E-Fusion And Industry 4.0

We are currently experiencing an industrial revolution based on robotics, AI, bio-technology, IoT, and cybertronics and these tends are going to merge and combineto produce more  innovative technologies in the fourth indsutial era - Industry 4.0 - a fusion  that is blurring the lines between the physical, digital, and biological spheres.

We now have mobile AI super-computing which imitates human thought, Intelligent robots, self-driving cars and biotechnology all of which has applications in major industrial areas, including health care, crop production and agriculture.

The US is currently cyber-attacking Russia’s power grid as Russia has been attacking the US’s systems. Both are engaged in offensive attacks and often use outside hackers so that they can claim that it has nothing to do with them. This is similar to how pirates were used in the 16/17th century by nations to attack other nations – they were called privateers with a government commission. 

Cyberspace is now seen by senior military officers and officials as another “domain” of warfare, along with air, land, sea, and space but it’s effective purpose is still in debate. 

In this era, the pace of technological development has again surpassed a nation’s ability to govern effectively. 
We live in a time where security risks emerging from the threat of bio-weapons, nano-weapons, cyber-weapons. Several countries are now developing nano-weapons that can attack using mini-nuclear bombs and insect-like robots and the world has a digital nervous system.

These technologies include 3D commercial production, data driven vehicles, robotic, bio-technology, AI and there is a blurring of physical, digital and biological elements to create a new techno-reality. And of course this is also changing and bringing new types of criminal activity. 

From 2000 to 2019, the number of global Internet users rose from 394 million to 4.2 billion, so over half the world’s population of 7.6 billion now use the Internet. 

This process will globally connect and change all types of jobs within everything from education, business, transport, policing, the military to government. By connecting even more billions of people using mobile devices, electronic connections, storage capability, information accessibility and processing power this revolution will substantially increase the size of the interconnected world. However, cyberspace also includes hacker criminal threats, and the growing arena of cyber-warfare.

Currently Londoners are losing an average of £26 million a month in cyber-attacks on businesses and individuals. Thousands of cyber frauds are recorded in the capital each month, with phishing emails, ransomware and malware the most common scams. Senior Met officers warned fraudsters often target individual employees to bypass company security systems. Analysists suggest that about 73 per cent of frauds are carried out online, with many criminals based overseas, making it difficult for police in the UK to pursue a case. 

The most popular cyber-criminal method is Phishing: where you receive an email that pretends to be from an authority (perhaps your bank, or maybe your boss) in which you’re asked to give out your passwords or personal information such as your address, telephone number, or other data. 

Some thought leaderse are starting to come to terms with Artificial Intelligence, robotics and bio-technology after estimating how much it is going to change aspects of their professional work. Or, as some others predict, the development of full artificial intelligence could spell the end of the human race. 

Stephen Hawking said that once humans really develop artificial intelligence, it will take off on its own and redesign itself at an ever-increasing rate. 

He also said humans, who are limited by slow biological evolution, couldn't compete and would be superseded. However now some others hope and believe that AI, robotics and bio-technology will even extend our life cycle, improve our memory and allow us to live a lot longer…Let’s hope they are right!

By Alfred Rolington

You Might Also Read: 

Cyber Knowledge The Easy Way:

 

« AI Could Transform Submarine Warfare
The Destabilizing Danger Of Cyberattacks On Missile Systems »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.