Emerging Technologies: Rohan Raj Poudel
Emerging Technologies: Rohan Raj Poudel
TECHNOLOGIES
Rohan Raj Poudel
Recap: Week 1
Definition of Emerging Technologies
◦ New, innovative, or evolving technologies that are still in early stages but have potential for
significant impact (society, industry)
Examples Discussed
◦ Historical: Steam Engine (an emerging tech of its time)
◦ Modern:
◦ 5G Networks
◦ Artificial Intelligence (AI)
◦ Quantum Computing
◦ Meta Smart Lens (e.g., AR/VR goggles)
Recap: Week 1
Covered Topics
◦ Future applications of emerging technologies
◦ Advantages (e.g., innovation, convenience, economic boost)
◦ Disadvantages (e.g., job displacement, ethical concerns, cost, pollution)
Activities
◦ Group discussions on the pros, cons, and use cases of each technology
◦ Workshop session for brainstorming and practical engagement
◦ Fun engagement using lovable.ai spin wheel to select random students for group sharing
◦ Presentation of findings by selected groups
Precap: Week 2
This week's focus will shift towards cybersecurity and how Honeypot Technologies are used to
deceive and study cyber threats.
Planned Sessions:
◦ Introduction to Security Concepts
◦ Basics of Security, Cybersecurity, and Cyberattacks
◦ Common examples of cyber threats and security breaches
What is a Guard?
• A guard is anyone or anything that protects something from harm or unauthorized access
• Can be a person, a device, or even a program (e.g., security guard, CCTV, antivirus software)
Understanding Security
Why Do We Need Security?
• To prevent loss or theft of valuable things (money, data, identity)
• To protect privacy, peace, and resources
• To avoid damage, misuse, or unauthorized access
Unauthorized Access
• When someone gains access to systems or data without permission
• Can result in data theft, manipulation, or spying
Online Security
Security Breach
• A successful attack where unauthorized access, theft, or damage occurs
• Example: Hacking into a company's database and leaking customer info
Protection Mechanisms
• Antivirus: Detects and removes harmful programs
• Firewall: Acts as a barrier between trusted and untrusted networks
• Spam Detection: Filters unwanted or harmful emails
• Security Software: Includes encryption tools, endpoint protection, VPNs
What is a Security Vulnerability?
◦ A security vulnerability is a weakness or flaw in a system, software, or process that can be
exploited by a threat actor (like a hacker) to gain unauthorized access or cause harm.
Types of Vulnerabilities
◦ Weak passwords
◦ Can lead to data breaches, service outages, identity theft, ransomware attacks, etc.
Real-World Examples
Types of Hackers
• White Hat Hackers – Ethical hackers, work legally to find vulnerabilities and help fix them
• Black Hat Hackers – Malicious hackers, break into systems for illegal purposes
• Grey Hat Hackers – Mix of both; may hack without permission but don’t always have harmful
intent
Cyber Attacks
Examples of Cyber Attacks
◦ I Love You Virus (2000): Spread via email attachments, corrupted files
• The practice of protecting systems, networks, and data from digital attacks
• Ensures confidentiality, integrity, and availability of information
◦ Antivirus software
◦ Firewalls
◦ Encryption algorithms
◦ Multi-factor authentication
◦ Bug Bounty:
◦ Earnings range from hundreds to millions of dollars (some hackers made over $1 million!)
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss
Background
• Mr. Bean, the beloved comedy character, is not just a TV figure — his official website hosted
content, merchandise, and fan interactions.
• The site was part of the brand's business and public relations strategy.
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss
What Happened?
• While the hack didn’t result in major financial loss directly, the trust of fans and users was
impacted.
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss
Impacts
• Loss of Brand Trust: Fans questioned the safety of sharing info on the site.
• Business Reputation Damage: Affects future merchandise sales and partnerships.
• Public Embarrassment: Widely discussed online, harming the image of a globally loved brand
• Lesson: Even popular, non-technical brands need strong cybersecurity to protect trust and
business continuity.
Short Case Study
Mr. Bean’s Website Hack & Business Trust Loss
Moral: