Written by Faisal Ahmed Bhubon and Iqra Bhatti
The Digital Economy refers to the economic activities that are generated through daily online connections between people, businesses, devices, data, and processes. With the growing use of the internet and digital technologies, the digital economy is rapidly expanding and has become an integral part of the global economy.
Emerging trends play a crucial role in shaping the digital economy and are defined as new and developing patterns, ideas, or technologies that have the potential to impact or influence a particular industry or society. One such trend is the increasing use of to assist security teams in detecting and stopping cyber attacks.
In this case study, we will illustrate real-world case studies that demonstrated the potential impact of these technologies on the digital economy. These examples included the Colonial Pipeline attack in 2020, the WannaCry ransomware attack in 2017, Tim Berners-Lee’s concept of a linked or semantic web, the idea of Web 3.0 in healthcare (termed “Health 3.0”), and how the use of artificial intelligence (AI) assist in detecting such attacks and preventing the spread of ransomware, thus making the digital economy more secure.
The 2020 Colonial Pipeline Attack
The Colonial Pipeline attack in 2020 was a significant event that brought attention to the vulnerabilities of critical infrastructure. The Colonial Pipeline carries over 100 million gallons of gasoline, diesel, and jet fuel daily from Houston to New York City, and the attack resulted in a shutdown of the pipeline, leading to a shortage of fuel in the Southeastern United States.Fuel shortage began to occur at filling stations amid panic buying as the pipeline shutdown has entered almost a week. The attack was executed by a ransomware group called DarkSide, which demanded a ransom of $5 million to restore access to the pipeline. This attack demonstrated the importance of cybersecurity and the need for companies to implement proper security measures to prevent such incidents.
The colonial pipeline attack was strengthened by the American Cybersecurity Act passed earlier.It requires federal agencies and critical infrastructure owners and operators to report cyberattacks within 72 hours and ransomware payments within 24 hours.
The 2017 WannaCry Ransomware Attack
The WannaCry ransomware attack in 2017 affected over 200,000 computers in 150 countries, including Japan, China, and South Korea. The attack targeted computers running the Microsoft Windows operating system and demanded a ransom in bitcoin to restore access. The attack disrupted critical services, including hospitals and financial institutions, highlighting the need for advanced security measures. This attack revealed the need for cybersecurity and the importance of software updates to prevent vulnerabilities in computer systems.
The concept of a linked or semantic web, proposed by Tim Berners-Lee, the inventor of the World Wide Web, involves creating a web of linked data that can be easily accessed and processed by machines. This could have significant implications for data sharing and collaboration, enabling businesses and organizations to share information more efficiently and effectively. The idea of a semantic web is still being developed and has the potential to revolutionize the way we interact with information.
AI in malware prevention
Lastly, our group discussed the use of AI in malware prevention. As cyber threats become more sophisticated, traditional methods of malware prevention are no longer sufficient. AI can help detect and prevent malware attacks by analyzing patterns and identifying anomalies in network traffic. This technology is already being used by businesses and organizations to protect against cyber threats, and its use is likely to become even more widespread in the future.
However, even though AI is a powerful approach, there are caveats to how well it can develop accurate models.AI is important, but it’s not a silver bullet. It’s something we need in our arsenal, but it’s not a solution to every problem. In particular, there is one very significant obstacle that AI needs to overcome – false positives.
The false positives problem lies in the fact that anomaly-based malware detection is built on the flawed assumptions that anomalies are inherently bad. Anything that is out of the ordinary is dangerous and needs further examination. However, in reality, it’s normal to have at least some anomalies that are good and some bad behaviours that won’t show up as anomalies.
In conclusion, the examples presented in Training 5 highlighted the potential impact of emerging technologies and the digital economy on society. While these technologies offer significant benefits, they also come with potential risks and challenges, such as cybersecurity threats and privacy concerns. It is important for businesses, organizations, and individuals to be aware of these issues and to take appropriate measures to mitigate them. By doing so, we can harness the power of these technologies to create a better future for ourselves and for society as a whole.