文章目录[隐藏]
- The Evolution of the Cyber Security Threat Landscape
- The cyber threats of today are not the same as even a few years ago. As the cyber threat landscape changes, organizations need protection against cybercriminals’ current and future tools and techniques.
- Gen V Attacks
- The cyber security threat landscape is continually evolving, and, occasionally, these advancements represent a new generation of cyber threats. To date, we have experienced five generations of cyber threats and solutions designed to mitigate them, including:
- · Gen I (Virus): In the late 1980s, virus attacks against standalone computers inspired the creation of the first antivirus solutions.
- · Gen II (Network): As cyberattacks began to come over the Internet, the firewall was developed to identify and block them.
- · Gen III (Applications): Exploitation of vulnerabilities within applications caused the mass adoption of intrusion prevention systems (IPS)
- · Gen IV (Payload): As malware became more targeted and able to evade signature-based defenses, anti-bot and sandboxing solutions were necessary to detect novel threats.
- · Gen V (Mega): The latest generation of cyber threats uses large-scale, multi-vectors attacks, making advanced threat prevention solutions a priority.Each generation of cyber threats made previous cyber security solutions less effective or essentially obsolete. Protecting against the modern cyber threat landscape requires Gen V cyber security solutions.
HIR 2023 赛年的年度主题为“Technological Advancement and the World”,有 13 个可选择的领域,具体信息可查看之前的文章。我们今天就来看看 Cybersecurtiy 这个领域要如何写。
随着技术发展,我们的工作和生活越来越依赖电子化和网络,与此同时,网络攻击的手段和方式也在进步,因此,网络安全的重要性也在逐渐凸显。今天,大量数据的产生和使用正在重新定义我们的"智能"以及我们的社会和经济景观,刺激了新的产业、流程和产品,并创造了巨大的竞争优势。
在这个意义上,数据驱动的创新(DDI: data-driven innovation)已经成为 21 世纪增长的关键支柱,有可能大幅提高生产力、资源效率、经济竞争力和社会福祉。对数据的更多获取和使用也制造了一系列广泛的影响和政策挑战,从隐私和消费者保护到开放获取问题和测量问题,涉及公共和私人卫生、法律和科学领域。
议题一:数据安全与数据归属权
(Data Security & Data Ownership)
就像大数据战略家 Paul Sonderegger 说的那样,数据将是最终的外部性(外部性可以简单理解为“影响”):无论我们做什么,都会产生数据。
(原话:Data will be the ultimate externality: we will generate them whatever we do).
这边给大家推荐经济学人的一篇文章:Data is Giving Rise to a New Economy。据文章所说,数据在本世纪的作用就像石油在上世纪的作用一样:是增长和变革的驱动力。
数据的流动创造了新的基础设施、新的企业、新的垄断、新的政治和重要的新经济。数字信息不同于以往的任何资源;它以不同的方式被提取、提炼、估价、购买和销售。它改变了市场的规则,要求监管者采取新的方法。
在谁应该拥有数据并从中受益的问题上,将发生许多战斗。很多人担忧现今时代个人数据的安全,而数据的私域和公域界限也一直有所争议。人们可能会担忧自己电脑、手机上的摄像头被入侵,但同时人们在使用社交媒体的时候常常很容易把个人数据”送“出去以换取一些”免费“的服务。
据微软研究院的经济学家格伦-韦尔(Glen Weyl)说,这种交易条件几乎成为常态。很多人不会同意自己的数据应该归那些自己同意共享信息的企业所有(社交 app 比如 Facebook,Instagram,Twitter 等等),但也不确定个人数据应该完全不被分享出去。
譬如警方想要调查一起案件,能不能调用某个时段的路边摄像头的监控影像,尽管这可能涉及到部分个体的隐私?关于这些争议,给大家推荐 Lothar Determann 教授的一篇文章:No One Owns Data,文章讨论了关于现今数据归属权的问题,其中还包括一些现实案例,可以帮助大家更好地构建 commentary 的思路。
议题二:网络攻击者与攻击对象
Cyber Attack 一直是不少悬疑惊悚电影的题材,特别是黑客入侵,暗网凶手等题材极受欢迎,这也侧面说明了很多人对网络安全的担忧。不过,我们需要考虑的是,Cyber attack 的发起人和受害者都不一定只局限于个体,甚至可能发生在组织之间或者国家之间。在这里给大家找到了一个大致的梳理,想写这方面议题的同学们可以稍微了解一下:
The Evolution of the Cyber Security Threat Landscape
The cyber threats of today are not the same as even a few years ago. As the cyber threat landscape changes, organizations need protection against cybercriminals’ current and future tools and techniques.
Gen V Attacks
The cyber security threat landscape is continually evolving, and, occasionally, these advancements represent a new generation of cyber threats. To date, we have experienced five generations of cyber threats and solutions designed to mitigate them, including:
· Gen I (Virus): In the late 1980s, virus attacks against standalone computers inspired the creation of the first antivirus solutions.
· Gen II (Network): As cyberattacks began to come over the Internet, the firewall was developed to identify and block them.
· Gen III (Applications): Exploitation of vulnerabilities within applications caused the mass adoption of intrusion prevention systems (IPS)
· Gen IV (Payload): As malware became more targeted and able to evade signature-based defenses, anti-bot and sandboxing solutions were necessary to detect novel threats.
· Gen V (Mega): The latest generation of cyber threats uses large-scale, multi-vectors attacks, making advanced threat prevention solutions a priority.Each generation of cyber threats made previous cyber security solutions less effective or essentially obsolete. Protecting against the modern cyber threat landscape requires Gen V cyber security solutions.
(来源:https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/)随着 HIR 写作竞赛在知名度上的提升,它的参赛者也越来越多,因此这项比赛对大部分学生来说,将变得更有挑战性。
与课内写作作业相比,写作竞赛的作品评审标准也更加苛刻,更考验学生搜寻和引用文献的能力。