Industry 4.0 - Changing How We Live

The Fourth Industrial Revolution, otherwise known as Industry 4.0, represents the convergence of emerging technologies which are changing the world far faster than any earlier revolutions with a scale, speed and complexity that is unprecedented.
 
These changes will come with the Internet of Things, AI, Machine Learning, 3D printing, Advanced Robotics, Virtual and Augmented Reality into a Revolution. Few areas of our lives wil remain untouched by the digital revolution. 
 
Across the world there are now nearly 4.5 billion Internet users and over five billion mobile phone connections; every day, we send about 300 billion emails. From 2000 to 2020, the number of global Internet users rose from 394 million to 4.4 billion which nearly 57% of the 7.7 billion global population. Today there are over one billion Google searches every day and two billion videos viewed daily on YouTube. The average user spends 2.5 hours a day online. 
 
The next phase of business web/cyber innovation is the ability to collect, deeply analyse and commercial process global data. 
It will disrupt nearly every industry in every country, creating new opportunities and challenges for people, places and businesses to which we must respond. In short, it's the development of technologies that pave the way to make 'dumb' objects smart, driving reams of data to assist in the transformation of business and our daily lives. Businesses, communities, and citizens will have more access to information, increased efficiency and productivity.  
 
A brief timeline of the four industrial revolutions:
 
1760: First Industrial Revolution: Started in Britain with the steam engine, which enabled new manufacturing processes and the creation of factories.
1860: Second Industrial Revolution: Mass production in new industries like steel, oil and electricity. The light bulb and telephone were both invented during this era.
1960: Third Industrial Revolution: Also known as the “Digital Revolution,” this time period launched the inventions of the personal computer, the semiconductor, and the internet.  
2016: Fourth Industrial Revolution: Klaus Schwab, Executive Chairman of the World Economic Forum first introduced this idea, which brings together the advances of AI, robotics, IoT, machine learning and other technologies.
 
Up until the Fourth Industrial Revolution, each preceding industrial revolution lasted about a century, but technology has moved quickly to accelerate this latest revolution. 
 
The Fourth Industrial Revolution focuses on smart technologies and connected devices. Some analyts predict that in 2 years, more than 31 billion devices will be connected, up from 22 billion devices at presnet. While these numbers can sound overwhelming, it also offers huge global opportunities, allowing people to securely connect to any device, on any network, to any application. The rollout of 5G and Wi-Fi 6, which promise faster speeds and better reliability will accelstae the process.  
 
 
Currently the Internet is a global interconnecting electronic system of about 52 billion computers. networks, which includes the World Wide Web which is that part of the Internet that search engines like Google search. 
 
Yet there is a very large part of the internet which is not visible and cannot be accessed using Google and other conventional web-browing tools. This is known as the Deep Web.
 
Deep Web
The Worldwide Web also includes the Deep Web which is much larger than the searchable Web includes many sites and data that is non-accessible to Google type searches as it has publicly non-accessible parts of business, university data and secret and private aspects of government data.  It is difficult to judge how large the Deep Web actually is but it is certainly much larger that the surface Web and many experts believe it to be four or five hundred times larger than the surface Web. Within the Deep Web however there is a small area known as the Dark Web and this is really the Red Light District.  
 
Searching the Dark Web
To give this electronic information scape a picture one can imagine that the Internet is an interlinked country with large cities, towns and villages as well as closed farming and woodlands. Now deeper into the cities and some larger towns there are red-light districts where the criminals have hideouts, clubs, brothels and hidden drug shops. This aspect of the Web is the Dark Web which houses the criminal economy which is growing and will affect more aspects of the legal Internet. This is now where one can buy drugs, review porn pictures, prostitution connections, buy passports and weapons, also there are stolen libraries of books, films and videos for sale. 
 
The Dark Web can be accessed by using special search engines like Tor. 
The dark web was actually created by the US government to allow spies to exchange information completely anonymously. US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use. The Dark Web is used by criminals but it is also used by people like journalists, people who want to stop corporate and government surveillance of their activity on the Web. The Dark Web is growing and will certainly change the Internet. From a criminal angle this area of the web is very commercially successful and they use it not only to sell illegal products and items but also to understand who to criminally target and steal from their accounts. 
 
What is Available on The Dark Web?
Ulbricht, formerly known as Dread Pirate Roberts, founder of the Silk Road Dark Web online market, was convicted in 2015 on charges of money laundering, conspiracy, drug and hacking-related charges. However, the Dark Web remains incredibly attractive to Internet users for a wide range of reasons.
 
The shadowy nature and complex methodology required to access this world have effectively made it a secret world, full of salacious activity, black markets, sights is limited to a select few.
 
Here are some of the many items found using Dark Web links:
 
Credit card numbers; Stolen credit card numbers are a big business on the Dark Web. 
Fake passports: Popular Dark Website “Fake Documents” specializes in selling top-notch replica documents from every nation in the world. A United States passport can be had for about 1,000 dollars.
Marijuana: Every strain, potency, and type of Marijuana can be found on the Dark Web. Meanwhile, prices are often lower than those typically found in the “regular” market.
Stolen/Hacked Accounts: On the Dark Web, it is very easy to procure stolen/hacked accounts to popular websites and services such as Netflix, Spotify, Uber, and PayPal.
Fake College Degrees: Certificates with any name and any institution are for sale on the Dark Web. Whether you are interested in purchasing a degree in your name from Harvard, Yale, or Stanford, these official looking documents can be had quickly and cheaply.
Murder for hire/Assassination: Murder for hire is perhaps the most famed notion associated with the Dark Web. Whether you believe in the existence of contract killers or consider it a hoax, there exists a very real community on the Dark Web with a plethora of individuals claiming they can kill for money. Whether that individual is a teenage prankster or a serious killer is a question which remains unknown.
 
Cisco:     ComputerWorld:     GovUK:       CNBC:
 
You Might Also Read: 
 
Digital Shock: The 4th Industrial Revolution:
 
The Digital Future Is About Disintegration:
 
 
 
 
« Facial Recognition: A Three Billion Image Database
Wawa Breach - Data On 30m Card Users For Sale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.