Industry 4.0 - Changing How We Live

The Fourth Industrial Revolution, otherwise known as Industry 4.0, represents the convergence of emerging technologies which are changing the world far faster than any earlier revolutions with a scale, speed and complexity that is unprecedented.
 
These changes will come with the Internet of Things, AI, Machine Learning, 3D printing, Advanced Robotics, Virtual and Augmented Reality into a Revolution. Few areas of our lives wil remain untouched by the digital revolution. 
 
Across the world there are now nearly 4.5 billion Internet users and over five billion mobile phone connections; every day, we send about 300 billion emails. From 2000 to 2020, the number of global Internet users rose from 394 million to 4.4 billion which nearly 57% of the 7.7 billion global population. Today there are over one billion Google searches every day and two billion videos viewed daily on YouTube. The average user spends 2.5 hours a day online. 
 
The next phase of business web/cyber innovation is the ability to collect, deeply analyse and commercial process global data. 
It will disrupt nearly every industry in every country, creating new opportunities and challenges for people, places and businesses to which we must respond. In short, it's the development of technologies that pave the way to make 'dumb' objects smart, driving reams of data to assist in the transformation of business and our daily lives. Businesses, communities, and citizens will have more access to information, increased efficiency and productivity.  
 
A brief timeline of the four industrial revolutions:
 
1760: First Industrial Revolution: Started in Britain with the steam engine, which enabled new manufacturing processes and the creation of factories.
1860: Second Industrial Revolution: Mass production in new industries like steel, oil and electricity. The light bulb and telephone were both invented during this era.
1960: Third Industrial Revolution: Also known as the “Digital Revolution,” this time period launched the inventions of the personal computer, the semiconductor, and the internet.  
2016: Fourth Industrial Revolution: Klaus Schwab, Executive Chairman of the World Economic Forum first introduced this idea, which brings together the advances of AI, robotics, IoT, machine learning and other technologies.
 
Up until the Fourth Industrial Revolution, each preceding industrial revolution lasted about a century, but technology has moved quickly to accelerate this latest revolution. 
 
The Fourth Industrial Revolution focuses on smart technologies and connected devices. Some analyts predict that in 2 years, more than 31 billion devices will be connected, up from 22 billion devices at presnet. While these numbers can sound overwhelming, it also offers huge global opportunities, allowing people to securely connect to any device, on any network, to any application. The rollout of 5G and Wi-Fi 6, which promise faster speeds and better reliability will accelstae the process.  
 
 
Currently the Internet is a global interconnecting electronic system of about 52 billion computers. networks, which includes the World Wide Web which is that part of the Internet that search engines like Google search. 
 
Yet there is a very large part of the internet which is not visible and cannot be accessed using Google and other conventional web-browing tools. This is known as the Deep Web.
 
Deep Web
The Worldwide Web also includes the Deep Web which is much larger than the searchable Web includes many sites and data that is non-accessible to Google type searches as it has publicly non-accessible parts of business, university data and secret and private aspects of government data.  It is difficult to judge how large the Deep Web actually is but it is certainly much larger that the surface Web and many experts believe it to be four or five hundred times larger than the surface Web. Within the Deep Web however there is a small area known as the Dark Web and this is really the Red Light District.  
 
Searching the Dark Web
To give this electronic information scape a picture one can imagine that the Internet is an interlinked country with large cities, towns and villages as well as closed farming and woodlands. Now deeper into the cities and some larger towns there are red-light districts where the criminals have hideouts, clubs, brothels and hidden drug shops. This aspect of the Web is the Dark Web which houses the criminal economy which is growing and will affect more aspects of the legal Internet. This is now where one can buy drugs, review porn pictures, prostitution connections, buy passports and weapons, also there are stolen libraries of books, films and videos for sale. 
 
The Dark Web can be accessed by using special search engines like Tor. 
The dark web was actually created by the US government to allow spies to exchange information completely anonymously. US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use. The Dark Web is used by criminals but it is also used by people like journalists, people who want to stop corporate and government surveillance of their activity on the Web. The Dark Web is growing and will certainly change the Internet. From a criminal angle this area of the web is very commercially successful and they use it not only to sell illegal products and items but also to understand who to criminally target and steal from their accounts. 
 
What is Available on The Dark Web?
Ulbricht, formerly known as Dread Pirate Roberts, founder of the Silk Road Dark Web online market, was convicted in 2015 on charges of money laundering, conspiracy, drug and hacking-related charges. However, the Dark Web remains incredibly attractive to Internet users for a wide range of reasons.
 
The shadowy nature and complex methodology required to access this world have effectively made it a secret world, full of salacious activity, black markets, sights is limited to a select few.
 
Here are some of the many items found using Dark Web links:
 
Credit card numbers; Stolen credit card numbers are a big business on the Dark Web. 
Fake passports: Popular Dark Website “Fake Documents” specializes in selling top-notch replica documents from every nation in the world. A United States passport can be had for about 1,000 dollars.
Marijuana: Every strain, potency, and type of Marijuana can be found on the Dark Web. Meanwhile, prices are often lower than those typically found in the “regular” market.
Stolen/Hacked Accounts: On the Dark Web, it is very easy to procure stolen/hacked accounts to popular websites and services such as Netflix, Spotify, Uber, and PayPal.
Fake College Degrees: Certificates with any name and any institution are for sale on the Dark Web. Whether you are interested in purchasing a degree in your name from Harvard, Yale, or Stanford, these official looking documents can be had quickly and cheaply.
Murder for hire/Assassination: Murder for hire is perhaps the most famed notion associated with the Dark Web. Whether you believe in the existence of contract killers or consider it a hoax, there exists a very real community on the Dark Web with a plethora of individuals claiming they can kill for money. Whether that individual is a teenage prankster or a serious killer is a question which remains unknown.
 
Cisco:     ComputerWorld:     GovUK:       CNBC:
 
You Might Also Read: 
 
Digital Shock: The 4th Industrial Revolution:
 
The Digital Future Is About Disintegration:
 
 
 
 
« Facial Recognition: A Three Billion Image Database
Wawa Breach - Data On 30m Card Users For Sale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Silverse

Silverse

At Silverse, we specialize in building a comprehensive cybersecurity journey, anchored by our extensive experience, industry expertise, and an ecosystem of trusted partners.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.