{"id":195455,"date":"2017-05-28T08:15:15","date_gmt":"2017-05-28T12:15:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cyber-attack-and-digital-disaster-financial-express-bangladesh\/"},"modified":"2017-05-28T08:15:15","modified_gmt":"2017-05-28T12:15:15","slug":"cyber-attack-and-digital-disaster-financial-express-bangladesh","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/socio-economic-collapse\/cyber-attack-and-digital-disaster-financial-express-bangladesh\/","title":{"rendered":"Cyber attack and digital disaster &#8211; Financial Express Bangladesh"},"content":{"rendered":"<p><p>Every civilisation has its own distinctiveness. People of some  civilisations were physically strong. Some were experts in  building temples, beautiful houses and palaces and others earned  acclaim in medical science and many other particular fields.  Those civilisations were also limited in some particular  geographical locations. But starting from the Middle Ages, being  nourished throughout a couple of centuries, the world witnessed  renaissance, industrial revolution and eventually IT-based,  electro-mechanical and paperless civilisation. Cyber attack has  now become a highly sophisticated, cheaper and more effective  weapon for many countries. Robot technology, bio-technology,  artificial intelligence and many other technological attainments  are changing the world very rapidly. People are not being able to  keep pace with the fastest changing technology. The world is  entering a fully digitised version. Almost all activities are  being reduced to be paperless. And this has made this world much  more vulnerable in all respects. Cyber crimes and rapid changes  in IT could bring a disastrous setback for this sophisticated  human civilisation. We are now always in a great tension over  when our various crucial passwords are going to be hacked while  bank account and credit\/debit card will become empty. Servers of  all social communication sites are being collapsed by hackers or  malware halting fully even the global communication. All  satellites will be disconnected and even the control of nuclear  bombs may go to the hands of terrorists or will be under the  control of robots with artificial intelligence and many other  unprecedented occurrences. The recent large-scale Ransomware  attack is indicative of what the scale of future cyber attacks  might be.  <\/p>\n<p>    Almost everything is based on information technology in this    21st century. Without information and database technology, this    world would stand still. Google, Amazon, Microsoft, Apple,    Facebook and many other cloud-computing facility-providers are    setting up hundreds of data centres investing billions of    dollars where human history, culture, business, commerce,    financial transactions and daily activities are being stored.    Many multinational companies, governmental and non-governmental    organisations are taking facilities where all information are    being stored in servers of some cloud-computing    service-providers without setting up any server or data centre    of individual companies. Every day millions of bits of data are    being uploaded to the servers of Facebook, YouTube, Instagram,    Twitter, LinkedIn and many other social and professional    networks. All those data contain daily activities, past    memories, ideas, achievements and various expressions of human    beings.  <\/p>\n<p>    The centralisation of data has both advantages and    disadvantages. On one hand, preventing digital Dark Age might    be comparatively easy through centralisation, but on the other,    huge disaster might be caused by a single cyber attack,    terrorist attack or natural calamities. This may be compared to    keeping all eggs in a single basket.  <\/p>\n<p>    So how much secure are those data? Is there any strong disaster    recovery plan? Of course, there has been a strong disaster    recovery plan of each organisation. But simultaneously cyber    crimes are also increasing day by day and hackers are also    becoming very much desperate. Cyber attack could bring no less    severe consequences than an explosion of atom bomb. Moreover,    natural calamities like tsunami and earthquake are taking an    unprecedented shape and bringing huge disasters. Natural    disasters are floods, tsunamis, tornadoes, hurricanes\/cyclones,    volcanic eruptions, earthquakes, heat waves, and landslides.    Man-made disasters include the more cosmic scenarios of    catastrophic global warming, nuclear war, and bio-terrorism. In    the realm of information technology, disasters may also be the    result of a computer security hazard. Some of these are    computer viruses, cyber attacks, denial-of-service attacks,    hacking, and malware exploits. They are causing huge    infrastructural disaster as we have seen in the Tsunami in    Japan and the collapse of Twin Tower by terrorist attack. Much    other acts of sabotage are also taking place.  <\/p>\n<p>    Another type of digital Dark Age is the perception of a    possible future situation where it will be difficult or    impossible to read historical electronic documents and    multimedia because they have been recorded in an obsolete and    obscure file format. The name derives from the term Dark Ages    in the sense that there would be a relative lack of written    records as documents are transferred to digital formats and    original copies lost.  <\/p>\n<p>    One concern leading to the use of the term is that documents    are stored on physical media which require special hardware in    order to be read and that this hardware will not be available    in a few decades from the time the document was created. For    example, it is already the case that disk drives capable of    reading 5 1?4 inch floppy disks are not readily available. The    Digital Dark Age also applies to the problems which arise due    to obsolete file formats. In such a case, it is the lack of the    necessary software which causes problems when retrieving stored    documents. This is especially problematic when proprietary    formats are used, in which case it might be impossible to write    appropriate software to read the file.  <\/p>\n<p>    A famous real example is with NASA, whose early space records    have suffered from a Dark Age issue more than once. For over a    decade, magnetic tapes from the 1976 Viking Mars landing were    unprocessed. When later analysed, the data was unreadable as it    was in an unknown format and the original programmers had    either died or left NASA. The images were eventually extracted    following many months of going through the data and examining    how the recording machines functioned.  <\/p>\n<p>    Organisations cannot always avoid disasters, but with careful    planning, the effects of a disaster can be minimised. In order    to overcome any disaster or damage, an organisation must have a    strong Disaster Recovery Plan (DRP). We know that DRP is a set    of documented procedures to recover and protect a business IT    infrastructure in the event of a disaster. It is a    comprehensive statement of consistent actions to be taken    before, during and after a disaster -- natural, environmental    or man-made. Given organisations' increasing dependency on    information technology to run their operations, a disaster    recovery plan, sometimes erroneously called a Continuity of    Operations Plan (COOP), is increasingly associated with the    recovery of information technology data, assets, and    facilities. The plan minimises the disruption of operations and    ensures that some level of organisational stability and an    orderly recovery after a disaster will prevail.  <\/p>\n<p>    Recently we are observing that hackers are being encouraged and    trained in hacking activities. They are also being rewarded as    brilliant software engineers. But unfortunately many hackers    are not upholding their morality. They are taking part in many    unethical and criminal hacking activities. But we should keep    in mind that the greatest robber of the world may be the    greatest in terms of his or her robbery, but can never deserve    reward or appreciation. All hackers should apply their talent    in defending all illegal hacking.  <\/p>\n<p>    In today's global technological advancement, socio-economic    changes, political changes, shifting of power and changes in    international relations are absolutely unpredictable. None can    predict what types of changes are going to take place in the    near future. The most alarming would be artificial    intelligence. Many scientists, especially Stephen Hawkins,    always express their concern over advancement of artificial    intelligence where machine or robot itself would take and    implement many crucial decisions out of the knowledge of human    beings. Then what might be the consequences is totally    unimaginable.  <\/p>\n<p>    <a href=\"mailto:proxima7507@gmail.com\">proxima7507@gmail.com<\/a><\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.thefinancialexpress-bd.com\/2017\/05\/26\/71697\/Cyber-attack-and-digital-disaster\" title=\"Cyber attack and digital disaster - Financial Express Bangladesh\">Cyber attack and digital disaster - Financial Express Bangladesh<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Every civilisation has its own distinctiveness. People of some civilisations were physically strong. Some were experts in building temples, beautiful houses and palaces and others earned acclaim in medical science and many other particular fields <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/socio-economic-collapse\/cyber-attack-and-digital-disaster-financial-express-bangladesh\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187835],"tags":[],"class_list":["post-195455","post","type-post","status-publish","format-standard","hentry","category-socio-economic-collapse"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195455"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=195455"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195455\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=195455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=195455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=195455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}