, trojan, malware, ransomware, viral websites threats are the major categories of threats often encountered by the malaysian public sector organizations. The causes for these threats are lack of budget, competent personnel, and manpower for security tasks, user awareness; lack of compliances and monitoring; insufficient security policies and procedures as well as deliberate cyber attacks. The outcome of this study will give a greater degree of awareness and understanding to the ICT security officers, who are entrusted with data center security.
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
This article underscores the urgent need for a global response to cyber threats, discusses the risks
associated with increasing reliance on technology, and sets the stage for a review focused on understanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact on
national development and the growing problem of cybercrime. It calls for a deeper understanding of the
characteristics and motivations of cybercriminals and highlights several questions that need to be
addressed to effectively combat cybercrime and its detrimental effects on society. The classification of cybercrime is summarized into five categories: Cybercrimes against Persons (including cyber
pornography, cyber stalking, financial cybercrimes, phishing, and vishing), Cybercrimes against Property(involving intellectual property violations, data theft, and "Man in the Middle" attacks), Cybercrimes against Government, Denial of Service (DOS) Attacks, and Other Cybercrimes (comprising data diddling,salami attacks, email bombing, email spoofing, logic bombs, internet time theft, and mobile and wireless technology-related cybercrimes).
_Cyberspace_ Security and Future Challenges in the Digital World.pdfmbmh111980
"Cyberspace: Security and Future Challenges in the Digital World" provides an insightful exploration of the evolving landscape of cybersecurity, examining current security measures and anticipating future challenges in an increasingly interconnected digital environment.
CYBERFORT Technologies seeks to impart quality Information Security programs that would equip Information Security professionals with the necessary tools and education to help them avert Cyber-crimes, Cyber espionage, Cyber terrorism and if the need arises, Cyber wars.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
Safeguarding the Digital Realm: The Importance of Cybersecurity
Introduction:
In our increasingly interconnected world, cybersecurity has emerged as a critical concern for individuals, organizations, and governments alike. The pervasive nature of technology and the rapid digitization of various sectors have brought about numerous benefits, but they have also introduced unprecedented risks and vulnerabilities. As cyber threats continue to evolve in sophistication and scale, it is crucial to understand the significance of cybersecurity and adopt effective measures to protect our digital infrastructure.
The Ever-Present Cyber Threat Landscape:
Cyberattacks come in various forms, including data breaches, malware infections, ransomware attacks, phishing scams, and more. The motives behind these attacks range from financial gain to espionage, activism, and even geopolitical warfare. The digital landscape is teeming with hackers, criminal syndicates, and state-sponsored actors who constantly seek to exploit vulnerabilities in computer systems and networks. The impact of successful cyberattacks can be devastating, causing financial losses, reputational damage, and compromising personal privacy.
Protecting Sensitive Data:
One of the primary objectives of cybersecurity is to safeguard sensitive information. This includes personal data, financial records, intellectual property, and classified government documents. Robust encryption algorithms, secure authentication protocols, and effective access controls are essential components of protecting data from unauthorized access. Additionally, data backup and disaster recovery strategies play a crucial role in ensuring that information remains intact and accessible even in the event of a breach.
Securing Critical Infrastructure:
Cybersecurity is not limited to protecting personal information or corporate data; it also extends to safeguarding critical infrastructure. Industries such as energy, transportation, healthcare, and finance heavily rely on interconnected networks to function effectively. A breach in these sectors could result in catastrophic consequences, ranging from power outages and disruptions in transportation systems to compromised patient records and financial instability. Consequently, robust cybersecurity measures must be implemented to protect these vital systems from malicious actors.
Building a Cyber-Resilient Culture:
While technological solutions play a significant role in cybersecurity, an equally important aspect is fostering a cyber-resilient culture. This involves educating individuals and organizations about the risks, promoting good cyber hygiene practices, and cultivating a mindset of vigilance. Regularly updating software, using strong and unique passwords, enabling multi-factor authentication, and being cautious of suspicious emails or links are some of the fundamental steps to bolster cybersecurity defenses. Organizations should prioritize employee training programs and e
We live in an always connected, digital age. Digitalization has accelerated exponentially, and companies’ survival will depend on their ability to reshape their future. Those who are born after 1980 are called digital natives. Digital natives are assumed to be inherently technology savvy. They have some peculiar characteristics which have attracted the attention of researchers. This paper presents some of those characteristics or personality traits. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Personality Traits of Digital Natives" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49581.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/social-science/49581/personality-traits-of-digital-natives/matthew-n-o-sadiku
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide. M. Swetha | L. Prabha | S. Rajadharani "Cyber Security Intelligence" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29261.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29261/cyber-security-intelligence/m-swetha
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Search and Society: Reimagining Information Access for Radical Futures
ICOCI2013: Keynotes 1
1. Proceedings of the 4th International Conference on Computing and Informatics, ICOCI 2013
28-30 August, 2013 Sarawak, Malaysia. Universiti Utara Malaysia (http://www.uum.edu.my )
KEYNOTES
ADDRESS
CYBER SECURITY AS A CENTRAL STRATEGY FOR SMART
COMMUNITY
Amirudin Abdul Wahab
CyberSecurity Malaysia, amirudin@cybersecurity.my
ABSTRACT. The cyber threat landscape has evolved in fairly dramatic
ways. Cyber threats come in various different forms both technical and
content related threats. Emerging threats have become sophisticated and a
lot more disastrous involving state actors, state-sponsored actors,
international organized criminals and Internet hacker activist groups.
Today‘s cyber threats pose challenges to the Government, organizations and
individuals as there is already a trend of cyber-attacks on critical
infrastructure. In recognition of the Internet connectivity and its borderless
feature, smart community is not spared from cyber threats. Hence, those who
are concerned with smart community security should explore an effective
strategy to respond to cyber challenges in a holistic perspective. It should
include the establishment of suitable cooperation amongst public and private
sectors as well as cyber security professionals. It is expected that the demand
for cyber security will grow in years to come as we continue to invest on
Information Communication Technology and networks towards developing
smart community.
Keywords: cyber threats, cyber-attacks, cyber security, cybercrimes,
malicious codes, critical sectors, National Cyber Security Policy, cyber
laws, cyber space
INTRODUCTION
Today‘s globalization has seen the increasing use of Information and Communication
Technology (ICT) as a vital tool for development. A Nokia Siemens Network reported that
by 2015, five billion people will be connected with a global community brought closer
together with voice and, increasingly data communications. The East Asia region is becoming
the most important political, economic, strategic and socially diverse and dynamic region. The
major factor driving this change is the ability of the region to exploit ICT to both national and
regional advantages. In this regard, Digital Age has provided unprecedented opportunities
for Malaysia to utilise ICT and Internet to national advantage across the governments,
industries and societies.
The widespread use of ICT and high Internet connectivity has introduced new cyber
security challenges. The ubiquitous technology that permeates the daily lives of individuals,
businesses and government is not without its challenges and downsides. The world has
witnessed the development of cyber threats and how they are encroaching into every sphere of
human activities. Increasing Malaysia‘s dependency on cyberspace has become a
significant risk. Our cyber security landscape is worsened by the users‘ ignorance, technical
incompetency, and ineffective cyber security measures by organizations. In view of this, the
Government has already realized the importance of having a secure, resilient and trusted cyber
1
2. Proceedings of the 4th International Conference on Computing and Informatics, ICOCI 2013
28-30 August, 2013 Sarawak, Malaysia. Universiti Utara Malaysia (http://www.uum.edu.my )
KEYNOTES
ADDRESS
environment. Hence, in smart community that links people and communities together, the
need for cyber security encompassing people, process and technology is rather critical and
such need will continue to grow in many more years to come.
SMART COMMUNITY
Developing smart community is in line with the Digital Malaysia initiative that has been
launched to begin the transformation into a digital economy with emphasis on innovation,
creativity and productivity. The increase in communication networks and connectivity has
multiplied the potential for knowledge sharing and wealth creation, as well as provided ample
opportunities for enhancing prosperity among citizens and businesses. Smart community
aims to make a conscious effort to use ICT to transform life and work of the people where the
goal of such an effort is more than the mere deployment of technology. Rather it is about
preparing one's community to meet the cyber security challenges of a globalized knowledge
economy. In views of this, the Government and businesses will continue to invest heavily to
protect ICT infrastructure as well as ensuring the safety and privacy of the people through the
deliveries of state-of-the-art cyber security solutions. By incorporating cyber security as a
central strategy, smart community will support Malaysia to achieve a truly digital nation,
hence completing the National Transformation Agenda. In addition, the sustainability of smart
community in today’s globalized economy also relies on inter-agency cooperation and publicprivate partnership. In an interconnected environment, all systems are mutually affected. If a
system is compromised, the impact will also spread throughout the other systems which are
connected to it.
CYBER SECURITY– CYBERSECURITY MALAYSIA‟S PERSPECTIVES
In Malaysia, the number of Internet users already surpassed 17.7 million people in 2012
and Nokia Siemens Network reported that by 2015, five billion people will be connected in a
global community brought closer together by voice and, increasingly data communications.
The East Asia region is becoming the most important political, economic, strategic and
socially diverse and dynamic region. According to CyberSecurity Malaysia, an agency under
the purview of the Ministry of Science, Technology and Innovation (MOSTI), there is an
uphill trend in the number of cyber incidents being referred to the agency. The incidents have
increased substantially from 8,090 in the year 2010 to 25,204 incidents in the year 2011 and
2012. As for 2013, there were 4486 incidents reported up to 31 May 2013. Cyber
harassments, denials of service, fraud, intrusions and malicious codes are amongst the
constantly reported incidents.
Based on 2011 and 2012 statistics, fraud was the largest reported category of incidents
with an average of 37.5% followed by intrusion, 32%. The figures in 2011 surpassed 2010
figures by 7,128 whereas, from January to September 2012 it has been 7905 incidents
reported. Cyber harassments, denials of service, fraud, intrusions and malicious codes are
amongst the constantly reported incidents. Whereas, malicious software (malware) is among
the largest reported category of incidents. The rise of cyber incidents
referred to
CyberSecurity Malaysia also indicates that the users are now aware of potential dangers
posed by cyber incidents and the need to report such incidents.
In view of this, it is foreseeable in the future that smart community will deal with cyber
incidents in parallel with the rapid development of ICT systems together with increase of
network connectivity and Internet users. Other than technical threats, the exploitation of ICT
has introduced content-related threats. Such threats refer to any offensive and abusive contents
such as hate speeches, radical and offensive statements, seditious and defamatory contents
that can threaten national security and public safety. Cyber threats and their significant risks
2
3. Proceedings of the 4th International Conference on Computing and Informatics, ICOCI 2013
28-30 August, 2013 Sarawak, Malaysia. Universiti Utara Malaysia (http://www.uum.edu.my )
KEYNOTES
ADDRESS
on national security would remain as the major security concerns of smart community as in
highly interconnected environment, smart community is not immune from cyber-attacks.
Cyber Crimes
In Malaysia, cybercrime hits 31,492 cases from 2010 to 2012 with an estimated loss of RM
241 million. Whereas in 2012 alone, Malaysian victims lost RM1.6 billion due to scam with
18,386 cases mainly involving love and parcel scam as well as phishing and hacking. At the
international front, 2012 Norton Cyber Crime Report states that the scale of consumer
cybercrime hits 556 million victims per year, more than the entire population of European
Union equivalent to 1.5 million victims per day. Based on the report, 42% of direct financial
loss comes from fraud, whereas theft and money loss contributes 17%. Cybercrimes will
continue to grow and they can also spread throughout smart communities as long as criminals
can have financial gains from the computer systems.
Act of Aggression and Hostile Activities In Cyber Space
The global community acknowledges the existence of hostile activities and act of
aggression conducted by nation states, state-sponsored and non-state actors. Such activities
can refer to anything from cyber espionage, malicious software (malware) infection and
system intrusion to high-scale cyber-attacks conducted with technical complexity and
sophistication. It is believed that such activities are committed with diverse political and
economic motives to achieve cyber dominance. The explosion of Internet has also created the
phenomenon towards ―digital hacktivism‖. In 15-19 June 2010, Malaysia has witnessed
cyber-attacks on her cyber space by a group of hacktivism known as ―Anonymous‖. The
attacks via codenamed ―Operation Malaysia‖ have captured the headlines of mainstream
media. During the 5-day period, 210 Malaysian websites were defaced by the ―Anonymous‖
group. The group is regarded by experts as politically-motivated, high profile and
sophisticated.
Sophistication of Malware
The world has seen how Stuxnet targeted the operations of industrial systems, specifically
the ones that run nuclear facilities. Duqu was designed to gather intelligence data and to set a
pre-cursor for a future attack. The world also witnessed the emergence of Flame, a
sophisticated spyware believed to be part of a well-coordinated cyber espionage operation
committed at a level of state. We have also seen Shamoon that stole information and took data
from the targeted systems. One unusual characteristic, however, is that it could overwrite the
master boot record (MBR) on infected machines, effectively rendering them useless. These
malware are evolving and they provide an insight into the future state of the ever-changing
cyber threat landscape. Protecting against such malware attacks also poses a key challenge to
the smart community in the globalized digital economy.
Misuse of Social Media
The rise of social media shows that smart community has to do more to protect its
residents. Internet users today are spending more time on social networks, hence exposing
themselves to various risks posed by content-related threats. The misuse of Internet for
sedition and defamatory contents can undermine the perception of the population
transforming the moderates into radicals, and radicals to extremists. In Malaysia, it is
estimated that 85% of the Malaysian online population are Facebook users which is about
13.5 million people, and we are ranked 18th in the world. Many of the actors in foiled plots
have been discovered among others, to threaten national security and social harmony under
the pretext of so-called freedom of speech. No doubt that social media is a powerful tool to
promote peace and stability, while at the same time it can be also misused by irresponsible
groups to undermine national security.
3
4. Proceedings of the 4th International Conference on Computing and Informatics, ICOCI 2013
28-30 August, 2013 Sarawak, Malaysia. Universiti Utara Malaysia (http://www.uum.edu.my )
KEYNOTES
ADDRESS
CYBER SECURITY AS A CENTRAL STRATEGY TO SMART COMMUNITY
No doubt that the development of smart community plays an increasingly important role in
Malaysia's digital progress as it is emphasizing on innovation, creativity and productivity that
will help to enhance the nation‘s prosperity. It also reflects specifically our journey towards
becoming an innovative digital economy in ways that will benefit the country and the citizens.
Anyone responsible for the security of smart community‘s information systems has reason for
concern as the community is exposed to various cyber threats. In view of this, the
Government has already realized the importance of having a secure, resilient and trusted cyber
environment.
National Cyber Security Policy
The Malaysian government has adopted the National Cyber Security Policy (NCSP) in
2006, a comprehensive cyber security approach namely to increase the resiliency of the
Critical National Information Infrastructure (CNII). CNII is vital to the nation that its
incapacity or destruction would have a devastating impact on national defense and security,
national economic strength, national image, government's ability to function and public health
and safety. Cyber security that ensures a secure, trusted and resilient ICT domain is a critical
factor in safeguarding national security and prosperity. Collectively, such cyber security
posture will promote productivity, national sustainability, social harmony and well-being, as
well as wealth creation. To this end, innovation in both the technical and operational aspects
plays a key role in the cyber security strategic approach, more so as the rapid pace of
technological change requires that it always stays in lockstep with the evolution of emerging
threats and challenges.
Innovative Cyber Security Programs
As a provider of specialized services for cyber security, CyberSecurity Malaysia has
instituted a broad range of innovation-led programs and initiatives to help reduce the
vulnerability of ICT systems and networks, nurture a culture of cyber security, and strengthen
Malaysian self-reliance in cyberspace which are relevant and applicable for smart community.
Cyber threats are revolutionary and our cyber security initiatives should be equally
evolutionary and innovative in order to be relevant with the technology changes. These
initiatives include policy research, technical research and development, public awareness and
outreach, and facilities to provide advice, assistance, and expertise to individuals and
businesses.
Cyber Security Through Public Private Partnership
The first priority for smart community is to implement an effective cyber security strategy
and policies, and to extend all possible supports to the other entities in their legitimate
requests for cyber security cooperation. In this case, no single entity can work alone and there
is a need for public-private partnership. It can be done by bringing together various cyber
security experts from the Government, industry, academia and individual experts to share,
elaborate and debate various relevant cyber security issues and challenges, as well as to
examine likely security risks in coming up with effective cyber security recommendations.
Those who are responsible for ensuring the security of smart community are to further
explore suitable collaborative efforts and to identify appropriate cooperative programs
towards protecting our common interests in cyber security. As the way forward, we should
continue the discussion on cyber security that will enable collective cooperation, the setting
and measuring goals and action within those areas, and related priorities.
4
5. Proceedings of the 4th International Conference on Computing and Informatics, ICOCI 2013
28-30 August, 2013 Sarawak, Malaysia. Universiti Utara Malaysia (http://www.uum.edu.my )
KEYNOTES
ADDRESS
CONCLUSION
Cyber threats are growing in sophistication in parallel with ICT revolution and they would
remain as security concerns to smart community and cyber security professionals in many
more years to come. Malaysia, has already expressed great concern about the rise of
cybercrimes and the trend cyber-attacks geared at attacking critical systems and their
impacts on smart community. In view of this, the Government, industry, academia and
individual experts via public-private partnership, should combine their ideas and work
together in an innovative manner. Malaysia, as a nation should also adopt a more inclusive
cyber security strategy and a holistic approach in protecting its cyber environment. Whilst at
the same, as part of a global community, Malaysia should also aim to strengthen its
international cooperation to respond to global cyber challenges in order to protect its regional
and global common interests. With such a holistic approach, we hope to be able to operate
within and benefit from the advantages of a secure, resilient and trusted smart environment.
REFERENCES
Ronald Byrne (2011). The Star News, Hacker Group Tells Why It Wants to Attack Malaysian Gov.
Portal, 14 June 2011, http://thestar.com.my/news/story.asp.
BBC
News Technology, Stuxnet 'Hit' Iran Nuclear
http://www.bbc.co.uk/news/technology-11809827
Plans,
22
November
2010,
Mathew J. Schwartz (2011). Information Weekly Security, 7 Facts On Duqu Malware Attacks, 16
November 2011, http://www.informationweek.com/security/attacks/.
Steve Evans (2012). CBR Computer Business Review, France Accuses US of Flame Malware Attack on
Government Computers, 21 November 2012.
Jamal R. Nassar (2012). University Technology of Sydney – News Room, The Arab Spring: Root
Causes And Implications, 2 July 2012, http://newsroom.uts.edu.au/events/2012/07/the-arabspring-root-causes-and-implications.
5