Deeper Talk 1.0 Recap has been successfully completed. We’ve received a lot of valuable suggestions via the brainstorming.

Deeper Talk 1.0 Recap has been successfully completed. We’ve received a lot of valuable suggestions via the brainstorming. Please spare some time to walk through the following selected ideas, Congratulations to the winners!

Deeper Network Community Event Series 1- Deeper Talk

To help build a better Deeper Network community, we can’t go without community members’ contribution of ideas. Join us at the Deeper talk, share your comments/suggestions with the Deeper team and community. You will get a chance to win a prize we have prepared for you!

The topic of this week — [Share your thoughts on cyber security]

Period: 20:00, Sep 9th — 20:00, Sep 13th, 2019(UTC +8)

Format: #DT + Content

Venue: Deeper Network Telegram Group

@KoenApps

#DT cyber security won’t be done with technical solutions alone, we need to reverse the trend of “dummification” of the user. Most users have little awareness of computer systems, a large part is because they big cooperations no longer let people have control over their own systems.

As such these cyber giants are a cyber threat themselves, because like malware they prevent the user / owner to do with their system as they want and (as such) they willfully create “digital (security) illiteracy”. Beyond the situation of control / limitation, it also means if their system fails, is breached, etc a large userbase is suddenly affected, compromised, unable to work, etc.

Remember how Sony installed rootkits via “audio-cd’s” to prevent copying ?

Climate Justice Belgium

#DT

Open Source Software and Systems could (should) play an important role in increasing cyber security. Blockchain itself making an interesting example.

On one hand it’s open and auditable, even adaptable or exentensible. Ideally different people with different perspectives/backgrounds actively contribute.

On the other hand, the driving force shifts significantly, from profit or profit maximalisation to quality results. In open source there’s no financial incentives to cover up problems and even neglect patching (e.g. by lack of public pressure).

Another good example is the LetsEncrypt initiative.

Though the challenge is fair compensation of the developers/ administrators. Because you know, there is no free lunch and everyone needs to pay their bills.

(Hopefully this is sort of the intention of the event.)

@Didistone99

security ~ safety

Cyber security ~ cyber safety.

Safety is something everyone must implement in their day to day activities.

ie safe practices at home, at the work place, when driving, operating machines and finally when using the cyber space

The big issue with the cyber space is that; normal or average humans cannot see or identify the risks associated with the space.

So, experts are required to tell you what could, would happen and what should be done to not be involved in cyber accident 🤣.

cyber accident?? being a victim of stolen identity, losing money to hackers, cyber thieves, cyber blackmailers etc.

Safety is important in everything you do.

in my area of work, before you carry out a task, you must perform a safe job analysis, look at the job as a hole and point out the things that could go wrong during execution and how to mitigate them or prevent them.

Safety~ security is a huge area with specialisation and expertise in different areas.

Let a chemical/process engineer advice you on how to safely and securely operate the new home built biogas plant.

Let a cyber security expert help you configure you network and advice you on ways to protect yourself online.

Let the experts do it for you. Don’t be a Mr know all and end up burning your house or loosing your entire savings.

@petramiller01

#DT cyber Security…

A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.

The high level of insecurity on the internet is becoming worrisome so much so that transaction on the web has become a thing of doubt. Cybercrime is becoming ever more serious and prevalent. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. It is necessary to understand the concept of cyber-crime, explain tools being used by the criminals to perpetrate their evil handiworks, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, it is imperative to look at how best to detect a criminal mail and proffer recommendations that would help in checking the increasing rate of cyber-crimes and criminals.

Research has shown that no law can be put in place to effectively eradicate the scourge of cyber-crime. Attempts have been made locally and internationally, but these laws still have shot-comings. What constitutes a crime in a country may not in another, so this has always made it easy for cyber criminals to go free after being caught. These challenges notwithstanding, governments should in the case of the idealists, fight them through education not law. It has been proven that they help big companies and government see security holes which career criminals or even cyber-terrorist could use to attack them in future. Most often, companies engage them as consultants to help them build solid security for their systems and data. “The Idealists often help the society: through their highly mediatised and individually harmless actions, they help important organizations to discover their high-tech security holes….”( The enforcement of law on them can only trigger trouble, because they would not stop but would want to defy the law. “ Moreover, if the goal of the cyber-crime legislation is to eradicate cyber-crime, it mint well eradicate instead a whole new culture….” Investments in education is a much better way to prevent their actions. Another means of eradicating cyber-crime is to harmonize international cooperation and law, this goes for the greed motivated and cyber-terrorists. They can not be fought by education, because they are already established criminals, so they can not behave. The only appropriate way to fight them is by enacting new laws, harmonize international legislations and encourage coordination and cooperation between national law enforcement agencies.

Thank you for your time 😜😜😜

@phinehas_samuel

#DT cyber security as a topic👨‍🏫

🤔Hmm…

Everything in life has two side, “good” and “bad” the topic is a brilliant one however, as good as cyber security is, if wrongly used, it becomes of evil and disadvantage judging from actions of “ethical hackers” who probe and exploit security vulnerabilities in web-based applications and network systems to cryptographers who analyze and decrypt hidden information from cyber-terrorists, cyber security professionals work hard to ensure data stays out of the wrong hands.

However, let’s look at the benefits of managing cybersecurity?

1) Protect networks and data from unauthorized access.

2) Improved information security and business continuity management.

3) Improved stakeholder confidence in your information security arrangements.

4) Improved company credentials with the correct security controls in place.

On the other hand, it’s disadvantages ranges from:

1) Firewalls can be difficult to configure correctly.

2) Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly.

3) Need to keep updating the new software in order to keep security up to date.😟🤷‍♂🤷‍♂🤷‍♂

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store