Industry 4.0 - Changing How We Live

The Fourth Industrial Revolution, otherwise known as Industry 4.0, represents the convergence of emerging technologies which are changing the world far faster than any earlier revolutions with a scale, speed and complexity that is unprecedented.
 
These changes will come with the Internet of Things, AI, Machine Learning, 3D printing, Advanced Robotics, Virtual and Augmented Reality into a Revolution. Few areas of our lives wil remain untouched by the digital revolution. 
 
Across the world there are now nearly 4.5 billion Internet users and over five billion mobile phone connections; every day, we send about 300 billion emails. From 2000 to 2020, the number of global Internet users rose from 394 million to 4.4 billion which nearly 57% of the 7.7 billion global population. Today there are over one billion Google searches every day and two billion videos viewed daily on YouTube. The average user spends 2.5 hours a day online. 
 
The next phase of business web/cyber innovation is the ability to collect, deeply analyse and commercial process global data. 
It will disrupt nearly every industry in every country, creating new opportunities and challenges for people, places and businesses to which we must respond. In short, it's the development of technologies that pave the way to make 'dumb' objects smart, driving reams of data to assist in the transformation of business and our daily lives. Businesses, communities, and citizens will have more access to information, increased efficiency and productivity.  
 
A brief timeline of the four industrial revolutions:
 
1760: First Industrial Revolution: Started in Britain with the steam engine, which enabled new manufacturing processes and the creation of factories.
1860: Second Industrial Revolution: Mass production in new industries like steel, oil and electricity. The light bulb and telephone were both invented during this era.
1960: Third Industrial Revolution: Also known as the “Digital Revolution,” this time period launched the inventions of the personal computer, the semiconductor, and the internet.  
2016: Fourth Industrial Revolution: Klaus Schwab, Executive Chairman of the World Economic Forum first introduced this idea, which brings together the advances of AI, robotics, IoT, machine learning and other technologies.
 
Up until the Fourth Industrial Revolution, each preceding industrial revolution lasted about a century, but technology has moved quickly to accelerate this latest revolution. 
 
The Fourth Industrial Revolution focuses on smart technologies and connected devices. Some analyts predict that in 2 years, more than 31 billion devices will be connected, up from 22 billion devices at presnet. While these numbers can sound overwhelming, it also offers huge global opportunities, allowing people to securely connect to any device, on any network, to any application. The rollout of 5G and Wi-Fi 6, which promise faster speeds and better reliability will accelstae the process.  
 
 
Currently the Internet is a global interconnecting electronic system of about 52 billion computers. networks, which includes the World Wide Web which is that part of the Internet that search engines like Google search. 
 
Yet there is a very large part of the internet which is not visible and cannot be accessed using Google and other conventional web-browing tools. This is known as the Deep Web.
 
Deep Web
The Worldwide Web also includes the Deep Web which is much larger than the searchable Web includes many sites and data that is non-accessible to Google type searches as it has publicly non-accessible parts of business, university data and secret and private aspects of government data.  It is difficult to judge how large the Deep Web actually is but it is certainly much larger that the surface Web and many experts believe it to be four or five hundred times larger than the surface Web. Within the Deep Web however there is a small area known as the Dark Web and this is really the Red Light District.  
 
Searching the Dark Web
To give this electronic information scape a picture one can imagine that the Internet is an interlinked country with large cities, towns and villages as well as closed farming and woodlands. Now deeper into the cities and some larger towns there are red-light districts where the criminals have hideouts, clubs, brothels and hidden drug shops. This aspect of the Web is the Dark Web which houses the criminal economy which is growing and will affect more aspects of the legal Internet. This is now where one can buy drugs, review porn pictures, prostitution connections, buy passports and weapons, also there are stolen libraries of books, films and videos for sale. 
 
The Dark Web can be accessed by using special search engines like Tor. 
The dark web was actually created by the US government to allow spies to exchange information completely anonymously. US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use. The Dark Web is used by criminals but it is also used by people like journalists, people who want to stop corporate and government surveillance of their activity on the Web. The Dark Web is growing and will certainly change the Internet. From a criminal angle this area of the web is very commercially successful and they use it not only to sell illegal products and items but also to understand who to criminally target and steal from their accounts. 
 
What is Available on The Dark Web?
Ulbricht, formerly known as Dread Pirate Roberts, founder of the Silk Road Dark Web online market, was convicted in 2015 on charges of money laundering, conspiracy, drug and hacking-related charges. However, the Dark Web remains incredibly attractive to Internet users for a wide range of reasons.
 
The shadowy nature and complex methodology required to access this world have effectively made it a secret world, full of salacious activity, black markets, sights is limited to a select few.
 
Here are some of the many items found using Dark Web links:
 
Credit card numbers; Stolen credit card numbers are a big business on the Dark Web. 
Fake passports: Popular Dark Website “Fake Documents” specializes in selling top-notch replica documents from every nation in the world. A United States passport can be had for about 1,000 dollars.
Marijuana: Every strain, potency, and type of Marijuana can be found on the Dark Web. Meanwhile, prices are often lower than those typically found in the “regular” market.
Stolen/Hacked Accounts: On the Dark Web, it is very easy to procure stolen/hacked accounts to popular websites and services such as Netflix, Spotify, Uber, and PayPal.
Fake College Degrees: Certificates with any name and any institution are for sale on the Dark Web. Whether you are interested in purchasing a degree in your name from Harvard, Yale, or Stanford, these official looking documents can be had quickly and cheaply.
Murder for hire/Assassination: Murder for hire is perhaps the most famed notion associated with the Dark Web. Whether you believe in the existence of contract killers or consider it a hoax, there exists a very real community on the Dark Web with a plethora of individuals claiming they can kill for money. Whether that individual is a teenage prankster or a serious killer is a question which remains unknown.
 
Cisco:     ComputerWorld:     GovUK:       CNBC:
 
You Might Also Read: 
 
Digital Shock: The 4th Industrial Revolution:
 
The Digital Future Is About Disintegration:
 
 
 
 
« Facial Recognition: A Three Billion Image Database
Wawa Breach - Data On 30m Card Users For Sale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.