Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Cyber Security
&
User's Privacy
The Need to be security conscious for
organizations and individual
●

●

Security's days as just a technical issue are done. It is becoming a
central concern for leaders at the highest leve...
●

Reflecting on the recent incident of security breach where
Chinese hackers access U.S. Weapons Systems' Design Plans.
Q...
Don't BLAME The System Designers
●

●

In my own point of view, although there are many aspects to
take into consideration...
Be Security Conscious
●

●

●

●

As a firm or an organization you must keep in mind that Digital
connectivity is the life...
Firm Security Structure
Cyber-Security

Company/Firms Concerned

Notice/Solve
Prob on Time

Develop Strategies

Make it pa...
User's Privacy
●

●

Owing to the wide use of internet and technological advances
of the e-world, people use this means fo...
Areas Involved
●

All Social Media & Social Network

●

All Telecommunication

●

All Search Engines etc.

8
Privacy Literacy
●

An important component of digital literacy means having the
skills to engage fully and confidently in ...
Privacy Literacy
●

An important component of digital literacy means having the
skills to engage fully and confidently in ...
Upcoming SlideShare
Loading in …5
×

Cyber Security & User's Privacy Invasion

781 views

Published on

Understanding the user's privacy policies and protecting them to avoid and to curtail the cyber crime menace.

Published in: Technology
  • d poh pwedeng eh download yan?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Cyber Security & User's Privacy Invasion

  1. 1. Cyber Security & User's Privacy The Need to be security conscious for organizations and individual
  2. 2. ● ● Security's days as just a technical issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding it as worries about privacy, the protection of personally identifiable information, and identity theft grow. Security breach has been widely experienced in the global sector not just in the IT industries.
  3. 3. ● Reflecting on the recent incident of security breach where Chinese hackers access U.S. Weapons Systems' Design Plans. Question: ● Who should be blame? The System Designers? Or The Affected Firm? 3
  4. 4. Don't BLAME The System Designers ● ● In my own point of view, although there are many aspects to take into consideration when designing a computer system, security can prove to be very important. In this case I think all the firms or organizations should also be improving their security system on daily basis. Also the BEST way to stop these attacks is to have a network inaccessible to regular users. Maybe all government related tech info should be on networks comparable SIPRNet (Secret Internet Protocol Router Network ) or higher. Perhaps this might ease the problems. 4
  5. 5. Be Security Conscious ● ● ● ● As a firm or an organization you must keep in mind that Digital connectivity is the lifeblood of global operations. Which means that you are expose to danger from hackers or any security threats. In cyberdefense activities, the typical mindset has been one in which risks are identified and mitigated based on known vulnerabilities and known threats. Question: What can be done to permanently eradicate the threats or breach in the cyber world? 5
  6. 6. Firm Security Structure Cyber-Security Company/Firms Concerned Notice/Solve Prob on Time Develop Strategies Make it part of their Task Company/Firms Unconcerned Expose to Attacks Open to Attacks & Hackers Unrecognized Problem & Uncertain solution Always Running at Risk 6
  7. 7. User's Privacy ● ● Owing to the wide use of internet and technological advances of the e-world, people use this means for a wide variety of purposes, especially communication. Nothing is a secret in the cyber world. “Give us modern technology and go with our privacy” 7
  8. 8. Areas Involved ● All Social Media & Social Network ● All Telecommunication ● All Search Engines etc. 8
  9. 9. Privacy Literacy ● An important component of digital literacy means having the skills to engage fully and confidently in the digital world, without compromising your own personal information or that of others. ● Mindful of posts, comments, personal data you share online ● Mindful of what you communicate to another through calls Question: ● Does it mean that there's no way one can be or run any business in the cyber world without an anonymous person on the other end knowing? (Site Admin, Service Providers etc)? 9
  10. 10. Privacy Literacy ● An important component of digital literacy means having the skills to engage fully and confidently in the digital world, without compromising your own personal information or that of others. ● Mindful of posts, comments, personal data you share online ● Mindful of what you communicate to another through calls Question: ● Does it mean that there's no way one can be or run any business in the cyber world without an anonymous person on the other end knowing? (Site Admin, Service Providers etc)? 9

×