Infographic: The Cybersecurity Boom
Connect with us

Technology

The Cybersecurity Boom

Published

on

[imagemap id=”2938″]

The Cybersecurity Boom

How Investors Can Play the Global Explosion in Cyberattacks and Cybercrime

Thanks to Purefunds Cybersecurity ETF (HACK) for helping us put this together.

In 1983’s WarGames, a young Matthew Broderick unwittingly hacks into military central computer while searching for video games and almost inadvertently starts World War III. This film is classified on IMDB as in the “Sci-fi, Thriller” genres.

While the prospects of cybercrime and cyberterrorism are certainly thrilling (and scary), the descriptor of “Sci-fi” for the movie may no longer be necessary. In the last calendar year, there’s been dozens of high-profile cybersecurity incidents that are not a far cry from the geopolitical near-miss in WarGames.

The United States government and the country’s largest bank have both had serious security intrusions as of recent. This summer the United States Government revealed it had over 20 million records stolen by hackers allegedly based in China. Just as concerning, it was exactly one year ago that J.P. Morgan was compromised with records stolen from over 76 million households and 7 million small businesses. The company has now vowed to spend $250 million a year in preventing such incidents.

Most recent of all is this week’s hack of the popular adultery site Ashley Madison. The leak of sensitive information on potentially 37 million customers isn’t a potential geopolitical concern as the above cases, but it does have business implications: the website’s plan to raise $200 million in an IPO in London has now been kiboshed for the foreseeable future.

If big organizations like Sony, Target, Google, and Home Depot can’t do anything to stop cybersecurity incidents, what chance do the rest of us have?

And that’s the problem with cyberattacks. Detected incidents have skyrocketed over the last five years, soaring from 3.4 million to 42.8 million from 2009-2014, and they now cost the global economy an estimated $400 billion a year. Every day these incidents happen on a small scale, but today’s hacking technology and sophistication allows for much more. Exploitation of big cybersecurity vulnerabilities could cause financial chaos, destroy reputations of entire companies, expose business and state secrets, and even shut down moving vehicles remotely. This is not science fiction. This is reality – and we haven’t even gotten into the hypothetical potential damage that hackers could cause if they had even more resources or resolve. People’s lives and money are at stake.

Systems are more sensitive and hyperconnected than ever before, and hackers are deploying more sophisticated tactics to take advantage of them for personal or organizational gain. Luckily, there is also an entire industry of engineers, programmers, analysts, designers, cryptographers, and other professionals trying to build the walls and moat around the castle. Cybersecurity, as we depict in this infographic, is a booming industry with hundreds of companies scrambling to protect us from having intellectual property, health records, financial information, and other vital data compromised.

That’s why by 2020, the cybersecurity market is expected to be valued at $170.2 billion, which implies a 9.8% CAGR (compound annual growth rate) from today’s estimate of $106.3 billion. Businesses and governments are spending more on cybersecurity: even the Whitehouse announced this year that in its 2016 fiscal budget that it would aim to spend $14 billion on additional measures. Fifteen years ago, cybersecurity was only a blip on the US government’s radar at $938 million in spending.

The private sector is in the same boat, as 69% of business executives see cyberattacks as a threat to their growth. This is a fair statement since Verizon estimates in its 2015 Data Breach Investigations Report that the average cost of a cyberattack to a business ranges between $475,000 to $9 million depending on the number of records stolen.

Among the companies that are benefiting from the surge in cybersecurity spending include those building firewalls, secure servers, routers, anti-virus software, and malware detection tools. Firms that specialize in consulting and solving related security problems are also getting plenty of interest. Investors can potentially profit from this sector as well by identifying companies and funds that will gain from booming activity and spending in the sector.

Click for Comments

Technology

The World’s Most Used Apps, by Downstream Traffic

Of the millions of apps available around the world, just a small handful of the most used apps dominate global internet traffic.

Published

on

The World’s Most Used Apps by Downstream Traffic Share

The World’s Most Used Apps, by Downstream Traffic

Of the millions of apps available around the world, just a small handful of the most used apps dominate global internet traffic.

Everything connected to the internet takes bandwidth to view. When you look at something on your smartphone—whether it’s a new message on Instagram or the next few seconds of a YouTube video—your device is downloading the data in the background.

And the bigger the files, the more bandwidth is utilized. In this chart, we break down of the most used apps by category, using Sandvine’s global mobile traffic report for 2021 Q1.

Video Drives Global Mobile Internet Traffic

The biggest files use the most data, and video files take the cake.

According to Android Central, streaming video ranges from about 0.7GB per hour of data for a 480p video to 1.5GB per hour for 1080. A 4K stream, the highest resolution currently offered by most providers, uses around 7.2GB per hour.

That’s miles bigger than audio files, where high quality 320kbps music streams use an average of just 0.12GB per hour. Social network messages are usually just a few KB, while the pictures found on them can range from a few hundred KB for a low resolution image to hundreds of MB for high resolution.

Understandably, breaking down mobile downstream traffic by app category shows that video is on top by a long shot:

CategoryDownstream Traffic Share (2021 Q1)
Video Streaming48.9%
Social Networking19.3%
Web13.1%
Messaging6.7%
Gaming4.3%
Marketplace4.1%
File Sharing1.3%
Cloud1.1%
VPN and Security0.9%
Audio0.2%

Video streaming accounts for almost half of mobile downstream traffic worldwide at 49%. Audio streaming, including music and podcasts, accounts for just 0.2%.

Comparatively, social network and web browsing combined make up one third of downstream internet traffic. Games, marketplace apps, and file sharing, despite their large file sizes, only require one-time downloads that don’t put as big of a strain on traffic as video does.

A Handful of Companies Own the Most Used Apps

Though internet traffic data is broken down by category, it’s worth noting that many apps consume multiple types of bandwidth.

For example, messaging and social network apps, like WhatsApp, Instagram, and Snapchat, allow consumers to stream video, social network, and message.

Even marketplace apps like iTunes and Google Play consume bandwidth for video and audio streaming, and together account for 6.3% of total mobile downstream traffic.

But no single app had a bigger footprint than YouTube, which accounts for 20.4% of total global downstream bandwidth.

CategoryTop Apps (Category Traffic)Category Traffic Share
Video StreamingYouTube47.9%
Video StreamingTikTok16.1%
Video StreamingFacebook Video14.6%
Video StreamingInstagram12.1%
Video StreamingNetflix4.3%
Video StreamingOther5.0%
Social NetworkingFacebook50.5%
Social NetworkingInstagram41.9%
Social NetworkingTwitter2.4%
Social NetworkingOdnoklassniki1.9%
Social NetworkingQQ0.7%
Social NetworkingOther2.9%
MessagingWhatsApp31.4%
MessagingSnapchat16.5%
MessagingFacebook VoIP14.3%
MessagingLINE12.1%
MessagingSkype4.1%
MessagingOther21.6%
WebGoogle41.2%
WebOther58.8%

The world’s tech giants had the leading app in the four biggest data streaming categories. Alphabet’s YouTube and Google made up almost half of all video streaming and web browsing traffic, while Facebook’s own app, combined with Instagram and WhatsApp, accounted for 93% of global social networking traffic and 45% of messaging traffic.

Traffic usage by app highlights the data monopoly of tech giants and internet providers. Since just a few companies account for a majority of global smartphone internet traffic, they have a lot more bartering power (and responsibility) when it comes to our general internet consumption.

Continue Reading

Technology

Visualizing the Critical Metals in a Smartphone

Smartphones can contain ~80% of the stable elements on the periodic table. This graphic details the critical metals you carry in your pocket.

Published

on

Visualizing the Critical Metals in a Smartphone

In an increasingly connected world, smartphones have become an inseparable part of our lives.

Over 60% of the world’s population owns a mobile phone and smartphone adoption continues to rise in developing countries around the world.

While each brand has its own mix of components, whether it’s a Samsung or an iPhone, most smartphones can carry roughly 80% of the stable elements on the periodic table.

But some of the vital metals to build these devices are considered at risk due to geological scarcity, geopolitical issues, and other factors.

Smartphone PartCritical Metal
Touch Screen indium
Displaylanthanum; gadolinium; praseodymium; europium; terbium; dysprosium
Electronicsnickel, gallium, tantalum
Casingnickel, magnesium
Battery lithium, nickel, cobalt
Microphone, speakers, vibration unit nickel, praseodymium, neodymium, gadolinium, terbium, dysprosium

What’s in Your Pocket?

This infographic based on data from the University of Birmingham details all the critical metals that you carry in your pocket with your smartphone.

1. Touch Screen

Screens are made up of multiple layers of glass and plastic, coated with a conductor material called indium which is highly conductive and transparent.

Indium responds when contacted by another electrical conductor, like our fingers.

When we touch the screen, an electric circuit is completed where the finger makes contact with the screen, changing the electrical charge at this location. The device registers this electrical charge as a “touch event”, then prompting a response.

2. Display

Smartphones screens display images on a liquid crystal display (LCD). Just like in most TVs and computer monitors, a phone LCD uses an electrical current to adjust the color of each pixel.

Several rare earth elements are used to produce the colors on screen.

3. Electronics

Smartphones employ multiple antenna systems, such as Bluetooth, GPS, and WiFi.

The distance between these antenna systems is usually small making it extremely difficult to achieve flawless performance. Capacitors made of the rare, hard, blue-gray metal tantalum are used for filtering and frequency tuning.

Nickel is also used in capacitors and in mobile phone electrical connections. Another silvery metal, gallium, is used in semiconductors.

4. Microphone, Speakers, Vibration Unit

Nickel is used in the microphone diaphragm (that vibrates in response to sound waves).

Alloys containing rare earths neodymium, praseodymium and gadolinium are used in the magnets contained in the speaker and microphone. Neodymium, terbium and dysprosium are also used in the vibration unit.

5. Casing

There are many materials used to make phone cases, such as plastic, aluminum, carbon fiber, and even gold. Commonly, the cases have nickel to reduce electromagnetic interference (EMI) and magnesium alloys for EMI shielding.

6. Battery

Unless you bought your smartphone a decade ago, your device most likely carries a lithium-ion battery, which is charged and discharged by lithium ions moving between the negative (anode) and positive (cathode) electrodes.

What’s Next?

Smartphones will naturally evolve as consumers look for ever-more useful features. Foldable phones, 5G technology with higher download speeds, and extra cameras are just a few of the changes expected.

As technology continues to improve, so will the demand for the metals necessary for the next generation of smartphones.

This post was originally featured on Elements

Continue Reading

Subscribe

Popular