Cyber-Kinetic Security

Cyber-Kinetic Security Articles

Saudi Arabia Vision 2030: Cybersecurity at the Core of Transformation

Cybersecurity Saudi Arabia
Last week, the Saudi Data and Artificial Intelligence Authority (SDAIA) launched a nationwide awareness campaign called “Ask Before”, intended to educate the public about the significance of personal data ahead of the implementation of a new national personal data protection system. Emphasizing responsible data handling, privacy preservation, and fostering trust and collaboration between commercial entities and private individuals, “Ask Before” supports KSA’s new Personal Data Protection Law (PDPL), which became enforceable on September 14th. The need for such a campaign stems from the fact that the PDPL is the first regulation of its kind rolled out in the kingdom, activated five years after Europe’s General Data Protection Regulation (GDPR). The new law is noteworthy, because it is yet further evidence of the accelerating...

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

Securing Society 5.0 Introduction
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and cyber-physical systems, imagines technology, things and humans converging to address some of the biggest societal challenges. The concept encompasses Industry 4.0, Fourth Industrial Revolution, Smart-Everything World and other buzzwords of the moment. In the society of the future the more the cyber and physical worlds are combined, the greater the benefits we will experience. However, the same is true of cyber threats. The more technology is incorporated into every corner of...

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction. As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this is a means of artistic expression or exploration of human potential. For others, it is a solution to a medical...

The Quantum Computing Threat

Quantum Computer 5G Security
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a classical machine. This quantum computing breakthrough brings us closer to the arrival of functional quantum systems which will have a profound effect on today's security infrastructure. How will quantum computing affect the security of 5G technologies currently being developed and deployed? Last spring we suggested that the emergence of quantum internet connectivity and computation, expected sometime in the next decade, poses numerous new cryptography and cybersecurity challenges for 5G security. MIT offers an explainer on the nascent status of powerful quantum computers, how they work, and where they might provide practical value...

IIoT and Trust and Convenience: A Potentially Deadly Combination

IIoT 5G Trust Security
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to safely cook consumers’ evening meals was the backbone of a military radar. Perhaps it was the $495 price tag (more than $3,700 in today’s money). Whatever the reason, in the early 1970s the percentage of Americans owning a microwave was tiny. By 2011, it was 97%. What changed? Trust and convenience. When microwave technology was first released, it was difficult to trust. Cooking without using heat? It was simply too alien. In 1973, Consumers Union stated that microwave ovens couldn’t be considered safe because there was no solid data on safe levels of...

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

5G Connectivity Security
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th generation cellular technology - 5G network. As the name implies, 5G network follows a developmental chain. First came 1G, the first generation of cellular communication that freed us to make voice calls without being tethered to a physical phone connection. Then 2G augmented this by adding data services like SMS and MMS. 3G gave us...

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC Cybersecurity
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and supports 106, 212, or 424 Kbps throughput. There are three available modes of NFC communication: Read/write (e.g. for reading tags in NFC posters) Card emulation (e.g. for making payments) Peer-to-peer (e.g. for file transfers) There is no need for pairing code between devices, because once in range they instantly start communication and prompt the user. NFC technology is power efficient - much more than other wireless technologies. The communication range of NFC is approximately 10 centimeters and it could be doubled with specific antennas. The short range makes this technology secure. Only allowing near...

Most popular articles this week

Quantum Computer 5G Security

The Quantum Computing Threat

Mastodon