0% found this document useful (0 votes)
3 views29 pages

Emerging Technologies: Rohan Raj Poudel

The document discusses emerging technologies, defining them as innovative technologies with significant potential impact, and provides examples such as AI and 5G networks. It also covers cybersecurity, including the importance of security, types of cyber attacks, and the role of honeypot technologies in detecting threats. Additionally, it highlights the necessity of cybersecurity measures and the implications of security breaches through a case study on Mr. Bean's website hack.

Uploaded by

rohan.clinchtech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views29 pages

Emerging Technologies: Rohan Raj Poudel

The document discusses emerging technologies, defining them as innovative technologies with significant potential impact, and provides examples such as AI and 5G networks. It also covers cybersecurity, including the importance of security, types of cyber attacks, and the role of honeypot technologies in detecting threats. Additionally, it highlights the necessity of cybersecurity measures and the implications of security breaches through a case study on Mr. Bean's website hack.

Uploaded by

rohan.clinchtech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

EMERGING

TECHNOLOGIES
Rohan Raj Poudel
Recap: Week 1
Definition of Emerging Technologies
◦ New, innovative, or evolving technologies that are still in early stages but have potential for
significant impact (society, industry)

Examples Discussed
◦ Historical: Steam Engine (an emerging tech of its time)
◦ Modern:
◦ 5G Networks
◦ Artificial Intelligence (AI)
◦ Quantum Computing
◦ Meta Smart Lens (e.g., AR/VR goggles)
Recap: Week 1
Covered Topics
◦ Future applications of emerging technologies
◦ Advantages (e.g., innovation, convenience, economic boost)
◦ Disadvantages (e.g., job displacement, ethical concerns, cost, pollution)

Activities
◦ Group discussions on the pros, cons, and use cases of each technology
◦ Workshop session for brainstorming and practical engagement
◦ Fun engagement using lovable.ai spin wheel to select random students for group sharing
◦ Presentation of findings by selected groups
Precap: Week 2
This week's focus will shift towards cybersecurity and how Honeypot Technologies are used to
deceive and study cyber threats.

Planned Sessions:
◦ Introduction to Security Concepts
◦ Basics of Security, Cybersecurity, and Cyberattacks
◦ Common examples of cyber threats and security breaches

◦ Introduction to Honeypot Technologies


◦ What is a honeypot?
◦ How honeypots are used to detect, analyze, and prevent cyberattacks
Precap: Week 2
Planned Sessions:
◦ Examples and Applications
◦ Real-world implementations of honeypots
◦ Types: Low-interaction vs High-interaction
◦ How organizations use them for research and protection

◦ Dos and Don’ts in Research/Report Writing


◦ Academic honesty and citation
◦ Structuring your research article
◦ Tips on avoiding plagiarism and improving clarity
Precap: Week 2
Planned Sessions:
◦ Workshop and Research Discussion
◦ Practical session: Research & discussion in groups
◦ Prepare mini research presentations on Honeypot-related case studies or tools
Understanding Security
What is Security?
• Security means guarding or protecting something valuable
• It ensures safety, integrity, and peace of mind
• Can be physical, digital, emotional, or societal

What is a Guard?
• A guard is anyone or anything that protects something from harm or unauthorized access
• Can be a person, a device, or even a program (e.g., security guard, CCTV, antivirus software)
Understanding Security
Why Do We Need Security?
• To prevent loss or theft of valuable things (money, data, identity)
• To protect privacy, peace, and resources
• To avoid damage, misuse, or unauthorized access

What Happens Without Security?


• Increased theft, data leaks, and misuse of information
• Can lead to financial loss, reputational damage, or even national threats
• Weak security invites attackers (physically or digitally)
Understanding Security
The Iraq Book Market Story
• In Iraq, in the book market, books
remain on the street at night
• Saying: “The reader does not steal, and
the thief does not read.”
• Meaning: If people have strong values
and ethics, there may be less need for
guards
• Reflects the idea that culture and
morality can also be a form of security
Understanding Security
What Are Security Rules?
• Guidelines and protocols to protect people, property, and information
• Based on potential risks, value of asset, and vulnerability level
• Examples:
• No ID = No entry
• Two-factor authentication
• Security camera zones
• Surveillance during night hours
Understanding Security
Real-Life Examples of Security
• Bank Security: Vaults, alarms, guards, CCTV
• National Security: Military, intelligence agencies, border control
• Home Security: Locks, security systems, smart cameras
• Money Security: Anti-counterfeit measures, secure transactions
• Personal Security: Self-defense, privacy, identity protection
Online Security
Online Transaction Security
• Protection of payment and personal data during online purchases
• Uses encryption, secure gateways, and OTP systems

Password & PIN Security


• First line of defense in personal and organizational digital systems
• Tips: Use strong, unique passwords, enable 2FA (Two-Factor Authentication)
• Avoid sharing or reusing passwords across platforms
Online Security
Security of Data (Personal & Corporate)
• Protecting files, databases, and personal information from hackers or leaks
• Organizations use encryption, role-based access, backups, and cloud security

Unauthorized Access
• When someone gains access to systems or data without permission
• Can result in data theft, manipulation, or spying
Online Security
Security Breach
• A successful attack where unauthorized access, theft, or damage occurs
• Example: Hacking into a company's database and leaking customer info

Protection Mechanisms
• Antivirus: Detects and removes harmful programs
• Firewall: Acts as a barrier between trusted and untrusted networks
• Spam Detection: Filters unwanted or harmful emails
• Security Software: Includes encryption tools, endpoint protection, VPNs
What is a Security Vulnerability?
◦ A security vulnerability is a weakness or flaw in a system, software, or process that can be
exploited by a threat actor (like a hacker) to gain unauthorized access or cause harm.

Types of Vulnerabilities

◦ Software bugs (e.g., not validating user input)

◦ Outdated systems (no security patches)

◦ Weak passwords

◦ Misconfigured servers or devices

◦ Human error (e.g., phishing, social engineering)


What is a Security Vulnerability?
Why Are They Dangerous?

◦ Can lead to data breaches, service outages, identity theft, ransomware attacks, etc.

◦ Most cyberattacks occur because vulnerabilities were not fixed in time.

Real-World Examples

◦ Equifax breach (2017): Due to an unpatched vulnerability

◦ Facebook (2019): Millions of passwords stored in plaintext


Cyber Attacks
What is a Cyber Attack?

• A malicious attempt to disrupt, damage, or gain unauthorized access to a computer system,


network, or data
• Can target individuals, companies, or governments

Who Performs Cyber Attacks?

• Hackers, criminal groups, hostile nations, insiders, or even competitors

• Can be motivated by profit, revenge, ideology, or just curiosity


Cyber Attacks
Why Are Cyber Attacks Done?

◦ Steal sensitive information (bank details, credentials, business secrets)

◦ Disrupt services (take down websites, stop company operations)

◦ Demand ransom (Ransomware attacks)

◦ Prove a point (Hacktivism)

◦ Cause chaos or show off skills (for fame or ego)


Cyber Attacks
Who Are Hackers?

• Individuals skilled in finding and exploiting system vulnerabilities


• Not always bad — depends on their intention and ethics

Types of Hackers

• White Hat Hackers – Ethical hackers, work legally to find vulnerabilities and help fix them
• Black Hat Hackers – Malicious hackers, break into systems for illegal purposes

• Grey Hat Hackers – Mix of both; may hack without permission but don’t always have harmful
intent
Cyber Attacks
Examples of Cyber Attacks

◦ Man-in-the-Middle (MITM): Intercepting communication between two parties

◦ Denial of Service (DoS): Overloading a system with traffic to make it crash

◦ Trojan Horse: Malware disguised as legitimate software

◦ Ransomware: Locks data and demands payment to unlock

◦ I Love You Virus (2000): Spread via email attachments, corrupted files

◦ Shortcut Virus: Replaces folders with infected shortcuts

◦ File Corruption Virus: Alters or deletes important data in the system


Cyber Security
What is Cyber Security?

• The practice of protecting systems, networks, and data from digital attacks
• Ensures confidentiality, integrity, and availability of information

Why Is Cyber Security Important?

• To prevent data breaches, financial loss, and operational disruption


• To safeguard reputation and trust

• To comply with legal and industry regulations


Cyber Security
Types of Cyber Security

◦ Network Security: Protects internal networks from intruders

◦ Information Security: Protects data integrity and privacy

◦ Application Security: Secures software and applications

◦ Cloud Security: Ensures safety of cloud-stored data

◦ Endpoint Security: Protects devices like laptops, mobiles, etc.

◦ Operational Security: Controls who accesses what within an organization


Cyber Security
Technologies Used in Cyber Security

◦ Antivirus software

◦ Firewalls

◦ Intrusion Detection & Prevention Systems (IDPS)

◦ Encryption algorithms

◦ Multi-factor authentication

◦ Security Information & Event Management (SIEM)

◦ AI & Machine Learning for threat detection


Cyber Security
Cyber Security Jobs & Companies

◦ Companies hire dedicated cybersecurity professionals: Security analysts, engineers,


consultants

◦ Cybersecurity is a multi-billion dollar industry

◦ Required in banks, hospitals, tech companies, governments


Cyber Security
Worldwide Cyber Workforce & Bug Bounty

◦ Some companies crowdsource cybersecurity using global talent

◦ Bug Bounty:

◦ Program where ethical hackers report vulnerabilities

◦ Companies pay rewards for finding real security flaws

◦ Famous platforms: HackerOne, Bugcrowd, Synack

◦ Earnings range from hundreds to millions of dollars (some hackers made over $1 million!)
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss

Background

• Mr. Bean, the beloved comedy character, is not just a TV figure — his official website hosted
content, merchandise, and fan interactions.

• The site was part of the brand's business and public relations strategy.
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss

What Happened?

• In 2015, the official Mr. Bean website was hacked.


• The attackers reportedly defaced the site and exposed its lack of proper security.

• While the hack didn’t result in major financial loss directly, the trust of fans and users was
impacted.
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss

Impacts

• Loss of Brand Trust: Fans questioned the safety of sharing info on the site.
• Business Reputation Damage: Affects future merchandise sales and partnerships.
• Public Embarrassment: Widely discussed online, harming the image of a globally loved brand

• Lesson: Even popular, non-technical brands need strong cybersecurity to protect trust and
business continuity.
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss

Moral:

1. Cyber Security is a myth for a few individuals.

2. If there is a door, it can be broken.

3. No business is too “funny” or “small” to be a target. Hackers attack wherever there is


weakness — and trust once lost is hard to rebuild.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy