Quotesia
Home
Authors
Popular authors
Joseph Brodsky
Walt Whitman
Aristotle
Nathaniel Hawthorne
Robert Half
Emily Dickinson
All authors
Today's birthdays
1991 - Quavo
1840 - Emile Zola
1805 - Hans Christian Andersen
1940 - Penelope Keith
1979 - Lindy Booth
1960 - Linford Christie
Today's birthdays
Popular professions
President
Celebrity
Comedian
Athlete
Chef
Coach
All professions
Authors by letter
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All authors
Topics
Top Quotes
Quotesia
Quote Topics
Cyber Quotes
Cyber Quotes
You may have heard of Black Friday and Cyber Monday. There's another day you might want to know about: Giving Tuesday. The idea is pretty straightforward. On the Tuesday after Thanksgiving, shoppers take a break from their gift-buying and donate what they can to charity.
Bill Gates
Day
Thanksgiving
You
Charity
Black
Giving
Monday
Pretty
About
Take
Idea
Know
Another
Another Day
Heard
Friday
Donate
May
Tuesday
Want
After
Break
Might
Straightforward
Cyber
Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.
Anna Maria Chavez
Bullying
Suffering
Will
Society
Our
Unless
Thousands
Silent
Until
Continue
Victims
Cyber
We live in a world where all wars will begin as cyber wars... It's the combination of hacking and massive, well-coordinated disinformation campaigns.
Jared Cohen
World
Will
Live
Hacking
Combination
Massive
Campaigns
Begin
Where
Disinformation
Cyber
Wars
The single biggest existential threat that's out there, I think, is cyber.
Michael Mullen
Single
Think
Out
Threat
Existential
Biggest
Cyber
Cyber war takes place largely in secret, unknown to the general public on both sides.
Noah Feldman
War
Unknown
Secret
Sides
General
Both
General Public
Both Sides
Takes
Place
Public
Cyber
Largely
I'm a bit of a hacker fanatic and know a fair bit about that industry and cyber crime and cyber warfare.
Seth Gordon
Crime
Hacker
Bit
About
Fair
Know
Industry
Fanatic
Warfare
Cyber
Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.
Anna Maria Chavez
Hide
Mask
Physical
Direct
Online
Anonymity
Access
Bullies
Behind
Victims
Unimaginable
Cyber
Need
Harm
Today, we face another major potential attack on our country. This attack is not a hijacked plane or bomb, although that remains a threat; rather, it is a cyber attack.
Dan Coats
Today
Face
Country
Our
Threat
Rather
Potential
Attack
Remains
Hijacked
Major
Another
Although
Plane
Cyber
Bomb
The first step in securing our cyber future is education, and that means everything from educating individuals to companies to the next generation of IT professionals.
Dan Lipinski
Education
Future
Generation
First
Our
Everything
Step
Individuals
First Step
Educating
Next
Cyber
Means
Next Generation
Companies
Professionals
Cyber terrorists are no different from other terrorists: No matter where they hide, we will track them down and seek to bring them to the United States to face justice.
Dana Boente
Justice
Hide
Matter
Will
Face
Down
Other
States
Seek
Track
Terrorists
Where
Different
Them
Cyber
United
United States
Bring
The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.
James Comey
Innovation
Money
Losing
Face
Increasingly
Our
Citizens
Threatens
Threats
Diverse
Data
Through
Computers
Ideas
Most
Also
Vulnerable
America
Personal
Personal Information
Stored
Information
Sensitive
Much
Cyber
U.S. computer networks and databases are under daily cyber attack by nation states, international crime organizations, subnational groups, and individual hackers.
John O. Brennan
Daily
Crime
Nation
States
Databases
Networks
Attack
Individual
Computer
Hackers
Cyber
Organizations
International
Groups
We need to take lessons learned from fighting terrorism and apply them to cyber crime.
Robert Mueller
Terrorism
Crime
Fighting
Take
Learned
Them
Cyber
Lessons
Lessons Learned
Apply
Need
We know that the government in China has been involved in cyber attacks before. I look at our partners around the world, our traditional allies, our NATO partners who are making the same assessment. We share so much with them and rely on their technology, their expertise and interoperability in many aspects of our own armed forces.
Andrew Scheer
Government
Technology
World
Before
Own
NATO
Our
Has-Been
Rely
Allies
Attacks
Share
Armed
Armed Forces
Know
Look
Involved
Forces
Partners
Around
Making
Traditional
Been
Same
Expertise
China
Them
Much
Cyber
Aspects
Who
Many
Assessment
We are now living on Internet time. It's a new territory, and the cyber equivalent of the Oklahoma land rush is on.
Andy Grove
Time
Internet
Living
Oklahoma
Rush
New
Territory
Equivalent
New Territory
Land
Cyber
Now
At Girl Scouts, we are committed to raising awareness about the terrible effects of cyber bullying, and to teaching girls how to recognize the signs of bullying of any sort and extricate themselves or another from a bad situation before it spirals out of control and ends in tragedy.
Anna Maria Chavez
Bullying
Signs
Girl
Girl Scouts
Before
Control
Situation
Awareness
Extricate
Recognize
Out
Bad
Spirals
About
Bad Situation
Terrible
Sort
Another
How
Tragedy
Effects
Scouts
Committed
Any
Ends
Themselves
Cyber
Teaching
Raising
Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010, is often cited as the most dramatic use of a cyber weapon.
Barton Gellman
Worm
Dramatic
States
Destroyed
Cited
Weapon
Attacks
Computer
Developed
Most
Israel
Iranian
Often
Cyber
Use
United
United States
Nuclear
Besides the conventional military threats, North Korean cyber capabilities are growing.
Cory Gardner
Military
Besides
Threats
Korean
North
North Korean
Conventional
Capabilities
Cyber
Growing
A major attack on our cyber systems could shut down our critical infrastructure - financial systems, communications systems, electric grids, power plants, water treatment centers, transportation systems and refineries - that allows us to run our economy and protect the safety of Americans.
Dan Coats
Water
Financial
Safety
Plants
Power
Down
Our
Critical
Systems
Run
Financial Systems
Attack
Could
Power Plants
Major
Economy
Protect
American
Centers
Infrastructure
Us
Communications
Cyber
Electric
Transportation
Shut
Treatment
Every day, we learn of more cyber attacks in our nation and around the world. In the United States, these attacks have the potential to destroy our military and economic security and, perhaps, impact the process we use to elect our leaders.
Dan Lipinski
Day
Every Day
World
Nation
Military
Every
Our
States
Destroy
Security
Impact
More
Potential
Economic
Attacks
Economic Security
Leaders
Perhaps
Learn
Around
Process
Elect
Cyber
Use
United
United States
We have spent so much time worrying about a 'cyber Pearl Harbor,'' the attack that takes out the power grid, that we have focused far too little on the subtle manipulation of data that can mean that no election, medical record, or self-driving car can be truly trusted.
David E. Sanger
Time
Election
Car
Power
Too
Worrying
Spent
Focused
Out
Record
About
Data
Attack
Takes
Truly
Trusted
So Much Time
Grid
Subtle
Little
Mean
Manipulation
Far
Much
Cyber
Harbor
Medical
Pearl
Pearl Harbor
While cyber espionage is having a tremendous negative affect on the global economy from the theft-caused drain of intellectual property and the resulting adverse incentives for continued investments in innovative growth, the threat from destructive and disruptive attacks is amplifying the risks even further.
Dmitri Alperovitch
Property
Risks
Negative
Tremendous
Innovative
Further
Destructive
Threat
Having
Resulting
Attacks
Investments
Economy
Global
Adverse
Global Economy
Affect
Continue
Intellectual
Intellectual Property
Espionage
While
Cyber
Incentives
Even
Growth
Disruptive
Drain
In the physical world, we would never blame the victim of the assault for that assault taking place, but yet we do so all the time in the cyber world. I think that's completely misguided.
Dmitri Alperovitch
Time
Blame
World
Victim
Think
Would
Physical
Physical World
Misguided
Never
Taking
Place
Cyber
Assault
Cyber criminals are good... but they cut corners. They don't spend a lot of time tweaking things and making sure that every aspect of the attack is obfuscated.
Dmitri Alperovitch
Time
Good
Every
Corners
Spend
Criminals
Attack
Sure
Making
Lot
Cut
Cyber
Aspect
Tweaking
Things
Russia is a Tier 1 cyber power.
Dmitri Alperovitch
Power
Russia
Cyber
While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.
Dorothy Denning
Terrorism
Reality
Few
Would
Only
Vast
Vast Majority
Take
Hackers
Towards
Majority
May
While
Turn
Cyber
Violence
Load more quotes
No more cyber quotes
Haven't find the right quote? Try another of these similiar topics.
Education
Air
About
Actor