Workflow
Stuxnet
icon
Search documents
Importancia de la ciberseguridad ofensiva dentro de los ODS | Mateo García | TEDxESPE
TEDx Talks· 2025-12-12 16:46
Cybersecurity Landscape - Offensive cybersecurity involves simulating attacks on computer systems to identify and rectify vulnerabilities, preventing malicious exploitation [9] - Over 70% of cyberattacks originate from social engineering, highlighting the significance of human error in system vulnerabilities [15] - Cyber warfare is a reality, exemplified by Stuxnet, a malware designed to disrupt Iranian nuclear programs, which successfully destroyed approximately 20% of centrifuges [22] Offensive Cybersecurity Activities - Pen testing involves simulating attacker behavior to identify and improve system weaknesses through scanning and vulnerability exploitation [10] - Red teaming assesses an organization's defense capabilities by simulating attacks, while blue teaming focuses on defense [10][11] - Social engineering in offensive cybersecurity targets human vulnerabilities, emphasizing the importance of user awareness and training [13][14] Sustainable Development Goals (SDGs) & Cybersecurity - Secure systems foster sustainable businesses, enhance infrastructure, and improve innovation quality, aligning with SDG 9 (Industry, Innovation, and Infrastructure) [18] - Cybersecurity enhances the quality of smart cities by protecting intelligent services like transportation, communication, and energy, contributing to SDG 11 (Sustainable Cities and Communities) [19][20] - Cybersecurity education promotes ethical behavior and raises awareness of risky digital security practices, aligning with SDG 4 (Quality Education) [23][24] - Cybersecurity creates jobs and promotes economic growth for secure platforms, contributing to SDG 8 (Decent Work and Economic Growth) [24][25] - Lack of access to original software licenses due to socioeconomic factors can lead to malware infections and participation in botnets, highlighting inequalities addressed by SDG 10 (Reduced Inequalities) [26][27][28]