Unit15 - Future of Cybersecurity With Exercises Questions
Unit15 - Future of Cybersecurity With Exercises Questions
Unit15 - Future of Cybersecurity With Exercises Questions
With IT in our lives being ubiquitous, the emergence of the Dark Web along with
identity theft and phishing, the development of bots and augmented soldiers, and
the growing importance of cyberwarfare, the need for cybersecurity specialists is
only going to grow. Let’s look at what three authors in the field of cybersecurity have
to say (please note that these articles are edited and paraphrased. Please follow the
links for the complete article).
The race is on to secure these systems and devices before black hat hackers figure
out how to exploit them. Here are three important themes for the future.
That’s where cognitive security comes in. With machine learning, IT professionals
can process threat data more efficiently, and more accurately predict criminal
activity. This is just one of the many ways in which cognitive computing will shape
the future of cybersecurity.
131
UNIT 15 – The Future of Cybersecurity: The Threats Grow
in cost and productivity, however, have caused the market to use standard protocols
and interfaces that make SCADA systems vulnerable. For this reason, identity and
password management are critical.
***
Today, most of our critical systems are interconnected and driven by computers. In
the future, this connection will be even tighter. More decisions will be automated. Our
personal lives will use virtual assistants, and IoT connected devices will be part of
almost every part of our daily lives. Connected cars will make our daily commute
easier, and almost all of our personal data will be in cloud computing, where we don’t
fully control the dataflow and access to the information.
So overall, we will see systems that are smarter, sophisticated, able to handle large
populations and large amounts of data, systems that can update themselves rapidly,
that can take decisions in real time and that connect to shared-intelligence centers
that will keep us guarded.
Finally, as far as the general public is concerned, I believe that keeping ourselves
cyber secure will become as commonplace as keeping our physical safety. If today
we all know to lock our doors at night, put on our seatbelts when driving, and use a
helmet when hopping on our motorbikes, in ten years from now the same level of
awareness will be given to ensure we are also digitally secure.
132
UNIT 15 – The Future of Cybersecurity: The Threats Grow
***
As we stand on the threshold of another year, the war for our cybersecurity rages
on. There have been many data breaches in 2017, most notably for Equifax,
Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll be
glad of the news that the global average cost of a data breach is down 10 percent
over previous years to $3.62 million, according to the Ponemon Institute. Sadly, the
average size of a data breach increased nearly two percent. Clearly there’s still
plenty of work to do. Here are some of the trends, challenges and threats that await
us all in 2018.
133
UNIT 15 – The Future of Cybersecurity: The Threats Grow
***
As you can see, the problems for the future are many, and they are basically the
same problems we have now. By learning all you can about cybersecurity, to can
ensure a rewarding, lucrative career in the future.
134
UNIT 15 – The Future of Cybersecurity: The Threats Grow
VOCABULARY
TECHNICAL NON-TECHNICAL
augmented (adj) - збільшений / accurately (adv) – точно; безпомилково;
увеличенный ретельно / в точности; строго
big data (n) - великі дані / большие annual turnover (n) - річний оборот /
данные (серия подходов, годовой оборот
инструментов и методов обработки и
анализа структурированных,
полуструктурированных и
неструктурированных данных
огромных объёмов и значительного
многообразия для получения
полезных на практике,
человекочитаемых результатов)
bot (n) – бот / бот (программа, collective (adj) – збірний; колективний;
автоматически выполняющая какие- спільний; сукупний / собирательный;
либо действия через те же коллективный
интерфейсы, что и обычный
пользователь)
botnet (n) – ботнет / бот-сеть (сеть из commonplace (adj) –
компьютеров ('зомби'), зараженных загальноприйнятий / неоригинальный;
ботами, способная управляться банальний
удаленно для выполнения
массированных действий (рассылка
спама, проведение атак отказа в
обслуживании и т.д.)
CISO (Computer Information commute (v) – поїздка на роботу та у
Security Officer) – Співробітник зворотному напрямку / поездка на
(Офіцер) інформаційної безпеки / работу и обратно (оособ. ежедневно из
сотрудник (офицер) службы пригорода (на пригородном поезде или
безопасности на машине)
cognitive computing (n) - когнітивні consequence (n) – наслідки;
обчислення / когнитивные наступництво / следствие; последствие
вычисления
cognitive security (n) - когнітивна critical (adj) – критичний; вирішальний;
безпека / обеспечение поворотний / критический; решающий;
информационной безопасности с стратегически важный
использованием СИИ
configure (v) – налаштовувати / dire (adj) – страшний; жахливий;
настраивать; конфигурировать зловісний; крайній / предвещающий
несчастье; угрожающее (положение)
cybercriminal (n) – кіберзлочинник / emergence (n) – виникнення; поява; /
киберпреступник появление; крайняя необходимость
135
UNIT 15 – The Future of Cybersecurity: The Threats Grow
136
UNIT 15 – The Future of Cybersecurity: The Threats Grow
137
UNIT 15 – The Future of Cybersecurity: The Threats Grow
ACTIVITIES:
1) What is the Internet of Things and what are its vulnerabilities?
2) What do you think will be the biggest cyberthreat in the future and why?
Vocabulary exercises
138
UNIT 15 – The Future of Cybersecurity: The Threats Grow
Exercise 2. Fill in the blanks with the words / phrases from the vocabulary of the
Unit.
139
UNIT 15 – The Future of Cybersecurity: The Threats Grow
Grammar
begin with an auxiliary or modal verb begin with a question word (who, what,
(is, are, do, does, have, can, must, will, where, why, when, whose, which, how,
etc.); etc.)
Who is used without a noun to ask about Who wrote this book? Your
people. own
example
Whose is used to express possession. Whose bag is that?
140
UNIT 15 – The Future of Cybersecurity: The Threats Grow
Why is used to ask about the reason Why are you late?
why something happens / happened.
How long is used to ask about a time How long have you been
period. studying English?
How much is used with uncountable How much time do you spend
nouns. on your homework?
How many is used with countable How many hours a day do
nouns. you work?
141