Page 79 - Veritas
P. 79

FEATURE ARTICLES



                CYBERSECURITY: USING DATA



                                             EVERYDAY





            Prof. Don Caeiro

           Cybersecurity is the protection of computer device networks and everything

           that falls into the definition of computer according to the United Nations
           Congress. With the advent of technology and the recent developments
           in the field of information technology, we require a very strong system

           of what we are doing using this technology so that we will be safe and

           we will not be vulnerable to any sort of criminal activity. Every day there
           is some new technology that is developed. New software, new websites,
           new games, new applications, new reveries of computers and mobile

           phones, a new type of communication among many others are developing

           at a rate that cannot be comprehended. In this digital framework, many
           of us cannot live without our phone or devices for even ten minutes. For
           our everyday life, we look for some form of technology that is there to be

           of some assistance. A very simple example would be a smartwatch that

           is gaining more importance than other watches and ultimately becomes a
           part of the Internet of things (IoT). All of these systems, all of this soft-
           ware and application that we are using day in and day out, are handling

           some amount of data if not all the data. Any type of device you may use

           will be processing some data or the other. The question is - what data is
           being handled by that system or interface and what happens to the data
           once the job is done? It is surprising to see many do not know the nuances

           of these processes.



           An example of an application that could properly help you communicate
           with other people. Using the same application you are not only able to

           message them but also video chat with them using the internet. There are

           numerous applications available for performing these functions, but we
           do not know the source of these applications or the owner of these appli-
           cations. Maybe we would be able to say that this application is owned by

           this particular entity, but we cannot say that for all the applications that

           we would be using. Take your mobile phone, for example, you would have
           installed applications on the phone, that you don’t use anymore, or you






  64 VERITAS
   74   75   76   77   78   79   80   81   82   83   84