Sunday, October 25, 2015

Cyber security costs the United States hundreds of billions of dollars and its only going up




Cyber Security 1 from Marco Bagni LostConversation on Vimeo.

Video Sourced from Vimeo Marco Bagni LostCnversation

     The video above tells us an animated story about how the increases in computer processing has ultimately increased the number of hackers that are out there ready to steal information. This makes a lot of sense because just like in any other situation as one thing increases, so does the latter. The part of this video that I found the most troubling was that there are real threats out there to the United States infrastructure that can shut down the systems that Americans need like power, water, transportation and more. One thing that the video didn’t touch on was why there is a threat on the American infrastructure. I just think that being the world’s richest country that we should be able to have more sophisticated systems that can protect us from such a threat.

     Another interesting topic that the video bought up was how the line between our physical and digital worlds are becoming blurry. I think that the video’s creator just put into words what we learn about in class and what we will be seeing in the future. One day in class we watched a video about the Corning Company and the touch screen glass that they are creating that will allow us to interact digitally through mirrors, countertops, workspaces and more all through the touch of a device. We also learned about the clothing that is coming out that will have wires in the textiles so that we can communicate with our devices through our clothes. If the line between the two worlds are blurry now, there soon won’t be a line dividing the two at all.

     Cyber Security is something that we as a country are going to have to be able to provide more of to our citizens. I think that it will take a while just because there is new technology every day and so keeping up with it all may be a little hard. But I do think that the first step will be to make sure that the systems that need the most protection or encryptions are the ones that receive the most attention. 

No comments:

Post a Comment