top of page
Search

The Five Laws of Cyber Security in 2024

  • nformalemail
  • May 15, 2024
  • 3 min read

I was bored one day, and decided to scroll on Ted Ed. During this spontaneous burst of curiosity I stumbled upon Nick Espinosa's talk about his five laws of Cyber Security. As I was listening, I realized how under valued the points that he made were. We have 3 laws of robotics, why not have the same for Cyber Security? So I figured to take the time to write about the modern applications of these five laws.


If there is a vulnerability, it will be exploited.


If you play any sort of RPG that involves grinding for loot, you will know how many different aspects of the game you can exploit to make this grinding easier. Hard boss that keeps killing you with one attack? Simple! Exploit the terrain so that you can hit the boss, but not the other way around. Don't want to go the long route but instead want to take an easy shortcut to an area? Simple! Abuse the physics of the game to fling yourself to the next area. Long story short, it is human nature to use anything that bypasses the system to their advantage. Lawyers do it all the time. However, people today think that buying anti-virus makes their computer immune to all viruses and their computer will never be hacked. This couldn't be less true. The reason hackers are still an on going threat is because hackers will always find vulnerabilities to exploit, no matter how hidden or hard it is to exploit. In todays day and age of AI and Deepfakes, more and more people are vulnerable to attacks, one way or another. And speaking of vulnerability:


Everything is vulnerable in some way.


Cyber security companies like to brag that they have the most impenetrable anti-virus software or that they have the safest program to protect your information. Well, these statements could not be further from the truth. The reason why that there are so many cyber attacks is because that everything, every program, and everyone, is vulnerable in some way. This is why hackers are able to cause a big breach once every couple months. These hackers know this: and are always looking for new ways to exploit vulnerabilities, and with AI on the rise, hackers and malicious people are using the AI by threatening to post various fake images with victims faces that were generated using AI. With AI on the rise, hackers are finding new ways to exploit said tool in new ways.


Humans trust even when they shouldn't.


This is the basic idea behind why so many people now are falling for AI related scams. Lets say one day your friend asks for $30 dollars out of the blue through instagram or snapchat. Being a good friend, you would be inclined to give your friend the $30 bucks. However, what your friend didn't tell you was that he or she was hacked by a scammer who uses AI bots to trick as many people as they can using their friends list and get as much money as possible through this social deception. This is only one of many common scams that are circulating around, and one of the main reasons for cyber-related incidents.


With Innovation comes the opportunity for exploitation.


AI was the ground-breaking innovation of the decade. It allowed people to ask AI for information, manage large data sets, and act as customer service for some companies. It has also allowed people to cheat on essays in school, create fake images of people, and disseminate misinformation easily, because of course AI could never be wrong! Again, the basic fallacy of cyber security is that systems are nearly impossible to breach, which is obviously wrong.


When in doubt, refer to rule no. 1


....I think this is pretty self explanatory.




 
 
 

Recent Posts

See All
How one event impacted cybersecurity

Back in 2013, something happened that made a lot of companies start paying way more attention to how they protect their digital systems....

 
 
 

Comments


Drop Me an Email, Let Me Know What You Think

Thanks for submitting!

Cyber Secure, 2024

bottom of page