You are on page 1of 2

Are we e-SAFE?

The information technology is a double edge sword, which can


be used for destructive as well as constructive work. Crackers
are becoming more and more powerful. Thus, the fate of many
ventures depends upon the benign or vice intentions, as the
case may be, of the person dealing with and using the
technology. For instance, a malicious intention forwarded in the
form of hacking, data theft, virus attack, etc can bring only
destructive results unless and until these methods have been
used for checking the authenticity, safety and security of the
technological device which has been primarily relied upon and
trusted for providing the security to a particular organisation.
For instance, the creator of the “Sasser worm” has been hired
as a “security software programmer” by a German firm, so that
he can make firewalls, which will stop suspected files from
entering computer systems.

Thus, these methods may also be used for checking the


authenticity, safety and security of one’s technological device,
which has been primarily relied upon and trusted for providing
the security to a particular organisation. In fact, a society
without protection in the form of “self help” cannot be
visualised in the present electronic era. Thus, we must
concentrate upon securing our ICT and e-governance bases
before we start encashing their benefits. The same can be
effectively achieved if we give due importance to this fact while
discussing, drafting and adopting policies decisions pertaining
to ICT in general and e-governance in particular. The same is
also important for an effective e-commerce base and an
insecure and unsafe ICT base can be the biggest discouraging
factor for a flourishing e-commerce business. The factors
relevant for this situation are too numerous to be discussed in a
single work.

Thus, it would be better if we concentrate on each factor in a


separate but coherent and holistic manner. The need of the
hour is to set priority for a secure and safe electronic
environment so that its benefits can be reaped to the maximum
possible extent.

Submitted by:
Dhiraj Amritraj
Regn No: 0701211341
Roll No: 107480
Dept. Of Computer Science

You might also like