Cyber Security
&
User's Privacy
The Need to be security conscious for
organizations and individual
●

●

Security's days as just a technical issue are done. It is becoming a
central concern for leaders at the highest level of many
organizations and governments, transcending national borders.
Customers are demanding it as worries about privacy, the
protection of personally identifiable information, and identity
theft grow.
Security breach has been widely experienced in the global sector
not just in the IT industries.
●

Reflecting on the recent incident of security breach where
Chinese hackers access U.S. Weapons Systems' Design Plans.
Question:

●

Who should be blame? The System Designers?
Or The Affected Firm?

3
Don't BLAME The System Designers
●

●

In my own point of view, although there are many aspects to
take into consideration when designing a computer system,
security can prove to be very important. In this case I think all
the firms or organizations should also be improving their
security system on daily basis.
Also the BEST way to stop these attacks is to have a network
inaccessible to regular users. Maybe all government related tech
info should be on networks comparable SIPRNet (Secret Internet
Protocol Router Network ) or higher. Perhaps this might ease the
problems.
4
Be Security Conscious
●

●

●

●

As a firm or an organization you must keep in mind that Digital
connectivity is the lifeblood of global operations. Which means
that you are expose to danger from hackers or any security
threats.
In cyberdefense activities, the typical mindset has been one in
which risks are identified and mitigated based on known
vulnerabilities and known threats.
Question:
What can be done to permanently eradicate the threats or
breach in the cyber world?
5
Firm Security Structure
Cyber-Security

Company/Firms Concerned

Notice/Solve
Prob on Time

Develop Strategies

Make it part
of their Task

Company/Firms Unconcerned

Expose to Attacks
Open to Attacks
&
Hackers

Unrecognized
Problem & Uncertain
solution

Always
Running at Risk
6
User's Privacy
●

●

Owing to the wide use of internet and technological advances
of the e-world, people use this means for a wide variety of
purposes, especially communication.
Nothing is a secret in the cyber world. “Give us modern
technology and go with our privacy”

7
Areas Involved
●

All Social Media & Social Network

●

All Telecommunication

●

All Search Engines etc.

8
Privacy Literacy
●

An important component of digital literacy means having the
skills to engage fully and confidently in the digital world,
without compromising your own personal information or that of
others.

●

Mindful of posts, comments, personal data you share online

●

Mindful of what you communicate to another through calls
Question:

●

Does it mean that there's no way one can be or run any
business in the cyber world without an anonymous person on
the other end knowing? (Site Admin, Service Providers etc)?
9
Privacy Literacy
●

An important component of digital literacy means having the
skills to engage fully and confidently in the digital world,
without compromising your own personal information or that of
others.

●

Mindful of posts, comments, personal data you share online

●

Mindful of what you communicate to another through calls
Question:

●

Does it mean that there's no way one can be or run any
business in the cyber world without an anonymous person on
the other end knowing? (Site Admin, Service Providers etc)?
9

Cyber Security & User's Privacy Invasion

  • 1.
    Cyber Security & User's Privacy TheNeed to be security conscious for organizations and individual
  • 2.
    ● ● Security's days asjust a technical issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding it as worries about privacy, the protection of personally identifiable information, and identity theft grow. Security breach has been widely experienced in the global sector not just in the IT industries.
  • 3.
    ● Reflecting on therecent incident of security breach where Chinese hackers access U.S. Weapons Systems' Design Plans. Question: ● Who should be blame? The System Designers? Or The Affected Firm? 3
  • 4.
    Don't BLAME TheSystem Designers ● ● In my own point of view, although there are many aspects to take into consideration when designing a computer system, security can prove to be very important. In this case I think all the firms or organizations should also be improving their security system on daily basis. Also the BEST way to stop these attacks is to have a network inaccessible to regular users. Maybe all government related tech info should be on networks comparable SIPRNet (Secret Internet Protocol Router Network ) or higher. Perhaps this might ease the problems. 4
  • 5.
    Be Security Conscious ● ● ● ● Asa firm or an organization you must keep in mind that Digital connectivity is the lifeblood of global operations. Which means that you are expose to danger from hackers or any security threats. In cyberdefense activities, the typical mindset has been one in which risks are identified and mitigated based on known vulnerabilities and known threats. Question: What can be done to permanently eradicate the threats or breach in the cyber world? 5
  • 6.
    Firm Security Structure Cyber-Security Company/FirmsConcerned Notice/Solve Prob on Time Develop Strategies Make it part of their Task Company/Firms Unconcerned Expose to Attacks Open to Attacks & Hackers Unrecognized Problem & Uncertain solution Always Running at Risk 6
  • 7.
    User's Privacy ● ● Owing tothe wide use of internet and technological advances of the e-world, people use this means for a wide variety of purposes, especially communication. Nothing is a secret in the cyber world. “Give us modern technology and go with our privacy” 7
  • 8.
    Areas Involved ● All SocialMedia & Social Network ● All Telecommunication ● All Search Engines etc. 8
  • 9.
    Privacy Literacy ● An importantcomponent of digital literacy means having the skills to engage fully and confidently in the digital world, without compromising your own personal information or that of others. ● Mindful of posts, comments, personal data you share online ● Mindful of what you communicate to another through calls Question: ● Does it mean that there's no way one can be or run any business in the cyber world without an anonymous person on the other end knowing? (Site Admin, Service Providers etc)? 9
  • 10.
    Privacy Literacy ● An importantcomponent of digital literacy means having the skills to engage fully and confidently in the digital world, without compromising your own personal information or that of others. ● Mindful of posts, comments, personal data you share online ● Mindful of what you communicate to another through calls Question: ● Does it mean that there's no way one can be or run any business in the cyber world without an anonymous person on the other end knowing? (Site Admin, Service Providers etc)? 9