{"id":674,"date":"2024-04-04T21:35:46","date_gmt":"2024-04-05T01:35:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=674"},"modified":"2024-04-10T17:54:10","modified_gmt":"2024-04-10T21:54:10","slug":"watch-this-ted-talk-on-governments-dont-understand-cyber-warfare-we-need-hackers-https-www-ted-com-talks-rodrigo_bijou_governments_don_t_understand_cyber_warfare_we","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/04\/04\/watch-this-ted-talk-on-governments-dont-understand-cyber-warfare-we-need-hackers-https-www-ted-com-talks-rodrigo_bijou_governments_don_t_understand_cyber_warfare_we\/","title":{"rendered":"Module 12: Watch this Ted talk on \u201cGovernments don\u2019t understand cyber warfare. We need hackers\u201d. How much do you agree with the speaker? Provide an additional article supporting your thoughts."},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-ted wp-block-embed-ted wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Rodrigo Bijou: Governments don&#039;t understand cyber warfare. We need hackers\" src=\"https:\/\/embed.ted.com\/talks\/rodrigo_bijou_governments_don_t_understand_cyber_warfare_we_need_hackers\" width=\"676\" height=\"381\" frameborder=\"0\" scrolling=\"no\" webkitAllowFullScreen mozallowfullscreen allowFullScreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Many people argue that mainstream approaches to cybersecurity are insufficient in addressing the rapidly evolving world of cyber threats. Hackers with ethical\/white hat hackers have valuable insights into vulnerabilities and potential attacks that could be exploited by offenders.<\/p>\n\n\n\n<p>Ethical hackers are crucial in helping identify and mitigate vulnerabilities in government systems, infrastructure, and policies. Using their skills, governments can enhance their cybersecurity posture and better protect critical assets from cyber threats.<\/p>\n\n\n\n<p>However, one has to acknowledge that integrating hackers into government cybersecurity efforts with also include challenges. Such as trust issues, legal considerations, and ethical boundaries. Governments still need strict policies, frameworks, and partnerships to combat potential threats in cyberspace.<\/p>\n\n\n\n<p><strong>Resources:<\/strong><\/p>\n\n\n\n<p>Hart, J. (2019, July 29). Ethical Hackers: a business\u2019s best friend? <em>Forbes<\/em>. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/07\/29\/ethical-hackers-a-businesss-best-friend\/?sh=3b5edc2663cc<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many people argue that mainstream approaches to cybersecurity are insufficient in addressing the rapidly evolving world of cyber threats. Hackers with ethical\/white hat hackers have valuable insights into vulnerabilities and potential attacks that could be exploited by offenders. Ethical hackers&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/04\/04\/watch-this-ted-talk-on-governments-dont-understand-cyber-warfare-we-need-hackers-https-www-ted-com-talks-rodrigo_bijou_governments_don_t_understand_cyber_warfare_we\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/674"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=674"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/674\/revisions"}],"predecessor-version":[{"id":738,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/674\/revisions\/738"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}