Unit 6 - Global risks and Resilience Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is Cyber-crime?

A

A crime in which a computer is the object of the crime or is used as a tool to commit an offense (e.g hacking, child pornography, money laundering).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is at risk of cyber crime? How?

A

The worst-affected countries are the USA, China, Germany, the UK and Brazil. This is because as more areas of people’s lives become digitalised, the risks of cybercrime increases which is especially prevalent within these countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How much does cyber crime cost?

A

Costing countries millions of dollars every year. The average cost of cybercrime in seven countries was $7.7 million/year, with larger companies experiencing the higher costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define hacking

A

Hacking can be defined as unauthorized access to a computer, network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of hackers?

A

Black hats hackers– Notorious for creating malware in order to infiltrate systems and are usually motivated by personal and financial gain. They can be amateur or highly experienced and will do anything from spreading malware to stealing personal details. Can steal, manipulate, destroy system.

White hats hackers– These are “ethical hackers” that may be employed by companies and governments as security specialists looking for vulnerabilities. Ethical hacking is considered an academic field and is taught through courses and training as well as conferences. One can even become a certified ethical hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the threats to personal freedoms/individuals and businesses?

A
  • Hacking
  • Identity theft
  • Email Scams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of hacking

A

In 1999, a 15 year old teenager, Jonathan James penetrated the computers of a US Department of Defense and installed a ‘backdoor’ on its servers which allowed him to intercept thousands of internal emails from different government organizations, including ones containing usernames and passwords for various military computers. He then used the information to steal NASA’s software, which controlled the temperature and humidity of the International Space Station, thus causing the system to shut down for three weeks. He was caught and charged, but later committed suicide when accused of collaborating with other hackers to steal credit cards information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Identity theft

A

Identity theft is the deliberate and illegal use of someone’s information and identity in order to economically gain, obtain benefits, commit cyber crimes or even intentionally cause a loss to the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example of identity theft

A

In 2001, Abraham Abdallah tricked many credit card companies into providing him with information and then used the identities of some of America’s richest, including Warren Buffet and Steven Spielberg, to steal millions of dollars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a response to ciber-crimes such as hacking and identity theft?

A

there has been a rise in surveillance and monitoring of users – which has been met with both praise and criticism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of surveillance

A
  • CCTV cameras can improve safety and reduce crime, especially at night when people are most vulnerable.
  • Surveillance can help ‘catch’ criminals. For example, it only took the FBI three days to release photos of the suspects of the Boston Marathon bombing.
  • It can help improve urban facilities. Live-cameras can be used to catch speeding motorists and traffic surveillance allows users to estimate travel time to their destinations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dangers of a surveillance society

A
  • Mass surveillance is expensive and requires a lot of hardware to set up the entire system.
  • Surveillance can easily be abused and used to blackmail or coerce people. The power of surveillance was brought to light by the 2014 Sony Pictures Hack. Hackers, who were allegedly employed by North Korean authorities, stole personal information from Sony employees and threatened to carry out a terrorist attack akin to 9/11 if the controversial film “The Interview” was not pulled from theaters. The ability for surveillance to hold such power makes it a dangerous tool to play with.
  • Surveillance infringes on personal freedom. At a national scale, in January 2011, Ethiopian authorities filtered pictures of conflict and eventually cut off internet service to stop a revolt from spreading. This is an example of how personal freedom (e.g freedom of expression) can be compromised by surveillance of internet activities by the government.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example of surveillance in China

A

In November 2018, Chinese authorities published a law that requires app providers like Alibaba and Tencent to keep a log of information about their users (including blog and chat room posts) and be readily available to provide this information and names of registered users to the government if they demand it. This is seen to be a direct infringement on personal freedom as users do not have total control over the content they use and contribute and are restricted and limited to what the government deems correct composure on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define supply chain

A

a “network between a company and its suppliers to produce and distribute a specific product to the final buyer. This network includes different activities, people, entities, information, and resources.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Political risks to global supply chain flows

A
  • Brexit is a risk that is impacting heavily on global supply chains of major companies. For example, Honda Car manufacturing company has a plant in the UK. However, as a result of the uncertainties associated with the UK’s exit from the EU, the company has moved its production functions due to the implications this may have on its business.
  • Presence of political demonstrations like protests – e.g. Foxconn iPhone components production in Vietnam was suspended following political demonstrations
  • Rise in terrorist attacks – e.g. Daesh terror attacks that target holidaymakers in Tunisia have led to TNC supply shocks and a decreased tourist revenue.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical risks to global supply chain flows

A
  • The Coronavirus pandemic affected the supply of raw materials for many companies in different parts of the world.
  • Flooding in Bangladesh disrupted the supply of supply of cotton for clothing manufacturing companies in many parts of the world.
  • The Ebola outbreak in West Africa in 2016 seriously affected the supply chains of most companies depending on raw materials such as diamond, cocoa, gold and other agriculture produce they obtain from the affected countries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Economic risks to global supply chain flows

A
  • Rising interest rates can cause havoc for firms that need goods at cheap prices.
  • Trade restrictions imposed by governments. e.g. steel tariffs usa.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define political sovereignty

A

The complete and absolute freedom of any country to govern itself or manage its own affairs, without interference from another country. Ideally, every country is a sovereign state, however membership to multi-governmental organizations such as the EU or UN can limit a country’s sovereignty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define economic sovereignty

A

The economic independence a country enjoys without any interference from another country – that is, by trying to influence market forces in the country. For example, the Francophone countries in West Africa ( Togo, Burkina Faso, Ivory Coast, Senegal etc) do not have full economic sovereignty, as the value of their currency is fixed by the Central Bank in France.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is increased globalisation often associated with?

A

Increasing globalisation is often associated with the loss of political and economic sovereignty of most globalised nations. This is partly responsible for the growth of nationalism in most advanced countries such as the USA, UK, Germany and France.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Examples of loss of political and economic sovereignty

A
  • The sale of part of UK’s iron/steel industry at Sheffield to the Indian Company, Tata, is viewed by some critics of globalization as the ‘sale’ of the UK’s economic sovereignty to India.
  • Two major airports in the UK – Heathrow and Gatwick airports are owned by foreigners despite their strategic importance to the UK. Similarly, most ports in the UK, in places like Liverpool, are foreign owned.
  • Some British clubs such as Manchester City, Chelsea, Leicester City are owned by foreign businessmen.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define profit repatriation

A

The return of a company’s foreign-earned profits or financial assets to that company’s home country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does profit repatriation cause a threat to the economic and/or political sovereignty of states?

A

Profit repatriation is a form of threat that affects the sovereignty of states and undermines their capacity to effectively control TNCs, due to fear of losing them to other countries. It also undermines their capacity to raise revenue to undertake socio-economic projects in the country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define tax avoidance

A

Use of legal methods to minimise the amount of income tax owed by an individual or a business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does tax avoidance by TNCs threaten the economic sovereignty of their parent states.

A

TNCs practice tax avoidance by repatriating profits made in overseas countries to other countries with lower corporate tax rates, thereby threatening the economic sovereignty of their parent states. This may lead to a fall in the country’s GDP or reduce the country’s internal revenue needed for develop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define tax haven

A

Usually an offshore country with very low rates of taxation for foreign investors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How may tax haven countries lose their sovereignty?

A

The countries that are the tax heavens may lose their sovereignty, such as the Cayman island. This is as the tax havens cannot change their economic policies due to the fear of retaliation, such as the TNC’s finding an alternative tax haven. This would cause the tax haven to lose all their income if the TNC’s leave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define a disruptive technology

A

A disruptive technology is any technology that displaces an existing one, resulting in a complete restructuring of the industry.
E.g. Drones and 3D printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a drone?

A

an unmanned aerial vehicle (UAV) which is controlled by a person on the ground or remotely by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Advantages of drones

A
  • They can be used for military combat, reducing the need for boots on the ground.
  • They can be used in agriculture for spraying herbicides and controlling pests.
  • Drones can be used for delivery of medical supplies – recently introduced in Ghana.
  • In Canada, drones are used for courier services; delivering supplies to remote areas.
  • Drones can be used in photography – to take aerial photographs.
  • it can be used to study weather phenomenon – it can enter the eye of a storm (hurricane) to measure its characteristics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Disadvantages of drones

A
  • Drones can malfunction due to human or computer errors, causing damage to life and property.
  • Drones can very expensive to purchase and maintain.
  • Drones for military purposes can cause the accidental death of innocent people.
  • Drones can invade a person’s privacy, in the case of drones with infrared sensors and powerful cameras.
  • Drones can disrupt air transport, as it happened at Gatwich airport in the UK in December 2018.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is 3D printing?

A

a process of making three dimensional solid objects from a digital file. The creation of a 3D printed object is achieved using additive processes that enables you to produce complex (functional) shapes using less material than traditional manufacturing methods.

33
Q

Usefulness of 3D printing

A
  • It can be used to print prosthetic parts for human and even animals.
  • It can be used for the construction of houses, quickly and and economically.
  • It is useful for printing musical instruments
    Possibly for printing houses on Mars.
  • It is used for printing parts of airplanes such as fuel nozzles and jet-engines
34
Q

Disadvantages of 3D Printing

A
  • In the USA, the uses of 3D printing are unregulated by the state department which poses a threat because there is no control over the functions of people’s private 3D printers.

Therefore, security is questioned for the state because of individual freedoms which is a particular concern when it regards the production of guns in the home.

  • Designs for guns have been posted online which have been forcibly taken down and then re uploaded on the internet for all citizens to access. This makes the potential for violence a lot more accessible to a lot of the country.
35
Q

The correlation between increased globalization and renewed nationalism/tribalization

A

In response to increasing global interactions individuals, civil society organizations and sometimes entire states have started opposing the free movement of goods, people, ideas and capital. This is particularly true in countries have lost more to globalization such the UK, USA. EU and some developing countries. The rise of populism, tribalism, racism and anti-immigration/globalization in these countries suggest that the loser of globalization are beginning to show their concerns through these movements .

36
Q

Example of geopolitical tension in Ukraine

A
  • Crisis began in November 2013
  • There were protests in Kiev following the president’s rejection of a deal for greater integration with the EU.
  • In March 2014, Russian troops gained control of the Crimean region as Crimea voted to join Russia.
  • Putin said that Crimea had to be part of a “strong and stable sovereignty” and that could only be Russia.
  • In May 2014, pro-Russian separatists in eastern Ukraine declared independence from Ukraine. This triggered conflict. over 9000 people died and 1.1 million Ukrainians became refugees.
  • The conflict has increased tensions between Russia and both the EU and the USA. These tensions may intensify in Russia expands its presence in Ukraine or into a NATO country. Economic sanctions are said to have cost Russia some 100 billion euros.
37
Q

Example of geopolitical tension - Brexit

A
  • Naturally, stocks will be lifted by the deal and the pound strengthened, but this does not mean the end of Brexit.
  • It is also probable that influential political voices in other European nations will be strengthened by Britain’s decision and push harder for their countries to leave the EU or make radical changes, thereby hiking geopolitical tensions.
38
Q

Define Transboundary pollution (TBP)

A

‘pollution that originates in one country but, by crossing the border through pathways of water or air, is able to cause damage to the environment in another country’

39
Q

Examples of TBP

A
  • Chinese pollution from the industries in Shenzhen reaching Japan.
  • Radioactive leak from Fukushima reaching the shores of the USA.
40
Q

What is the haze problem in Indonesia?

A
  • Large source of the fire comes from Peatlands in Indonesia. They contain twice as much carbon as regular forests so more greenhouse gas is emitted.
  • Untouched peatlands are dense, water logged forests that are normally fire resistant. However, after two decades of peatland clearance, they have turned parts of Indonesia into a giant matchbox.
  • When peatlands are drained for plantation, carbon is released into the atmosphere as CO2 emissions.
  • The problem is compounded when peat soil catches fire. The fire can smother deep under the surface making it hard to put out. Hence, causing longer fires and periods of haze.
  • Southwest monsoon winds carry haze from country to country such as into Singapore and Malaysia.
41
Q

What are the consequences of this transboundary pollution event (Indonesia)

A
  • The fumes are often toxic​
  • It can damage the environment and wildlife. It has been found to damage bees and reduce their numbers within the colonies​
  • it can produce acid rain​
42
Q

The responses to the Indonesia TBP event by key stakeholders

A
  • Has to be a collaborative effort between authorities, communities, corporations and international agencies to help prevent the haze.​
  • E.g. local authorities in Indonesia enforce bans on illegal burning activity. ​
  • E.g. Private plantation companies in Riau make farmers go through training and provide education on the haze and how to deal with/combat it. ​
  • Large companies also leading the way by providing resources to fire-fighting efforts.
43
Q

Example of localized pollution resulting from global flows:

A
  • The transportation e-waste from the US and EU to Ghana, Agbogbloshie, which has resulted in the pollution of water bodies and the discharge of mercury as well as other hazardous substances, causing land pollution and impacting negatively on the health of the people involved in dismantling the e-waste.
44
Q

What are the ways in which ships can cause pollution?

A
  • oil leaks resulting from oil tanker accidents
  • chemical pollution due to deliberate discharge of chemical waste into the seas
  • noise pollution
  • dumping of e-waste and the materials into the sea
  • the release of carbon monoxide and other chemicals into the atmosphere.
45
Q

What is carbon footprint

A

the total amount of greenhouse gases produced by individual, organization or a country, usually measured in terms of the amount of CO2 produced. The flow of goods, people and food around the world has implications on the global carbon footprint. This is important in the context of climate change, which is greatly contributing of global warming.

46
Q

Food production leads to the release of greenhouses through…

A
  • the use of machinery of farming and food processing
  • the use of pesticides and fertilizers in farming
  • refrigeration of processed foods which requires energy to freeze or keep fresh
  • packaging
  • distribution, using container trucks, ships or airplanes which produce carbon monoxide into the atmosphere
47
Q

What is one way to measure the environmental impact or the carbon footprint of food?

A

Food miles is the distance food travels from the producer/farmer to the consumer/buyer. The longer the distance food travels the greater the food miles and therefore, its carbon footprint.

48
Q

Flow of people and carbon footprints

A

Globalization, resulting from the free movement of people, either as economic migrants or tourists, has resulted in an increase in global CO2 emissions. This mostly takes place through movement of people using vehicles, trains, airplanes etc. These modes of transportation contribution greatly to the amount of GHGs in the atmosphere. It is estimated that by 202o, migrants into the UK will contribute about 125m tonnes of CO2.

49
Q

Polluting manufacturing industries

A

An important issue of concern to environmentalists is the relocation of polluting industries from HICs to LICs. This means that global interactions is causing environment pollution resulting from the relocation of polluting industries to poor countries desiring to benefit from global interactions.

  • HICs have more robust green laws, greater social supervision and more effective governments.
  • NICs have weaker environmental regulations and enforcements. These less regulated environments give richer nations a chance to export their waste and pollution.
  • The environmental vulnerability of LICs and NICs to pollution is as a result of their underdeveloped systems as well as their need for the economic benefits of the polluting industries.
50
Q

Case study of polluting industry

A

Maquiladora dev’t in Mexico. This is a collection of American polluting industries located in the town of Maquilladora, which is causing environmental damage in environment. They are characterized by:

  • Usually low-cost assembly plants that take advantage of relaxed environmental laws in Mexico.
  • Industries with high levels of toxic waste consists of the Maquiladora industries.
  • Located in places such as Cuidad Juarez, Tijuana and Nuevo Laredo.
  • They are important to Mexico because:
  • They are a source of labour for the economy (over 500,000 jobs)
  • They pay taxes to the government
  • They bring investment to the northern part of Mexico
    However, they are a source of pollution (air and water)
51
Q

Reasons why polluting industries relocate to LICs

A
  • High taxes on polluting industries in HICs
  • Strict environmental laws in HICs on pollution
  • High cost of labour in HICs, especially for manufacturing sector workers. i.e low labour cost in LICs attracts polluting industries as a cost cutting measure to increase their profits. E.g in Mexico, a factory worker is paid 1/5 of an American factory worker’s wages.
  • People in developing countries desire some of the waste products in order to extract valuable minerals such as gold, platinum, aluminum etc in order to make a living. In Ghana, Agbogloshie, is the world’s largest e-waste dump for products originating from the United States and the European Union.
52
Q

What is Agribusiness?

A

Agribusiness refers to farming undertaken by large-scale business corporations that embrace the production, processing, distribution of agricultural products, and the manufacture of farm machinery, equipment and suppliers.

53
Q

Advantages of Agribusiness

A
  • The production of food on a large scale makes food available to areas that do not have sufficient food supply, because they are able to export food.
  • They create employment opportunities.
  • They create revenue for the governments through the taxes that they pay.
  • Agribusiness also leads to the development of infrastructure in many developing countries.
  • They eliminate middle men who contribute in increase the prize of agricultural produce.
54
Q

Criticisms of Agribusiness

A
  • Agribusinesses leads to air pollution and greenhouse gas emissions from farming activities. Eg.10% of UK’s greenhouse gases come from Methane (from animal manure) and nitrous Oxide (from fertilizer).
  • Large farming by TNCs can cause significant damage to the natural environment. This is because growing a single crop draws too much nutrients from the soil, leading to leaching.
  • Large land grabs by TNCs deny local people the right to cultivate food for domestic consumption. For example, in the Amazonian forest in Brazil, indigenous farmers have been forced out of their native communities due to the impact of agribusiness activities.
  • Food is preserved, processed, package-branded and marketed such that food is becoming increasingly unrecognizable. For example, it is difficult to link processed meat products to the actual type of animal.
55
Q

What are the strategies to build resilience?

A
  • reject globalisation (seems impossible)
  • mitigation - controlling risks to globalisation
  • adaptation - adapting to the risks
56
Q

Define Civil Society Organisation

A

any organization or movement that works in the area between the household, the private sector and the state to negotiate matters of public concern. CSOs include faith-based organizations, academic institutions, trade unions and community groups.

57
Q

Detailed example of one environmental CSO action

A
  • Greenpeace – managing environmental issues
  • campaigning against the negative effects of the exploitation of oil by the oil giant, Shell, in the Ogoniland (Niger Delta) in Nigeria.

Issues raised by Greenpeace and the other civil societies include:

  • Water pollution in the Niger Delta due to oil spills. This kills fish and reduces the fish stocks for the Ogoni people (occupants of the Niger Delta) who are mainly fishers and farmers.
  • Atmospheric pollution due to burning of oil and the use of machinery during oil drilling, releasing tons of toxic fumes into the atmosphere.
  • Land pollution: Besides fishing, farming is the other activity the Ogoni people rely on for their livelihood. Destroying the land puts pressure on their source of food and income to meet their socio-economic needs.
58
Q

Detailed example of one social CSO action

A

Amnesty International is a global movement of more than 7 million people who take injustice personally. It is campaigning for a world where human rights are enjoyed by all.

59
Q

Example of an activity undertaken by Amnesty

A

The death penalty is the ultimate cruel, inhuman and degrading punishment. When Amnesty began its campaign, a mere 16 countries had abolished the death penalty in law or in practice – today, that number has exceeded 100. On Friday 15 March 2013, Maryland became the latest American state pass a death penalty repeal bill. It is the 18th state to abolish the death penalty – and the sixth state in six years.

60
Q

Define a wicked problem

A

A challenge that cannot be solved easily with a single solution, because it is complex, with multiple stakeholders and must be examined from different perspectives.
e.g. climate change

some of these problems may never be solved in our lifetime.

61
Q

Define Resilience

A

The ability of individuals, organizations or governments to recover quickly (bounce back) from challenges resulting from natural hazards or other forms of shocks.

62
Q

Define offshoring and reshoring

A

Offshoring is moving TNCs to LICs.

Reshoring is the relocation to the home country of a business’s or company’s operations that were overseas.

63
Q

What are reasons for re-shoring?

A
  • high cost of labor in the offshore country
  • high taxes, low skilled labor
  • rising oil prices, thus increasing production cost
  • high cost of transporting goods to the home market and sometimes disruptions to supply chains.
64
Q

What are the benefits of reshoring

A
  • creation of jobs at home
  • large market for customized goods
  • quick delivery of goods to consumers etc
  • increasing the country’s GDP.
65
Q

What is an example of a re-shoring company?

A
  • Problems with supply chain management as well as high labor costs and control by the Chinese government have contributed in Apple’s desire to re-shore some of its operations to the USA.
  • A March 2017 press release from Apple claims the company supports some 4.8 million jobs in China, compared to 2.0 million in the U.S.
66
Q

What are the disadvantages of re-shoring?

A
  • Profit levels might fall as a result of re-shoring, as most TNCs admit that a large share of their profits come from the Asian countries, like China.
  • With Brexit looming around the corner, one cannot predict the fate of TNCs that have re-shored their functions to the UK. The solution might seem to lie in near-shoring, a backup resilient strategy to face the threats of global interactions.
67
Q

Explain why Apple are under pressure to re-shore their operations.

A
  • Make America great campaign - focus back to the nation state.
    • Corporate responsibility - countries are putting pressure on TNCs for corporate responsibility. E.g. apple is an American country. Does it have a corporate responsibility to support America?
    • Pressure they are being put under for not investing back into the US and paying the taxes.
68
Q

Push factors of reshoring

A
  • Rising global oil prices, increasing transportation costs
  • A relative lack of skilled labour in LICs compared with HICs
  • Rising labour costs in LICs and NICs.
  • Greater risk in the supply chain.
69
Q

Define crowdsourcing

A

Crowdsourcing is the use of the internet to obtain support from users in the form of goods, finance, ideas, services etc.

70
Q

Define all the forms of crowdsourcing

A
  • Microtasks: breaking a large project into tiny, well defined tasks for a crowd of workers to complete
  • Macrotasks: Presenting a project to the crowd and asking them to get involved with the portions they are knowledgeable in. Participants are empowered to determine the best course of action.
  • Crowdfunding: Asking a crowd to donate a defined amount of money for a specified cause, project or other use within a predetermined timeframe. If your goal isn’t met, all donations are refunded.
  • Contests: Asking a crowd for work and only providing compensation to the chosen entities.
71
Q

Define cybersecurity

A

Cybersecurity is the practice of protecting computers, servers, mobile devices and all aspects of technology/ internet-related systems from digital theft or malicious attack.

Cybersecurity has become an important issue in the world today as more and more people are getting connected to the internet and finance as well as security data is transferred over the internet like never before.

72
Q

What are the new technologies for the management of global flows of data and people?

A

Cybersecurity

E-passports

73
Q

What are common forms of cyber attacks?

A
  • Malware: e.g. virus - commonly used to attack a network system by obtaining information transmitted from the hard drive (spyware) or by blocking certain a systems from functioning on a network (ransomware)
  • Phishing – the practice of sending false information over the internet, usually via email to deceive a person into believing that it a genuine email, in order to steal sensitive or personal information such as passwords/credit card details or install malware on the victim’s computer.
  • Denial-of- service (DoS)– where the hacker floods a system or network in order to exhaust its band width, leading to the collapse of the network.
74
Q

Outline an example of a cyber-attack.

A

In 1999, a 15 year old teenager, Jonathan James penetrated the computers of a US Department of Defense and installed a ‘backdoor’ on its servers which allowed him to intercept thousands of internal emails from different government organizations, including ones containing usernames and passwords for various military computers. He then used the information to steal NASA’s software, which controlled the temperature and humidity of the International Space Station, thus causing the system to shut down for three weeks. He was caught and charged, but later committed suicide when accused of collaborating with other hackers to steal credit cards information.

75
Q

Advantages and disadvantages of cybersecurity

A

Advantages:
1) Protects system against viruses, worms, spyware and other unwanted programs.

2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimizes computer freezing and crashes.
5) Gives privacy to users

Disadvantages:

1) Firewalls can be difficult to configure correctly.
2) Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly.
3) Makes the system slower than before.
4) Need to keep updating the new software in order to keep security up to date.
5) Could be costly for average user.

76
Q

What are the advantages of e-passports?

A
  • faster checking-in at airports
  • faster border control checks
  • Easily to combat crime as the passport can help match the fingerprints obtained from the crime scene
  • it is difficult for anyone to travel with a forged passport
  • lost passports can easily be retrieved
77
Q

What are the disadvantages of e-passports?

A
  • The personal information of the holder could easily be hacked
  • the holder does not have immediate access to their information when it is needed
78
Q

What is the anatomy of an e-passport?

A

An E-passport has a chip which contains personal information about the holder, including facial recognition, fingerprint and iris information. Also called the biometric passport, the introduction of the e-passport is meant to control the flow of people around the world with fake passports. This is important in the wake of recent terrorist attacks in Mumbai, France, Belgium, Libya, Pakistan, Mali and in many other parts of the world.