Information Security (Qboard_Secure)

  • Riya, Priya
  • “Cybersecurity is a myth” is a full right statement that can be made.In today’s era, where there is data breach at every step, data security is nothing but protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites as each person would want to take account of its data. We human beings, aim to protect aur data and information in every possible manner. We use strong passwords and strong security provided by big IT giants such as in the form of a mail or social platfoms. People now-a-days face a lot issue regarding data breaching and data being stolen, accounts being hacked etc. There is not even a single day which has gone without an article being published on data breach or hackers hacking people’s accounts. This has to be taken seriously as we ourselves are the victims of these practices(if not verified). Also, people face data breaching issues at a global level as well where military personnels and their information regarding various hidden attacks gets leaked, leading to the failure of any further attack. This has to be taken into account as what all we face and hear might not take too much time to be flooded like anything.

  • This issue is faced by any individual who is socially active. We are talking about the cyber breaches and at the end of the day, there is no one to blame for all that has happened to us. Data and security go hand in hand wherein people take undue advantage of other person’s data in a wrong manner without his or her permission. A data breach is nothing but the intentional or unintentional release of secure or private or confidential information to an untrusted environment. Data is an important asset to any organization and thereby, it is essential to safeguard it from online criminals. Organizations across the globe are investing heavily in information technology (IT) to deploy the best of cyber defense capabilities. Basically, organizations are more focused on protecting three common elements namely: people, processes, and technology. This implicitely protects intellectual capital, critical infrastructure, customer information, brand and what not. Data security is not just important for organizations. Data Security comes into play on the personal level where we use computers, tablets, and mobile phones which could be the next target of cyber criminals.Normally, remote devices that connect with an organization get targeted by attackers to tap the sensitive information. This is where the endpoint security comes into play. It helps to protect and maintain the devices connecting the network.Data breaches and cyber-attacks are anticipated to increase in the due course of time as the computer networks expand. It is important to have the right Data Security Solutions in place to meet the challenging threats.

  • Q1 Which age group do you fall in and how active your are on social media platforms?
    A1 I am 21 years old and I am quite active on various social media platforms like Facebook, Twitter, Whatsapp and Instagram.

    Q2 How safe do you feel your online data is linked with various accounts of yours?
    A2 I dont think that the data I share on my social media accounts is much safe.Social media sites promise to keep our data safe yet they fail to do so. This is the reason why we hear every now and then about data breaching of 1 million user accounts and what not.

    Q3 Does there already exist some solution to this problem according to you?
    A3 When I have to think of an already existing solution to this, I dont have much to say about it. I would say that yes the cyber security is quite strong for the army officials as the data that is being exchanged is highly sensitive and must not be leaked. But there isn’t any such thing for us commoners.

    Q4 Will you prefer to use to use an application that promises to keep the user data safe and actually manages to do so?
    A4 Not just me, anyone will surely use it because data security is the first and foremost priority of every individual online.

  • User Journey:-
    I being a highly active person on social media platforms such as Whatsapp, Facebook, Instagram, etc feel that the data and information I have linked to my accounts isn’t secure.It can easily be read by some third person as well because in today’s world, Cyber Security is a myth. When I chat with my friends and family, I share pictures, videos and other multimedia etc., I am always worried about the fact that yes this can been seen by some intruder too.Everyday we hear news about cyber crimes taking place.I feel it would be great if our data was more secure than it seems to be. So I along with my friend came up with this idea where we have built an application for users(both android and ios) where the data that is being sent is in the encoded format and to decode it, the receiver what to enter the pin in the application itself so as to be able to read the message sent by the sender.This will ensure that there is no data breach when the data is being sent from one person to another.It will truly be a boon for everyone as it makes everyone’s data secure in actual sense.

October 20, 2019

21 responses on "Information Security (Qboard_Secure)"

  1. where can i buy viagra over the counter https://viagrabng.com/# viagra amazon

  2. order doxycycline online doxycycline – doxycycline tabl

  3. where to buy viagra online: viagra 100mg price – where to buy

  4. online doctor prescription for viagra: price of viagra – via

  5. ed treatment review pharmacy online – online canadian pharm

  6. pet antibiotics without vet prescription buying ed pills online

  7. metformin 500 mg price south africa metformin 1000mg – met

  8. hydroxychloroquine sulfate 800 mg buy plaquenil

  9. erectile dysfunction: treatment of ed – ed treat

  10. viagra without a doctor prescription usa viagra without a doctor

  11. monthly cost of cialis without insurance find cheap cialis online

  12. ivermectin cream cost ivermectin – stromectol ivermect

Leave a Message

Your email address will not be published.


Knowledge and Content by Li2 Technologies | © 2021 NASSCOM Foundation | All rights reserved