New Technologies (HL IB Geography)
Revision Note
Cybersecurity
Cybersecurity, also called computer security, is the process of keeping information systems' hardware and software safe from being stolen or damaged
It also keeps information on computers and other technology safe
Cybersecurity is becoming more important as more people and businesses depend on computers and the internet
Large companies, government agencies, the military, and airlines are frequent targets
Phishing is one of the most common risks to computer security
This means someone is trying to get private or secret data like usernames, passwords, bank account details, and credit card information
Malware is often described as malicious software (including virus, worms, spyware or ransomware)
They are commonly used to attack a network system by obtaining information transmitted from the hard drive (spyware) or by blocking certain systems from functioning on the network (ransomware)
Computer firewalls block access to internal network systems from different forms of attacks
Even though most computers have some kind of security, threats are getting more sophisticated, so security systems need to keep up
One of the biggest problems with cybersecurity is that there are no international rules or laws that everyone has to follow
Case Study
Proactive measures:
Virtual Private Networks (VPNs):
A VPN has a very high level of encryption and is a security mechanism that allows users to access the Internet securely from different locations via a public network
Multi-factor authentication (MFA):
By requiring multiple forms of verification, security is enhanced
Continuous monitoring:
Real-time tracking of digital activities helps in the early detection of attacks
Employee training:
Often, human error is the cause
Regular training sessions can mitigate these risks
Update:
Regularly update security software
Use a password manager
E-Passports
E-passports, also known as biometric passport, are passports that have an embedded electronic chip
This chip stores the passport holder's personal information, biometric data (such as fingerprints and facial recognition), and a digital photograph
It also uses Public Key Infrastructure (PKI) to ensure that the chip is authentic
E-passports boost border security and streamline immigration processes
Advantages of e-passports
Reduces counterfeiting
The technology makes forgery and alterations very difficult and reduces the risk of identity theft and fraud
Automated border control (ABC) systems can process an e-passport quickly, reducing waiting time
There is a direct comparison between the traveller and the biometric data on the chip, which checks identity
Disadvantages of e-passports
The chip has radio frequency identification (RFID) technology to communicate with electronic readers at border control points
However, illegal scanners are capable of hijacking this
The chip has a unique ID that can be tracked
The chip can be accidentally damaged, which sends a notification to the system and prevents entry
The owner of the e-passport does not have access to the data stored on the chip
Examiner Tip
Remember that the complexities of globalisation have made resilience strategies challenging, and they are often reactionary rather than pro-active.
Did this page help you?