Professional Documents
Culture Documents
Toaz - Info Assignment 1 Cyber Security PR
Toaz - Info Assignment 1 Cyber Security PR
Assignment I
Submitted by
Nikos Bizanis (4417631)
Surya Subrahmanyam Nagaraj (4412001)
Sulabh Deshmukh (4407466)
Introduction
1
"The great transformer: The impact of the Internet on economic." 2013. 16 Sep. 2014
<http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_great_transformer>
2
"Online banking - Wikipedia, the free encyclopedia." 2004. 16 Sep. 2014
<http://en.wikipedia.org/wiki/Online_banking>
Netherlands- Wehkamp.nl, Bol.com, Zalando, Coolblue, H&M, Hema and
Thuisbezorgd.nl. 3
Business: Companies depend on internet for making global presence and
profitability. Companies and job seekers use professional websites like
linkedin.com, mosnster.com, etc.4 Online businesses include Holiday
Planning, E-touring, online Jobs, selling online, app selling etc.5
Public administration
3
"Ecommerce in The Netherlands | Ecommerce News." 2013. 16 Sep. 2014
<http://ecommercenews.eu/ecommerce-per-country/ecommerce-the-netherlands/>
4
"The Top 100 Websites For Your Career - Forbes." 2013. 16 Sep. 2014
<http://www.forbes.com/sites/jacquelynsmith/2013/09/18/the-top-100-websites-for-your-career/>
5
"How to use the internet to make money - Economic Times." 2012. 16 Sep. 2014
<http://articles.economictimes.indiatimes.com/2012-10-01/news/34198096_1_royalty-payments-app-
online-store>
Corporate Activities
There are whole lot of professional tasks that indefinitely depend on internet. Just
to summarize:
6
"Desktop virtualization - Wikipedia, the free encyclopedia." 2008.
<http://en.wikipedia.org/wiki/Desktop_virtualization>
Healthcare and Safety activities
7
Ball, Marion J, and Jennifer Lillis. "E-health: transforming the physician/patient relationship."
International journal of medical informatics 61.1 (2001): 1-10.
8
"What is Telemedicine - American Telemedicine Association." 2014.
<http://www.americantelemed.org/about-telemedicine/what-is-telemedicine>
9
"How the Internet of Things Is Revolutionizing Healthcare ..." 2013.
<http://cache.freescale.com/files/corporate/doc/white_paper/IOTREVHEALCARWP.pdf>
10
"City of Madrid - IBM." 2011. <http://www-
07.ibm.com/innovation/my/exhibit/documents/pdf/City_of_Madrid.pdf>
11
"BBC News - Tests in Glasgow of emergency text ... - BBC.com." 2014. <http://www.bbc.com/news/uk-
scotland-24116475>
Malicious cyber activities and counter-measures
Cyberspace faces serious security issues due to low entry barriers and the inherent
anonymity of the medium12. We could define several subcategories of malicious
cyber activities and forms of cyber-attacks:
Cyber-crime (e.g. hackers stealing credit card numbers and passwords for
own profit13)
Cyber warfare: Cyber-attacks crossing international borders and involving
at least one nation state. Also, modern communication systems are also
widely used to assist in conventional warfare methods, e.g. see14
Cyber spying, which also includes cyber-espionage and cyber-sabotage.
Cyber-espionage is oftenly state-sponsored15, and it usually comprises of a
theft of trade secrets and/or intellectual property in order to gain commercial
or geopolitical advantage. A characteristic case of cyber-espionage, which
one of the authors of the report, being Greek, is familiar with, is described
in16. It can also take the form of cyber-sabotage of a corporation17. Prominent
recent examples include the NSA PRISM, or collection of personal data,
either from hackers or from other parties, claiming to collect the data
legitimately18 19.
12
Nye, Joseph S. "The Regime Complex for Managing Global Cyber Activities." (2014).
13
"Press Release - Department of Justice." 2013.
<http://www.justice.gov/usao/nj/Press/files/Drinkman,%20Vladimir%20et%20al.%20Indictment%20News
%20Release.html>
14
"Precision-guided munition - Wikipedia, the free encyclopedia." 2003.
<http://en.wikipedia.org/wiki/Precision-guided_munition>
15
"2011 Report - Office of the National Counterintelligence ..." 2011.
<http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf>
16
"The Athens Affair - IEEE Spectrum." 2009. <http://spectrum.ieee.org/telecom/security/the-athens-
affair>
17
"Shamoon - Wikipedia, the free encyclopedia." 2008. <http://en.wikipedia.org/wiki/Shamoon>
18
"Backgrounder: Results of the 2014 Global Privacy ..." 2014. <https://www.priv.gc.ca/media/nr-
c/2014/bg_140910_e.asp>
● Cyber security (efforts made by nations and private firms to prevent cyber-
attacks and combat the above), which also includes law enforcement and
forensics in the cyberspace, which face novel challenges. Legal Enforcement
is challenging due to the anonymous and international nature of the
cyberspace20. Also, law procedures (e.g. evidence collection21) are
constantly trying to catch-up with the rapid changing Internet and
technology landscape
19
"From APP-laudable to dis-APP-ointing, global mobile app ..." 2014.
<http://blog.priv.gc.ca/index.php/2014/09/09/from-app-laudable-to-dis-app-ointing-global-mobile-app-
privacy-sweep-yields-mixed-results/>
20
"LAW ENFORCEMENT IN CYBERSPACE Greg Melick ..." 2002.
<http://www.isrcl.org/Papers/Melick.pdf>
21
SWAMINATHA, TARA M. "The Fourth Amendment Unplugged: Electronic Evidence Issues & Wireless
Defenses." Yale Journal of Law and Technology 7.1 (2005): 3.
22
Pempek, Tiffany A, Yevdokiya A Yermolayeva, and Sandra L Calvert. "College students' social
networking experiences on Facebook." Journal of Applied Developmental Psychology 30.3 (2009): 227-
238.
23
Java, Akshay et al. "Why we twitter: understanding microblogging usage and communities."
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network
analysis 12 Aug. 2007: 56-65.
Internet connectivity to be connected to the cyberspace everywhere and at
any time24.
● Another online activity that gains traction in the recent years is the use of
cyberspace to meet potential partners, either for the purpose of the so called
“cyber-sex” or to make the introduction for a meeting in the physical world.
Examples include the use of applications such as Tinder, OkCupid and
Badoo.
● A prominent example of communication in the cyberspace is the use of the
Global Positioning System for navigation and search25. What started as a
military project has now replaced paper maps completely and it is widely
used in stand-alone car devices as well as embedded into smartphones.
Entertainment
● LAN Gaming: where you can play together with the other players around
the world.26
● Satellite Content Distribution: Digitisation of the television resulted in the
dramatic improvement in the television experience. Satellite radio is a good
alternative to the conventional radios.
● Music: new applications such as Spotify and iTunes are the popular choice
of people for listening music.
Many of our infrastructures uses cyber activities in many forms. Some of the areas
where cyber activities are used are
24
Verkasalo, Hannu. "Contextual patterns in mobile service usage." Personal and Ubiquitous Computing
13.5 (2009): 331-342.
25
<http://www.gps.gov/>
26
"New DreamHack records and 2014 dates « Dreamhack ..." 2013. 16 Sep. 2014
<http://www.dreamhack.se/dhw13/2013/12/10/new-dreamhack-records-and-2014-dates/>
● Smart grids: uses the digital technology to automate various processes to
improve the efficiency, reliability, and sustainability.27
● Oil and gas industry uses ICT in production environment28
● Water distribution and purification plants: water is the scarce resource
and ICT provide the effective solution in water management.29
● Flood control system uses the cyber activity for flood prevention.
Netherlands have developed the robust flood control system such as dikes
and sea gates.30
● Intelligent public transport system: Today transport system is equiped
with many cyber activates such as Wi-Fi systems, GPS connectivity, and bus
tracking systems.
● Air traffic control uses computer monitoring and the radar systems to tack
the airplane in the vicinity of the airport.
● weather forecasting : satellite images and sensing technology is used to
forecast the weather
Educational activities
The use of cyber activities in the education field has increased rapidly in the recent
few years. Following is the list of some of the cyber activities in education sector.
● e-Learning: which means learning over the internet has gained popularity .
One can dive into the plethora of knowledge with just the help of one click
.Some of the famous online education platforms are edx31,coursera32,open
learning initiative 33,NPTEL34
27
"Smart Grids European Technology Platform | SmartGrids." 2006. 16 Sep. 2014
<http://www.smartgrids.eu/>
28
"Huawei ICT Energy Industry Solutions." 2012. 16 Sep. 2014
<http://enterprise.huawei.com/en/solutions/trade/energy/index.htm>
29
"ICT for smart water management - Technology | ITU News." 2011. 16 Sep. 2014
<https://itunews.itu.int/en/570-ICT-for-smart-water-management.note.aspx>
30
"Water Management in the Netherlands.pdf - Rijkswaterstaat." 2011. 16 Sep. 2014
<http://www.rijkswaterstaat.nl/en/images/Water%20Management%20in%20the%20Netherlands_tcm224-
303503.pdf>
31
"edX - online courses and classes from the world's best." 2012. 16 Sep. 2014 <https://www.edx.org/>
32
"Coursera." 2012. 16 Sep. 2014 <https://www.coursera.org/>
33
"Open Learning Initiative - Carnegie Mellon University." 2012. 16 Sep. 2014 <http://oli.cmu.edu/>
● e-exams : many exams are being conducted online such as GRE35,GMAT36
● Digital Library : as we are moving towards the paperless world digital
libraries are in demand
● Research Publications: It is convenient to know the latest research
happening in your field as researches are published online.37
Conclusion:
Doing this report made us wonder how complex and broad is the idea of internet.
Cyber space is infinitely vast, it’s like space travel. The possibilities are huge and
with ever advancing technology the internet is becoming a much stronger force.
Which can collect process and condense information the same way a network in
human brain does. In the report we have focused on 8 major regions of the cyber
activities viz., Economics, Public administration, Corporate Activities, Health &
Safety, Communication & Socialising, Entertainment, Infrastructure, Malicious
Cyber activities. After brainstorming together in a meeting about the above
mentioned areas and jotting down the cyber activities we made a framework of the
report and each of us chose a subset of the aforementioned regions to elaborate on
his own. All the individual work is combined to make this final report, which can
explain any slight lack of cohesion due to individual writing styles.
34
"nptel." 2007. 16 Sep. 2014 <http://nptel.ac.in/>
35
"GRE - ETS." 2005. 16 Sep. 2014 <http://www.ets.org/gre>
36
"The GMAT Exam." 2013. 16 Sep. 2014 <http://www.mba.com/global/the-gmat-exam.aspx>
37
"IEEE Xplore Digital Library." 2003. 16 Sep. 2014 <http://ieeexplore.ieee.org/>