Page 80 - Veritas
P. 80

just wanted to try. For such applications to function, certain permissions
            need to be given to the application. In this manner, we are permitting the

            application to access a variety of data on our devices.



            Think larger now, our mobile phone is connected to the network in your
            home or workplace, does this have an effect on the permissions you are

            giving?



            For example, many of us download applications from the internet onto
            our computer systems. During installation, the application will ask you to

            check certain options. How many of us read the options and the condi-
            tions associated with them?



            One of the options may suggest an additional toolbar may be installed on

            your browser. Well, that doesn’t really cause much trouble, so that’s not
            an issue but with many applications when they give the particular option

            they also install other types of programs on your system without your
            knowledge and the next time you use your system you will be able to see

            certain other application that may pop up at the start of the system, or
            suddenly be executed when you are not aware. Many different types of

            websites will open without you even clicking on any links. Your system
            might become slow because of the running of unwanted programs that

            you have installed (without your knowledge). Now that is just one part of
            the incident.



            Whether it is a computer system or your mobile phone, we need software

            and applications to perform various tasks every single day. To get more in-
            formation and knowledge we may have to visit numerous websites. What-

            ever we do whether we click, swipe or type there is a portion of data that
            is getting transferred or exchanged and as lay users of this technology you

            wouldn’t know what that data is because we are happy that we are able to
            carry out our day-to-day activities. From a perspective of cybersecurity we

            would want to know what is the data that is getting transferred, where is
            the data destined to go and from where did the data originate.











                                                                                                         VERITAS    65
   75   76   77   78   79   80   81   82   83   84   85