Summary of Three Types of Online Attack

Looking for the video?
We have the summary! Get the key insights in just 5 minutes.

Three Types of Online Attack summary
Start getting smarter:
or see our plans

Rating

8 Overall

9 Importance

7 Innovation

7 Style


Recommendation

Cybercrime expert Mikko Hypponen candidly outlines the three principal sources of online attacks: criminals seeking riches, “hacktivists” making a statement and governments surveying their own citizens. Hypponen dwells mainly on the tactics governments use to help other governments – even totalitarian regimes – and themselves to spy on citizens. The real conflict, according to Hypponen, is not “privacy” versus “security,” but “freedom” versus “control.” getAbstract recommends this timely introduction to one of the largest policy questions of the day: How much privacy should citizens surrender to their governments in the name of greater security?

In this summary, you will learn

  • What risks threaten online security,
  • How governments participate in online crime and
  • Why citizens should strive to protect their privacy.
 

About the Speaker

Mikko Hypponen is a leading cybercrime expert and a senior research executive at F-Secure Corporation.

 

Summary

Criminality is becoming increasingly prevalent in the digital world. Three groups of online attackers present particularly menacing risks: “Online criminals” – These...

More on this topic

Related TED Link

By the same author

How the NSA Betrayed the World’s Trust. Time to Act
How the NSA Betrayed the World’s Trust. Time to Act
8

Customers who read this summary also read

Edward Snowden on Trump and the Power of the System
Edward Snowden on Trump and the Power of the System
8
The Driver in the Driverless Car
The Driver in the Driverless Car
9
Palantir Knows Everything  About You
Palantir Knows Everything About You
8
The War on Cash
The War on Cash
8
Blockchain Revolution
Blockchain Revolution
7
Where Is Cybercrime Really Coming From?
Where Is Cybercrime Really Coming From?
8

Related Channels

Comment on this summary