Industry 4.0 - Changing How We Live

The Fourth Industrial Revolution, otherwise known as Industry 4.0, represents the convergence of emerging technologies which are changing the world far faster than any earlier revolutions with a scale, speed and complexity that is unprecedented.
 
These changes will come with the Internet of Things, AI, Machine Learning, 3D printing, Advanced Robotics, Virtual and Augmented Reality into a Revolution. Few areas of our lives wil remain untouched by the digital revolution. 
 
Across the world there are now nearly 4.5 billion Internet users and over five billion mobile phone connections; every day, we send about 300 billion emails. From 2000 to 2020, the number of global Internet users rose from 394 million to 4.4 billion which nearly 57% of the 7.7 billion global population. Today there are over one billion Google searches every day and two billion videos viewed daily on YouTube. The average user spends 2.5 hours a day online. 
 
The next phase of business web/cyber innovation is the ability to collect, deeply analyse and commercial process global data. 
It will disrupt nearly every industry in every country, creating new opportunities and challenges for people, places and businesses to which we must respond. In short, it's the development of technologies that pave the way to make 'dumb' objects smart, driving reams of data to assist in the transformation of business and our daily lives. Businesses, communities, and citizens will have more access to information, increased efficiency and productivity.  
 
A brief timeline of the four industrial revolutions:
 
1760: First Industrial Revolution: Started in Britain with the steam engine, which enabled new manufacturing processes and the creation of factories.
1860: Second Industrial Revolution: Mass production in new industries like steel, oil and electricity. The light bulb and telephone were both invented during this era.
1960: Third Industrial Revolution: Also known as the “Digital Revolution,” this time period launched the inventions of the personal computer, the semiconductor, and the internet.  
2016: Fourth Industrial Revolution: Klaus Schwab, Executive Chairman of the World Economic Forum first introduced this idea, which brings together the advances of AI, robotics, IoT, machine learning and other technologies.
 
Up until the Fourth Industrial Revolution, each preceding industrial revolution lasted about a century, but technology has moved quickly to accelerate this latest revolution. 
 
The Fourth Industrial Revolution focuses on smart technologies and connected devices. Some analyts predict that in 2 years, more than 31 billion devices will be connected, up from 22 billion devices at presnet. While these numbers can sound overwhelming, it also offers huge global opportunities, allowing people to securely connect to any device, on any network, to any application. The rollout of 5G and Wi-Fi 6, which promise faster speeds and better reliability will accelstae the process.  
 
 
Currently the Internet is a global interconnecting electronic system of about 52 billion computers. networks, which includes the World Wide Web which is that part of the Internet that search engines like Google search. 
 
Yet there is a very large part of the internet which is not visible and cannot be accessed using Google and other conventional web-browing tools. This is known as the Deep Web.
 
Deep Web
The Worldwide Web also includes the Deep Web which is much larger than the searchable Web includes many sites and data that is non-accessible to Google type searches as it has publicly non-accessible parts of business, university data and secret and private aspects of government data.  It is difficult to judge how large the Deep Web actually is but it is certainly much larger that the surface Web and many experts believe it to be four or five hundred times larger than the surface Web. Within the Deep Web however there is a small area known as the Dark Web and this is really the Red Light District.  
 
Searching the Dark Web
To give this electronic information scape a picture one can imagine that the Internet is an interlinked country with large cities, towns and villages as well as closed farming and woodlands. Now deeper into the cities and some larger towns there are red-light districts where the criminals have hideouts, clubs, brothels and hidden drug shops. This aspect of the Web is the Dark Web which houses the criminal economy which is growing and will affect more aspects of the legal Internet. This is now where one can buy drugs, review porn pictures, prostitution connections, buy passports and weapons, also there are stolen libraries of books, films and videos for sale. 
 
The Dark Web can be accessed by using special search engines like Tor. 
The dark web was actually created by the US government to allow spies to exchange information completely anonymously. US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use. The Dark Web is used by criminals but it is also used by people like journalists, people who want to stop corporate and government surveillance of their activity on the Web. The Dark Web is growing and will certainly change the Internet. From a criminal angle this area of the web is very commercially successful and they use it not only to sell illegal products and items but also to understand who to criminally target and steal from their accounts. 
 
What is Available on The Dark Web?
Ulbricht, formerly known as Dread Pirate Roberts, founder of the Silk Road Dark Web online market, was convicted in 2015 on charges of money laundering, conspiracy, drug and hacking-related charges. However, the Dark Web remains incredibly attractive to Internet users for a wide range of reasons.
 
The shadowy nature and complex methodology required to access this world have effectively made it a secret world, full of salacious activity, black markets, sights is limited to a select few.
 
Here are some of the many items found using Dark Web links:
 
Credit card numbers; Stolen credit card numbers are a big business on the Dark Web. 
Fake passports: Popular Dark Website “Fake Documents” specializes in selling top-notch replica documents from every nation in the world. A United States passport can be had for about 1,000 dollars.
Marijuana: Every strain, potency, and type of Marijuana can be found on the Dark Web. Meanwhile, prices are often lower than those typically found in the “regular” market.
Stolen/Hacked Accounts: On the Dark Web, it is very easy to procure stolen/hacked accounts to popular websites and services such as Netflix, Spotify, Uber, and PayPal.
Fake College Degrees: Certificates with any name and any institution are for sale on the Dark Web. Whether you are interested in purchasing a degree in your name from Harvard, Yale, or Stanford, these official looking documents can be had quickly and cheaply.
Murder for hire/Assassination: Murder for hire is perhaps the most famed notion associated with the Dark Web. Whether you believe in the existence of contract killers or consider it a hoax, there exists a very real community on the Dark Web with a plethora of individuals claiming they can kill for money. Whether that individual is a teenage prankster or a serious killer is a question which remains unknown.
 
Cisco:     ComputerWorld:     GovUK:       CNBC:
 
You Might Also Read: 
 
Digital Shock: The 4th Industrial Revolution:
 
The Digital Future Is About Disintegration:
 
 
 
 
« Facial Recognition: A Three Billion Image Database
Wawa Breach - Data On 30m Card Users For Sale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Hyper Recruitment Solutions

Hyper Recruitment Solutions

Hyper Recruitment Solutions is a specialist and highly compliant recruitment consultancy dedicated to the Science and Technology sectors.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.