How to Educate to Build an Effective Cyber Resilient Society

How to Educate to Build an Effective Cyber Resilient Society

Jorge Barbosa
Copyright: © 2020 |Pages: 18
DOI: 10.4018/IJCRE.2020010105
(Individual Articles)
No Current Special Offers


The possibility that computers, in particular, personal computers, can be used for harmful actions affecting global computer systems as a whole, due to two main reasons: (1) hardware and / or software failures, which are caused by problems related to their manufacture which must be solved by their respective manufacturers and (2) failures due to actions or inactions of their users, in particular people with low computer skills, people of very low age groups, e.g. children, or very old age groups, e.g. ageing people, or others without a minimum of computer skills. This problem is aggravated by the continuous proliferation of equipment, namely mobile devices, IOT devices and others that have Internet connectivity, namely through a browser. There are the possible ways in the area of cyber education that can contribute to cyber resilience of society and these are developed in this work.
Article Preview

Cyber Actions At Present

Cyber actions of various types have increased annually in a dizzying way.

Many cybersecurity agencies and organizations, both governmental and private, that monitor this type of activity, have produced periodic reports all coinciding with the fact that the number of harmful cyber actions grow from year to year in a frightening way.

The actions reported refer to actions of common cyber-crime, more sophisticated actions targeting banking and financial institutions, actions to obtain personal data, namely personal banking and financial data, and even actions of cyber war or cyber espionage, such as military or industry, the latter seemingly unleashed by states or by organizations and individuals apparently connected to more obscure structures in some states.

One aspect that has also been emphasized in these reports is the sophistication of the attacks and the techniques used in them. This sophistication has been such that many of the software agents used are very hard to detect, and are often only detected when they are activated and trigger some of the actions for which they have been designed and “installed” in a sub-reciprocal way on the computers that make up the software network from which the computer attack will later be triggered. They are true stealth software agents that even technical computer users hardly ever detect, let alone most ordinary users who have only a minimum of computer knowledge and even so from the user's point of view.

Complete Article List

Search this Journal:
Volume 5: 1 Issue (2024)
Volume 4: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 3: 2 Issues (2021)
Volume 2: 2 Issues (2020)
Volume 1: 2 Issues (2019)
View Complete Journal Contents Listing