Page 68 - WEF Reoprt 2020
P. 68

Cyberattacks on critical infrastructure—   uncovered, including in such areas as brain-
            rated the fifth top risk in 2020 by our    computer interfaces and hyper-automation
            expert network—have become the new         (combining robotics and AI).  25
            normal across sectors such as energy,
                                               9
            healthcare,  and transportation.  Such     Fifth generation (5G). 4IR technologies
                                         11
                      10
            attacks have even affected entire cities.    rely on high-speed digital infrastructure—on
                                                12
            Public and private sectors alike are at    5G networks and, further down the road,
            risk of being held hostage. Organized      6G.  While 5G technology can be built in
                                                          26
            cybercrime entities are joining forces,    part on existing 4G infrastructure, significant
                                              13
            and their likelihood of detection and      shortfalls in capacity are expected as
            prosecution is estimated to be as low as   early as 2020 in some countries.  Current
                                                                                    27
            0.05% in the United States.  Cybercrime-   projections show the risk of a US$1
                                     14
            as-a-service is also a growing business    trillion global gap in telecommunication
            model, as the increasing sophistication    infrastructure investments through 2040.
                                                                                           28
            of tools on the Darknet makes malicious    In developed countries, the challenge is
            services more affordable and easily        not only to build modern infrastructure
            accessible for anyone.                     but also to overcome reliance on legacy
                                                       systems, on which the public and private
            The IoT is also amplifying the potential   sectors currently spend up to 80% of their
            cyberattack surface. It is estimated that   technology budgets. Here, introducing
            there are already over 21 billion IoT devices   new, safe and reliable systems into existing
            worldwide,  and their number will double   capabilities is key; some entities have
                      15
            by 2025.  Attacks on IoT devices increased   already begun to do this. 29
                    16
            by more than 300% in the first half of
            2019,  while in September 2019, IoTs were
                 17
            used as intermediaries is expected to  One million
            used to take down Wikipedia through
            classic distributed denial of service (DDoS)
            attacks,  and the risk of IoT devices being
                   18
            increase.  In 2021, cybercrime damages
                    19
            might reach US$6 trillion — what would be   additional people joining the
                                  20
            equivalent to the GDP of the world’s third   internet daily
            largest economy. 21

            Vulnerable data. 4IR technologies
            run on data, making privacy a major        Quantum computing. Quantum computing
            challenge. IoT devices collect and share   could dramatically reduce the time needed
            data that are potentially highly sensitive   to solve the mathematical problems on
            for individuals, companies and states,     which encryption techniques currently rely—
            from personal identification and medical   from months to minutes and seconds.  It
                                                                                         30
            records to national security information.   risks rendering useless most of our existing
            The data brokering market—aggregating,     data security and critical infrastructure
            disaggregating, copying, searching and     systems, including military networks, email
            selling data for commercial purposes—is    and power grids. 31
            worth an estimated US$200 billion a year.
                                                 22
            Data theft can enable the manipulation of   Cloud computing. While many technical
            individual and collective behaviour, leading   advancements of 4IR are essentially
            to physical and psychological harm.        digitally based, cloud computing has
                                                       the potential to enhance trans-sectoral
            Artificial intelligence (AI). AI has been   development, expand technological access
            dubbed both “the most impactful invention”   to remote areas and further link AI to
            and our “biggest existential threat”.      other 4IR technologies. At the same time,
                                           23
            Indeed, we may not even be able to         with increasingly more data hosted in the
            comprehend AI’s full potential—or its full   cloud, companies are amassing personal
            risk. Some risks—such as manipulation      information like never before, which could
            through fake news and “deepfakes”—are      ultimately create potential new data privacy
            well known.  Others are yet to be fully    and security risks. 32
                       24

                                                                                           The Global Risks Report 2020  63
   63   64   65   66   67   68   69   70   71   72   73