Cyber Security & User's Privacy Invasion

620 views
465 views

Published on

Understanding the user's privacy policies and protecting them to avoid and to curtail the cyber crime menace.

Published in: Technology
1 Comment
1 Like
Statistics
Notes
  • d poh pwedeng eh download yan?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
620
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber Security & User's Privacy Invasion

  1. 1. Cyber Security & User's Privacy The Need to be security conscious for organizations and individual
  2. 2. ● ● Security's days as just a technical issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding it as worries about privacy, the protection of personally identifiable information, and identity theft grow. Security breach has been widely experienced in the global sector not just in the IT industries.
  3. 3. ● Reflecting on the recent incident of security breach where Chinese hackers access U.S. Weapons Systems' Design Plans. Question: ● Who should be blame? The System Designers? Or The Affected Firm? 3
  4. 4. Don't BLAME The System Designers ● ● In my own point of view, although there are many aspects to take into consideration when designing a computer system, security can prove to be very important. In this case I think all the firms or organizations should also be improving their security system on daily basis. Also the BEST way to stop these attacks is to have a network inaccessible to regular users. Maybe all government related tech info should be on networks comparable SIPRNet (Secret Internet Protocol Router Network ) or higher. Perhaps this might ease the problems. 4
  5. 5. Be Security Conscious ● ● ● ● As a firm or an organization you must keep in mind that Digital connectivity is the lifeblood of global operations. Which means that you are expose to danger from hackers or any security threats. In cyberdefense activities, the typical mindset has been one in which risks are identified and mitigated based on known vulnerabilities and known threats. Question: What can be done to permanently eradicate the threats or breach in the cyber world? 5
  6. 6. Firm Security Structure Cyber-Security Company/Firms Concerned Notice/Solve Prob on Time Develop Strategies Make it part of their Task Company/Firms Unconcerned Expose to Attacks Open to Attacks & Hackers Unrecognized Problem & Uncertain solution Always Running at Risk 6
  7. 7. User's Privacy ● ● Owing to the wide use of internet and technological advances of the e-world, people use this means for a wide variety of purposes, especially communication. Nothing is a secret in the cyber world. “Give us modern technology and go with our privacy” 7
  8. 8. Areas Involved ● All Social Media & Social Network ● All Telecommunication ● All Search Engines etc. 8
  9. 9. Privacy Literacy ● An important component of digital literacy means having the skills to engage fully and confidently in the digital world, without compromising your own personal information or that of others. ● Mindful of posts, comments, personal data you share online ● Mindful of what you communicate to another through calls Question: ● Does it mean that there's no way one can be or run any business in the cyber world without an anonymous person on the other end knowing? (Site Admin, Service Providers etc)? 9
  10. 10. Privacy Literacy ● An important component of digital literacy means having the skills to engage fully and confidently in the digital world, without compromising your own personal information or that of others. ● Mindful of posts, comments, personal data you share online ● Mindful of what you communicate to another through calls Question: ● Does it mean that there's no way one can be or run any business in the cyber world without an anonymous person on the other end knowing? (Site Admin, Service Providers etc)? 9

×