New Technologies (HL IB Geography)

Revision Note

Jacque Cartwright

Expertise

Geography Content Creator

Cybersecurity

  • Cybersecurity, also called computer security, is the process of keeping information systems' hardware and software safe from being stolen or damaged

  • It also keeps information on computers and other technology safe

  • Cybersecurity is becoming more important as more people and businesses depend on computers and the internet

    • Large companies, government agencies, the military, and airlines are frequent targets

  • Phishing is one of the most common risks to computer security

    • This means someone is trying to get private or secret data like usernames, passwords, bank account details, and credit card information

  • Malware is often described as malicious software (including virus, worms, spyware or ransomware)

    • They are commonly used to attack a network system by obtaining information transmitted from the hard drive (spyware) or by blocking certain systems from functioning on the network (ransomware)

  • Computer firewalls block access to internal network systems from different forms of attacks

  • Even though most computers have some kind of security, threats are getting more sophisticated, so security systems need to keep up

  • One of the biggest problems with cybersecurity is that there are no international rules or laws that everyone has to follow

Case Study

  • Proactive measures:

  • Virtual Private Networks (VPNs):

    • A VPN has a very high level of encryption and is a security mechanism that allows users to access the Internet securely from different locations via a public network

  • Multi-factor authentication (MFA):

    • By requiring multiple forms of verification, security is enhanced

  • Continuous monitoring:

    • Real-time tracking of digital activities helps in the early detection of attacks

  • Employee training:

    • Often, human error is the cause

    • Regular training sessions can mitigate these risks

  • Update:

    • Regularly update security software

    • Use a password manager

E-Passports

  • E-passports, also known as biometric passport, are passports that have an embedded electronic chip

  • This chip stores the passport holder's personal information, biometric data (such as fingerprints and facial recognition), and a digital photograph

  • It also uses Public Key Infrastructure (PKI) to ensure that the chip is authentic

  • E-passports boost border security and streamline immigration processes

Advantages of e-passports

  • Reduces counterfeiting

    • The technology makes forgery and alterations very difficult and reduces the risk of identity theft and fraud

  • Automated border control (ABC) systems can process an e-passport quickly, reducing waiting time

  • There is a direct comparison between the traveller and the biometric data on the chip, which checks identity

Disadvantages of e-passports

  • The chip has radio frequency identification (RFID) technology to communicate with electronic readers at border control points

  • However, illegal scanners are capable of hijacking this

  • The chip has a unique ID that can be tracked

  • The chip can be accidentally damaged, which sends a notification to the system and prevents entry

  • The owner of the e-passport does not have access to the data stored on the chip

Examiner Tip

Remember that the complexities of globalisation have made resilience strategies challenging, and they are often reactionary rather than pro-active.

Did this page help you?

Jacque Cartwright

Author: Jacque Cartwright

Jacque graduated from the Open University with a BSc in Environmental Science and Geography before doing her PGCE with the University of St David’s, Swansea. Teaching is her passion and has taught across a wide range of specifications – GCSE/IGCSE and IB but particularly loves teaching the A-level Geography. For the past 5 years Jacque has been teaching online for international schools, and she knows what is needed to get the top scores on those pesky geography exams.