Industry 4.0 - Changing How We Live

The Fourth Industrial Revolution, otherwise known as Industry 4.0, represents the convergence of emerging technologies which are changing the world far faster than any earlier revolutions with a scale, speed and complexity that is unprecedented.
 
These changes will come with the Internet of Things, AI, Machine Learning, 3D printing, Advanced Robotics, Virtual and Augmented Reality into a Revolution. Few areas of our lives wil remain untouched by the digital revolution. 
 
Across the world there are now nearly 4.5 billion Internet users and over five billion mobile phone connections; every day, we send about 300 billion emails. From 2000 to 2020, the number of global Internet users rose from 394 million to 4.4 billion which nearly 57% of the 7.7 billion global population. Today there are over one billion Google searches every day and two billion videos viewed daily on YouTube. The average user spends 2.5 hours a day online. 
 
The next phase of business web/cyber innovation is the ability to collect, deeply analyse and commercial process global data. 
It will disrupt nearly every industry in every country, creating new opportunities and challenges for people, places and businesses to which we must respond. In short, it's the development of technologies that pave the way to make 'dumb' objects smart, driving reams of data to assist in the transformation of business and our daily lives. Businesses, communities, and citizens will have more access to information, increased efficiency and productivity.  
 
A brief timeline of the four industrial revolutions:
 
1760: First Industrial Revolution: Started in Britain with the steam engine, which enabled new manufacturing processes and the creation of factories.
1860: Second Industrial Revolution: Mass production in new industries like steel, oil and electricity. The light bulb and telephone were both invented during this era.
1960: Third Industrial Revolution: Also known as the “Digital Revolution,” this time period launched the inventions of the personal computer, the semiconductor, and the internet.  
2016: Fourth Industrial Revolution: Klaus Schwab, Executive Chairman of the World Economic Forum first introduced this idea, which brings together the advances of AI, robotics, IoT, machine learning and other technologies.
 
Up until the Fourth Industrial Revolution, each preceding industrial revolution lasted about a century, but technology has moved quickly to accelerate this latest revolution. 
 
The Fourth Industrial Revolution focuses on smart technologies and connected devices. Some analyts predict that in 2 years, more than 31 billion devices will be connected, up from 22 billion devices at presnet. While these numbers can sound overwhelming, it also offers huge global opportunities, allowing people to securely connect to any device, on any network, to any application. The rollout of 5G and Wi-Fi 6, which promise faster speeds and better reliability will accelstae the process.  
 
 
Currently the Internet is a global interconnecting electronic system of about 52 billion computers. networks, which includes the World Wide Web which is that part of the Internet that search engines like Google search. 
 
Yet there is a very large part of the internet which is not visible and cannot be accessed using Google and other conventional web-browing tools. This is known as the Deep Web.
 
Deep Web
The Worldwide Web also includes the Deep Web which is much larger than the searchable Web includes many sites and data that is non-accessible to Google type searches as it has publicly non-accessible parts of business, university data and secret and private aspects of government data.  It is difficult to judge how large the Deep Web actually is but it is certainly much larger that the surface Web and many experts believe it to be four or five hundred times larger than the surface Web. Within the Deep Web however there is a small area known as the Dark Web and this is really the Red Light District.  
 
Searching the Dark Web
To give this electronic information scape a picture one can imagine that the Internet is an interlinked country with large cities, towns and villages as well as closed farming and woodlands. Now deeper into the cities and some larger towns there are red-light districts where the criminals have hideouts, clubs, brothels and hidden drug shops. This aspect of the Web is the Dark Web which houses the criminal economy which is growing and will affect more aspects of the legal Internet. This is now where one can buy drugs, review porn pictures, prostitution connections, buy passports and weapons, also there are stolen libraries of books, films and videos for sale. 
 
The Dark Web can be accessed by using special search engines like Tor. 
The dark web was actually created by the US government to allow spies to exchange information completely anonymously. US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use. The Dark Web is used by criminals but it is also used by people like journalists, people who want to stop corporate and government surveillance of their activity on the Web. The Dark Web is growing and will certainly change the Internet. From a criminal angle this area of the web is very commercially successful and they use it not only to sell illegal products and items but also to understand who to criminally target and steal from their accounts. 
 
What is Available on The Dark Web?
Ulbricht, formerly known as Dread Pirate Roberts, founder of the Silk Road Dark Web online market, was convicted in 2015 on charges of money laundering, conspiracy, drug and hacking-related charges. However, the Dark Web remains incredibly attractive to Internet users for a wide range of reasons.
 
The shadowy nature and complex methodology required to access this world have effectively made it a secret world, full of salacious activity, black markets, sights is limited to a select few.
 
Here are some of the many items found using Dark Web links:
 
Credit card numbers; Stolen credit card numbers are a big business on the Dark Web. 
Fake passports: Popular Dark Website “Fake Documents” specializes in selling top-notch replica documents from every nation in the world. A United States passport can be had for about 1,000 dollars.
Marijuana: Every strain, potency, and type of Marijuana can be found on the Dark Web. Meanwhile, prices are often lower than those typically found in the “regular” market.
Stolen/Hacked Accounts: On the Dark Web, it is very easy to procure stolen/hacked accounts to popular websites and services such as Netflix, Spotify, Uber, and PayPal.
Fake College Degrees: Certificates with any name and any institution are for sale on the Dark Web. Whether you are interested in purchasing a degree in your name from Harvard, Yale, or Stanford, these official looking documents can be had quickly and cheaply.
Murder for hire/Assassination: Murder for hire is perhaps the most famed notion associated with the Dark Web. Whether you believe in the existence of contract killers or consider it a hoax, there exists a very real community on the Dark Web with a plethora of individuals claiming they can kill for money. Whether that individual is a teenage prankster or a serious killer is a question which remains unknown.
 
Cisco:     ComputerWorld:     GovUK:       CNBC:
 
You Might Also Read: 
 
Digital Shock: The 4th Industrial Revolution:
 
The Digital Future Is About Disintegration:
 
 
 
 
« Facial Recognition: A Three Billion Image Database
Wawa Breach - Data On 30m Card Users For Sale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Spectra Logic

Spectra Logic

Spectra Logic develops data storage solutions that solve the problem of short and long-term digital preservation for business and technology professionals.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

SureVine

SureVine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

ISDefence

ISDefence

ISDefence is a cyber resilience consulting company - Detect/Deter, Protect, Respond, Recover.

CriticalStart

CriticalStart

CriticalStart provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.