SlideShare a Scribd company logo
1 of 7
Volume 1 | Issue 15
16th
March 2017
Learning for the learning industry from the Yahoo
Cyber Attack
Intellectual Security
We have broken this article into 4 parts
Past
Present
Future
Relationships
• Past
 Spy and warfare depended on elementary decoding and attacks
 Physical assets were larger as source of power
 Intellectual destruction was not a large part of strategy
 Wars were largely at borders
•Present
Intellectual capital and cyber interaction is ever increasing
Nearly all information is in bits and bytes in the ecosystem
Information of all kinds can be far easily got by just getting into the IT
infrastructure and code
• Future
 A large resource in terms of time and investment will go into not just
building systems but keeping them secure
• Relationships
 Social life shall be dependent on information technology and allied
infrastructure
• Summary
 Learning professionals will need to educate more and more on not
just tools but also on how to protect the intellectual assets
 Precaution will be better than cure in our approach to this
Author
Prashant Khanna
Director & Co-founder
Enhance Systems Private Limited
Delight through learning
Feel free to visit www.enhancelearning.co.in for details,
learning case studies and demos.

More Related Content

What's hot

The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandeyRithikaD1
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security DemistyifiedMicrosoft UK
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and DocumentsNuance Communications
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber securityavinashkumar1912
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small businessRajul Sthapak
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityCareer Communications Group
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020Rahul Boga
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 

What's hot (20)

Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small business
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in Cybersecurity
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 

Viewers also liked

N. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering Equipment
N. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering EquipmentN. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering Equipment
N. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering EquipmentIndiaMART InterMESH Limited
 
Irreversible Destruction, Learning for the learning industry from the N. Kore...
Irreversible Destruction, Learning for the learning industry from the N. Kore...Irreversible Destruction, Learning for the learning industry from the N. Kore...
Irreversible Destruction, Learning for the learning industry from the N. Kore...Enhance Systems Pvt. Ltd.
 
3Com 3AEK1565
3Com 3AEK15653Com 3AEK1565
3Com 3AEK1565savomir
 
3Com 3C0VG60005-06
3Com 3C0VG60005-063Com 3C0VG60005-06
3Com 3C0VG60005-06savomir
 
Programa apepa abril 2017
Programa apepa abril 2017Programa apepa abril 2017
Programa apepa abril 2017apepasm
 
3Com NB II DPS
3Com NB II DPS3Com NB II DPS
3Com NB II DPSsavomir
 
3Com 5998014246917
3Com 59980142469173Com 5998014246917
3Com 5998014246917savomir
 
3Com 3CCFE575BT-1
3Com 3CCFE575BT-13Com 3CCFE575BT-1
3Com 3CCFE575BT-1savomir
 

Viewers also liked (9)

N. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering Equipment
N. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering EquipmentN. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering Equipment
N. S. Terbo Pvt. Ltd., Ghaziabad, Heavy Engineering Equipment
 
Irreversible Destruction, Learning for the learning industry from the N. Kore...
Irreversible Destruction, Learning for the learning industry from the N. Kore...Irreversible Destruction, Learning for the learning industry from the N. Kore...
Irreversible Destruction, Learning for the learning industry from the N. Kore...
 
3Com 3AEK1565
3Com 3AEK15653Com 3AEK1565
3Com 3AEK1565
 
3Com 3C0VG60005-06
3Com 3C0VG60005-063Com 3C0VG60005-06
3Com 3C0VG60005-06
 
Programa apepa abril 2017
Programa apepa abril 2017Programa apepa abril 2017
Programa apepa abril 2017
 
3Com NB II DPS
3Com NB II DPS3Com NB II DPS
3Com NB II DPS
 
3Com 5998014246917
3Com 59980142469173Com 5998014246917
3Com 5998014246917
 
Pré-working Expedição Design
Pré-working Expedição DesignPré-working Expedição Design
Pré-working Expedição Design
 
3Com 3CCFE575BT-1
3Com 3CCFE575BT-13Com 3CCFE575BT-1
3Com 3CCFE575BT-1
 

Similar to Intellectual Security, Learning for the learning industry from the Yahoo Cyber Attack

How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!Tammy Clark
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber SecurityJohn Gilligan
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Nowasmeerana605
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summarmanailmalik
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Information Technology in CA Educatation
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA EducatationGaurav Rathi
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
Why Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfWhy Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfCiente
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 

Similar to Intellectual Security, Learning for the learning industry from the Yahoo Cyber Attack (20)

How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Information Technology in CA Educatation
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA Educatation
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Why Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfWhy Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdf
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Opi cyber talk for executives
Opi cyber talk for executivesOpi cyber talk for executives
Opi cyber talk for executives
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 

More from Enhance Systems Pvt. Ltd.

Learning for the learning industry from the Corona epidemic
Learning for the learning industry from the Corona epidemicLearning for the learning industry from the Corona epidemic
Learning for the learning industry from the Corona epidemicEnhance Systems Pvt. Ltd.
 
Recalling an article written on North Korea in Mar 17
Recalling an article written on North Korea in Mar 17Recalling an article written on North Korea in Mar 17
Recalling an article written on North Korea in Mar 17Enhance Systems Pvt. Ltd.
 
Recalling a past article on Learning for the learning industry: US and N. Kor...
Recalling a past article on Learning for the learning industry: US and N. Kor...Recalling a past article on Learning for the learning industry: US and N. Kor...
Recalling a past article on Learning for the learning industry: US and N. Kor...Enhance Systems Pvt. Ltd.
 
Trends for the learning industry from the forest fires in California
Trends for the learning industry from the forest fires in CaliforniaTrends for the learning industry from the forest fires in California
Trends for the learning industry from the forest fires in CaliforniaEnhance Systems Pvt. Ltd.
 
Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...
Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...
Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...Enhance Systems Pvt. Ltd.
 
Patience Running Out: Trends for the learning industry from IRMA and such dis...
Patience Running Out: Trends for the learning industry from IRMA and such dis...Patience Running Out: Trends for the learning industry from IRMA and such dis...
Patience Running Out: Trends for the learning industry from IRMA and such dis...Enhance Systems Pvt. Ltd.
 
Mysteries of the universe: Trends for the learning industry from mysteries of...
Mysteries of the universe: Trends for the learning industry from mysteries of...Mysteries of the universe: Trends for the learning industry from mysteries of...
Mysteries of the universe: Trends for the learning industry from mysteries of...Enhance Systems Pvt. Ltd.
 
Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...
Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...
Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...Enhance Systems Pvt. Ltd.
 
How to find the near actual problem – Root cause analysis?
How to find the near actual problem – Root cause analysis?How to find the near actual problem – Root cause analysis?
How to find the near actual problem – Root cause analysis?Enhance Systems Pvt. Ltd.
 
Learning for the learning industry from Evolution of IT
Learning for the learning industry from Evolution of ITLearning for the learning industry from Evolution of IT
Learning for the learning industry from Evolution of ITEnhance Systems Pvt. Ltd.
 
Thought of the day from our director 16th May'17
Thought of the day from our director 16th May'17Thought of the day from our director 16th May'17
Thought of the day from our director 16th May'17Enhance Systems Pvt. Ltd.
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Enhance Systems Pvt. Ltd.
 
Societal vs Internal Approaches, Trends for the learning industry from Trumps...
Societal vs Internal Approaches, Trends for the learning industry from Trumps...Societal vs Internal Approaches, Trends for the learning industry from Trumps...
Societal vs Internal Approaches, Trends for the learning industry from Trumps...Enhance Systems Pvt. Ltd.
 

More from Enhance Systems Pvt. Ltd. (20)

Learning for the learning industry from the Corona epidemic
Learning for the learning industry from the Corona epidemicLearning for the learning industry from the Corona epidemic
Learning for the learning industry from the Corona epidemic
 
Peace revolts
Peace revoltsPeace revolts
Peace revolts
 
Recalling an article written on North Korea in Mar 17
Recalling an article written on North Korea in Mar 17Recalling an article written on North Korea in Mar 17
Recalling an article written on North Korea in Mar 17
 
Recalling a past article on Learning for the learning industry: US and N. Kor...
Recalling a past article on Learning for the learning industry: US and N. Kor...Recalling a past article on Learning for the learning industry: US and N. Kor...
Recalling a past article on Learning for the learning industry: US and N. Kor...
 
Trends for the learning industry from the forest fires in California
Trends for the learning industry from the forest fires in CaliforniaTrends for the learning industry from the forest fires in California
Trends for the learning industry from the forest fires in California
 
Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...
Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...
Immediate Needs: Trends for the learning industry from Trump’s talks with Dem...
 
Patience Running Out: Trends for the learning industry from IRMA and such dis...
Patience Running Out: Trends for the learning industry from IRMA and such dis...Patience Running Out: Trends for the learning industry from IRMA and such dis...
Patience Running Out: Trends for the learning industry from IRMA and such dis...
 
Thought of the day 19th July
Thought of the day 19th JulyThought of the day 19th July
Thought of the day 19th July
 
Mysteries of the universe: Trends for the learning industry from mysteries of...
Mysteries of the universe: Trends for the learning industry from mysteries of...Mysteries of the universe: Trends for the learning industry from mysteries of...
Mysteries of the universe: Trends for the learning industry from mysteries of...
 
Thought of the day (18th July)
Thought of the day (18th July)Thought of the day (18th July)
Thought of the day (18th July)
 
Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...
Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...
Political Compulsions: Trends for the learning industry from Trump Jr’s Russi...
 
How to plan against retail competition?
How to plan against retail competition?How to plan against retail competition?
How to plan against retail competition?
 
How to find the near actual problem – Root cause analysis?
How to find the near actual problem – Root cause analysis?How to find the near actual problem – Root cause analysis?
How to find the near actual problem – Root cause analysis?
 
Learning for the learning industry from Evolution of IT
Learning for the learning industry from Evolution of ITLearning for the learning industry from Evolution of IT
Learning for the learning industry from Evolution of IT
 
Creative Solution
Creative SolutionCreative Solution
Creative Solution
 
Thought of the day from Management
Thought of the day from ManagementThought of the day from Management
Thought of the day from Management
 
Thought of the day for 18th May 2017
Thought of the day for 18th May 2017Thought of the day for 18th May 2017
Thought of the day for 18th May 2017
 
Thought of the day from our director 16th May'17
Thought of the day from our director 16th May'17Thought of the day from our director 16th May'17
Thought of the day from our director 16th May'17
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
 
Societal vs Internal Approaches, Trends for the learning industry from Trumps...
Societal vs Internal Approaches, Trends for the learning industry from Trumps...Societal vs Internal Approaches, Trends for the learning industry from Trumps...
Societal vs Internal Approaches, Trends for the learning industry from Trumps...
 

Recently uploaded

Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...StartupSprouts.in
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsailfergusonamani
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxdmtillman
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inStartupSprouts.in
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 

Recently uploaded (12)

Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsail
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptx
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 

Intellectual Security, Learning for the learning industry from the Yahoo Cyber Attack

  • 1.
  • 2. Volume 1 | Issue 15 16th March 2017 Learning for the learning industry from the Yahoo Cyber Attack Intellectual Security
  • 3. We have broken this article into 4 parts Past Present Future Relationships
  • 4. • Past  Spy and warfare depended on elementary decoding and attacks  Physical assets were larger as source of power  Intellectual destruction was not a large part of strategy  Wars were largely at borders •Present Intellectual capital and cyber interaction is ever increasing Nearly all information is in bits and bytes in the ecosystem Information of all kinds can be far easily got by just getting into the IT infrastructure and code
  • 5. • Future  A large resource in terms of time and investment will go into not just building systems but keeping them secure • Relationships  Social life shall be dependent on information technology and allied infrastructure
  • 6. • Summary  Learning professionals will need to educate more and more on not just tools but also on how to protect the intellectual assets  Precaution will be better than cure in our approach to this
  • 7. Author Prashant Khanna Director & Co-founder Enhance Systems Private Limited Delight through learning Feel free to visit www.enhancelearning.co.in for details, learning case studies and demos.