Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

1 Online, the new frontline

This section is part of the amber pathway.

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1000.mp4
Skip transcript

Transcript

An estimated 1.6 billion people regularly access the web. And while most people log in, log out and harm no one, some of them do. Among them, criminals, malicious hackers and terrorists. The threats they pose are huge and multiplying. Today, online is the new frontline.
End transcript
 
Interactive feature not available in single page view (see it in standard view).

We shop online. We work online. We play online. We live online. More and more, our lives depend on online, digital services. Almost everything can be done online – from shopping and banking to socialising and card making – and all of this makes the internet, also known as cyberspace, an attractive target for criminals. Yes, theft, fraud, bullying, victimising and other such activities extend into the online world. We need to protect ourselves from threats – our identity being used by someone else, our information being seen by those that you didn’t intend to share with, and our online resources being used by anyone other than us.

This diagram shows a variety of statistics about the percentage of organisations that have identified breaches or attacks in the last 12 months, broken down by business type as follows: Businesses overall – 46%; Within micro firms – 43%; Within small firms – 62%; Within medium firms – 68%; Within large firms – 75%; Within info/comms – 62%; Within prof/sci/technical – 59%; Within admin/real estate – 58%; Charities overall – 26%. The data source information is given beneath the diagram – Bases: 1,348 UK businesses; 642 micro firms; 277 small firms; 216 medium firms; 213 large firms; 120 information and communication firms; 143 professional, scientific or technical firms; 161 administration or real estate firms; 337 charities.
Figure 1 Percentage of organisations that have identified breaches or attacks in the last 12 months

Large-scale cyber security breaches often make the headlines but about 70% of organisations are keeping their worst security incidents under wraps, so what makes the news is just a small proportion of the breaches that are actually taking place. Larger businesses are more likely to identify breaches or attacks (see Figure 1) than smaller ones – this has been a consistent pattern in each year of the survey. Charities follow the same pattern, with 57 per cent of high-income charities (with incomes of £500,000 or more) recording any breaches or attacks.

Britain is being targeted by up to 1,000 cyber attacks every hour. It is the case that most often commercial organisations or services are the targets for cyber security breaches (also termed as cyber attacks) for the obvious commercial gains. The average damage cost per breach is estimated at £4380 (DCMS, 2020).

Table 1: Average cost of all breaches or attacks identified in the last 12 months (Source: DCMS, 2020)

All businesses Micro/small businesses Medium/large businesses All charities
Across organisations identifying any breaches or attacks
Mean cost £1010 £919 £3070 £1560
Median cost £0 £0 £0 £0
Base 710 432 278 129
Only across organisations identifying breaches with an outcome
Mean cost £3230 £3110 £5220 Too few
Median cost £274 £244 £935 charities to analyse
Base 160 88 72

Behind the numbers

Cyber security is definitely one of those areas where you need to evaluate the validity of any information you find online before accepting it. The figures about the prevalence and under-reporting of cyber attacks comes from a 2010 CyberSecurity Watch survey carried out in the US by a number of organisations, including the US Computer Emergency Response Team. The survey states that ‘the public may not be aware of the number of incidents because almost three-quarters (72%), on average, of the insider incidents are handled internally without legal action or the involvement of law enforcement’ (CERT Insider Threat Center, 2010).

The estimate of 1,000 attacks per hour is based on the BIS Cyber Security Breaches Survey 2014. We took the number of organisations that reported that they were attacked ‘hundreds of times a day’ in different ways, and assumed that each of these responses were attacked a minimum of 100 times per day, we worked out that there were at least 24,156 attacks per day across the 1,098 organisations surveyed. Dividing this by 24 suggests that there are a minimum of 1,000 attacks per hour. According to a UK-based ISP’s survey, ‘… companies with internet connections experienced 157,000 attacks each, on average … the equivalent of more than one a minute’ (Beaming, 2020). These costs can occur as direct financial losses due to fraud or theft; the loss of productivity due to time spent recovering from the effects of a successful attack; or the loss of trust and reputation

We all have a responsibility to protect services from being maliciously disrupted or misused, through our vigilance, through our own security measures and through reporting events when they arise.

The knowledge, tools and best practices relating to protecting the computers, communications networks, programs and data that make our digital lives possible are collectively referred to as cyber security, or information security. For the purposes of this course, we use the two terms interchangeably .

Let’s get started by learning some of the basic terminology used when discussing cyber security.

CYBER_B2

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371