Cyberspace for the layperson series part III

This article in the cyberspace for the layperson series part III concerns the delay in the 5G rollout.

ATT and Verizon have delayed the 5G Rollout because of concerns the signals could interfere with respect to airplane communications.

There are cybersecurity and aviation communications issues with respect to the Rollout of the 5G Network,

Link: https://www.cnbc.com/2022/01/18/5g-deployment-delays-at-airports-on-cancellation-threats.html

Posted in Media, Cyber, Cybersecurity, Cyber Attacks, Aviation | Tagged , , , , , | Leave a comment

Cyberspace for the layperson II

Yes, there is a part I.

Consistent with our goal to expose the general public to cyberspace, and the emerging trends and developments in that field, we are providing this list of short videos with links correlated to the textbook: J. Kremling and A. Parker, Cyberspace, Cybersecurity & Cybercrime [Sage Publications 2018] Link: https://us.sagepub.com/en-us/nam/cyberspace-cybersecurity-and-cybercrime/book252165 which should facilitate your understanding of those topics

The list is not exhaustive.

Should you discover other pertinent videos use them.

A- TEXT- Chap. 1: Cyberspace: The Internet: The World Wide Web

⦁ Overview: The Kid’s Guide to the Internet
Link: https://youtu.be/A81IwlDeV6c

⦁ Beginning and Evolution of the Internet
Link: https://youtu.be/dzqr7XQjbKY

⦁ Vulnerabilities
Link: https://youtu.be/2VaPTIuRs4k

⦁ Differences Internet vs. World Wide Web
Link: https://youtu.be/CX_HyY3kbZw

B-TEXT Chap. 2: Cybersecurity

⦁ Introduction
Link: https://youtu.be/ULGILG-ZhO0

⦁ Attacks
Link: https://youtu.be/Dk-ZqQ-bfy4

C-TEXT  Chap 3: Threat Factors-Computers as Targets and

Chap. 4: Threats to Cybersecurity by Criminals, Organized Crime

⦁ Why People Commit Cyber Crimes
Link: https://youtu.be/c_2Ja-OTmGc

⦁ Consumer Crimes
Link: https://youtu.be/5OEdx6fkcWc

⦁ Internet Sex Crimes
Link: https://youtu.be/iJEbh3bepz0

⦁ Cyberbullying
Link: https://youtu.be/iJEbh3bepz0

D-TEXT Chap. 5: Threats to Cybersecurity by Hacktivists, Nation States; and
TEXT Chap. 6: National Security: Cyber Warfare and Cyber Espionage

⦁ Local Cyber Threats
Link: https://youtu.be/Dk-ZqQ-bfy4

⦁ National Cyber Threats
Link: https://youtu.be/3l20G4OfGk0

⦁ Hackers
Link: https://youtu.be/6KyVV5Dj5HA

⦁ Nation State Threats
Link: https://youtu.be/S_lPgHbondk

⦁ Cyber Espionage
Link: https://youtu.be/wLyqGe6txL0

⦁ Cyber Intelligence
Link: https://youtu.be/A8VyXEIgri0

E-TEXT Chap. 7: Counterterrorism

⦁ Overview
Link: https://youtu.be/Pj6TyN35GlE

⦁ Role of Media
Link: https://youtu.be/aHwYNKq60tA

⦁ Evolution
Link: https://youtu.be/Q05nXdUzeJE

⦁ Targets
Link: https://youtu.be/bU1FBQu4ab0

⦁ Risk Management
Link: https://youtu.be/AV2TfKYtk1g?list=PLzgGFSlcHSNHZ7e83wDoCAo7_gAhye6zw

F-TEXT Chap. 8: Deep Web and

Chap. 9: Cybersecurity Operations

⦁ Deep Web/Dark Web
Link: https://youtu.be/AV2TfKYtk1g?list=PLzgGFSlcHSNHZ7e83wDoCAo7_gAhye6zw

⦁ Cryptocurrencies
Link: https://youtu.be/doicYx_T1s4

⦁ Law Enforcement

G-TEXT Chap. 10: Cyber Security Policies, Legal Issues

⦁ Overview
Link: https://youtu.be/doicYx_T1s4

⦁ National Cyber Security Policies
Link: https://youtu.be/Ub7WHBV9pGo

⦁ International Cyber Security Policies
Link: https://youtu.be/wEAv4XYJwXE

⦁ Legal Issues
Link: https://youtu.be/f3Qued7fkZA

H -TEXT Chap. 11: The Future

⦁ Trends and Predictions
Link: https://youtu.be/Psb-lU2sodk

⦁ Emerging Threats
Link: https://youtu.be/Psb-lU2sodk

⦁ Vulnerabilities
Link: https://youtu.be/PjC6oBb-ilI

⦁ Pros vs. Criminals
Link: https://youtu.be/E69tzDhSDdU

###############################

Enjoy your journey into the field of cyberspace through those videos

Posted in Cyber, Cybersecurity, News, Videos | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Cybersecurity and the rollout of 5G networks

“Are 5G Networks Setting the Stage for a New Wave of Cyber Attacks,” wrote Steve Durbin in Forbes [August 10, 2021]. Link

Apparently, according to Durbin they are.

This  article will be digested and annotated as follows:

Durbin states: “[a]t its core, 5G  technology is all about blazing speeds, massive data volumes and interconnectivity [1] at a scale never witnessed before.”

     [1] interconnectivity defined: Link: https://www.definitions.net/definition/interconnectivity

Durbin states further: ***rollng out 5G means investing heaps in structurally network hardware that can support the velocity and volume that 5G promises.”

He  notes: “in addition to the significant capex [2], virtualization [3] of traditionally hardware embedded network functions [which open] new exploitation opportunities for malicious actors.”

     [2] capex defined: Link

     [3] virtualization defined: Link

“With 5G the stakes are higher than ever because 5G could soon become the backbone of critical national infrastructure. A recent report [4] . . . on the information and communication technology industry uncovered $31 Trillion addressable consumer revenues that will flow over 5G networks by 2030. Service providers could secure $3,7 Trillion of this driven by 5G connectivity,” explained Durbin.

     [4] Report by Ericsson Consumer Lab and Omdia Link

Durbin observes:”

“This tech has already enabled latency-sensitive [5] mission-critical industrial control systems that run smart grids, smart cities and smart factories. Autonomous systems like self-driving cars and automatic pilot avionics also rely on the speed, capacity and reliability of 5G networks. Any disruption to these systems and applications can quickly fail.

[5] latency-sensitive is defined as follows [GOOGLE Search]:

A latency-sensitive application is a application which is supposed to respond fast on specific events. Latency is defined as the time between the occurrence of an event and its handling. There was a time when it took minutes or even hours for us to send a simple email. … This is where latency sensitivity comes into play.

With respect to cyber attacks, Durbin notes:

[S[ecurity often takes a back seat when speed and volume are the driving forces

5G differs significantly from its predecessors in that it centers on software-defined networking, network virtualization and network functions virtualization. Virtualized network core and radio access networks allow network slicing for segregation and optimal resource allocation for different types of devices and services. But on the downside, virtualized network segments are prone to software vulnerabilities that attackers can leverage to move beyond the virtualization layer and into the physical layer.

XX XXXX

“This tech has already enabled latency-sensitive [5] mission-critical industrial control systems that run smart grids, smart cities and smart factories. Autonomous systems like self-driving cars and automatic pilot avionics also rely on the speed, capacity and reliability of 5G networks. Any disruption to these systems and applications can quickly fail.

[5] latency-sensitive is defined as follows [GOOGLE Search]:

A latency-sensitive application is a application which is supposed to respond fast on specific events. Latency is defined as the time between the occurrence of an event and its handling. There was a time when it took minutes or even hours for us to send a simple email. … This is where latency sensitivity comes into play.

For more, read the article in full.

Additional Sources

David Shepardson, ” Major U.S. airlines warn 5G could ground some planes, wreak havoc” [Reuters 01/18/22]

GOOGLE Search: “5 G cyber attacks

Posted in Cyber, Cyber Attacks, Cybersecurity, News | Tagged , , , , , , , , , , | Leave a comment

Cybersecurity for the layperson

Learn about cybersecurity from the following online links to multimedia public sources:

Cybersecurity Curriculum: Link

Other Sources:

1.  Hackers Link

2. Podcasts Link

3.  Videos  Link

4. Video Games Link

5. Websites and blogs Link

Good luck.

Posted in Cyber, Cybersecurity | Tagged , , , , , , , , , | Leave a comment