Page 80 - Veritas
P. 80
just wanted to try. For such applications to function, certain permissions
need to be given to the application. In this manner, we are permitting the
application to access a variety of data on our devices.
Think larger now, our mobile phone is connected to the network in your
home or workplace, does this have an effect on the permissions you are
giving?
For example, many of us download applications from the internet onto
our computer systems. During installation, the application will ask you to
check certain options. How many of us read the options and the condi-
tions associated with them?
One of the options may suggest an additional toolbar may be installed on
your browser. Well, that doesn’t really cause much trouble, so that’s not
an issue but with many applications when they give the particular option
they also install other types of programs on your system without your
knowledge and the next time you use your system you will be able to see
certain other application that may pop up at the start of the system, or
suddenly be executed when you are not aware. Many different types of
websites will open without you even clicking on any links. Your system
might become slow because of the running of unwanted programs that
you have installed (without your knowledge). Now that is just one part of
the incident.
Whether it is a computer system or your mobile phone, we need software
and applications to perform various tasks every single day. To get more in-
formation and knowledge we may have to visit numerous websites. What-
ever we do whether we click, swipe or type there is a portion of data that
is getting transferred or exchanged and as lay users of this technology you
wouldn’t know what that data is because we are happy that we are able to
carry out our day-to-day activities. From a perspective of cybersecurity we
would want to know what is the data that is getting transferred, where is
the data destined to go and from where did the data originate.
VERITAS 65