You are on page 1of 2

Small world and the Big threat

At the last course I came across a person who is known to me with the a very long known reference, What
a small world? His identity disclosed to me after sharing of an incident from my past, this was a very small
sharing of information which recalled me almost two decades of my life. Being an information security
person, it was mandatory for me to ponder, was that sharing of information right or not? Now a day,
Information sharing is the biggest challenge for individuals, cooperate world and even for governments.

What exactly is information?


“facts provided or learned about something or someone” is defined as information and what is conveyed
or represented by a particular arrangement or sequence of things is known as transmitted information.
Information worth nothing unless it is transmitted from one storage to another. Characteristics of
information can be accuracy, completeness, uniquely referenced, storage and transmission.

Information can be stored in following 5 groups:

1. Biological storage e.g. human brain


2. Physical storage e.g. written on paper, signage on wooden, metallic or any format
3. Magnetic storage e.g. hard drive, USB or any digital format
4. Optical storage e.g. Optical disc drive, erasable optical cartridges etc and even Magneto-optical
drive which is combination of both magnetic and optical storage
5. Environmental storage e.g. norms, culture, organizational structure, and management structure
etc.

Similarly, information transmission can be grouped as:

1. Physically exchange of information e.g. letters, memo, papers etc.


2. Digital exchange of information e.g. email, social media, websites etc.
3. Optical exchange of information e.g. video, signage, signals etc.
4. Audible exchange of information e.g. speech, telephonic conversation etc.

Why we need security for information?


In today world, when data related to anyone can be accessible by anyone, regardless the intend of fetching
data it is accessible to anyone. We are living in a small cyber world, where anyone can reach anywhere
without a fraction of time and can perform any task. If we think little negatively, this task performance
can be bank robbery, spying, targeting something or someone and can cause fatality as well, whew! Yes,
with these kinds of threats here comes the need of security, the information security.

Top ten threats to information


Current innovation and society's consistent association with the Internet permits more innovativeness in
business than any other time in recent memory – including the black market. Cybercriminals are
deliberately finding better approaches to tap the touchiest systems on the planet. Securing business
information is a developing test yet mindfulness is the initial step. Here are the main 10 threats to
information security today:

1. New technology with less or no security


2. Social Media Attacks
3. Mobile Malware
4. Third-party Entry points
5. Neglecting Proper Configuration
6. Outdated Security Software
7. Social Engineering
8. Lack of Encryption
9. Corporate Data on Personal Devices
10. Inadequate Security Technology

What to do?
OMG, Information security is never-ending effort, its daily exercise, make it your habit; better to say make
it your second nature. I always say to my students, “information security is simply, right information
accessible to the right person at right time.” It is all about CIA (Confidentiality, Integrity and Availability),
just remember these 3 letters (CIA) and follow the tips described below:

1. Don’t fill out your social media profile


2. Be choosy about sharing your credit card, debit card, social security number—even the last 4 digits
3. Lock down your hardware
4. Turn on private browsing
5. Use a password vault that generates and remembers strong and unique passwords
6. Use two-factor authentication
7. Pay for things with cash
8. Keep your social network activity private
9. Don’t share extra information with anyone
10. Lie when setting up password security questions
11. Never share password or pin with anyone
12. Use encryption where ever possible
13. Try to hide your screen from strangers
14. Never download unnecessary files

Stay safe and smart, it’s a very small world with so much big threats.

You might also like