Skip to main content

Data Analysis

Data Analysis...




Data Analysis in simple words is a method in which we collect data with the goal of discovering some useful information, informing conclusions, and which can support decision making.


For example: when we want to book a flight from one place to another we go to many different websites of different flight companies or booking sites we gather data we see and then analyse their comfort ,their flight duration ,their prices (this is data analysis) and we come to a decision from the data we gathered (this is decision making) this is the same process as we first gather data we then analyse the data and we make a decision.



What kind of Information?

Information can be of many forms as to what we search ,what type of content we like or we watch ,places we visit ,our photos ,and everything the internet knows about us.




What is the threat through data analysis?

Data Analysis is done by bigger companies as well as smaller companies and also each and every web companies present today(not me of course) the bigger companies such as Google, Facebook ,Amazon etc accept that they analyse our data as they say they do it to enhance user experience and which is true for most of the time like the recommendation we get for hotels when we search hotels near me or stuff is all possible because of the data they have data of hotels ,data of the location we are while we search and stuff lets not dive deep into this but yeah data analysis is useful. But the very second this data comes into hands of an adversary things starts to change.But bigger companies have  good security they spend a lot in data security in-order to protect the data from adversary ,but does this mean our data is secure YES YES YES our data is not secure let me explain you why, these data analysis doesn't mean that we can analyse data only is we are one among the bigger companies NO.



Data Analysis can be done in many ways such as surveys or paid surveys, lucky winner scams (wherein we enter our name ,age ,email ,address...and nothing happens) free money apps ,and many as such forgery sites .Ok so is it done well no social media is a mine for data analysis specially for personal data analysis where we live, what we eat, where we visit, the places we chekIn and what so ever we do all the data can be gathered without your consent or even the website knowing as it is out there for the general public.




But wait that is not all ,data collection can go on a different level there are many ways data can be collected but this one is more similar nowadays this kind of data collection involves us to sign in to each and every website we visit either to download songs or to read a book or an article and we tend to not care much about it and provide them with our email id , phone number , name and everything they ask for sometimes it so does happen that the email we provided is the same email id we use for our bank authentication just saying ,these data moreover end up in the black market for few cents  and with all these little little information we don't care about make a mountain of data that eventually makes us care about it. With these information and a bit of social engineering anyone can take up your identity.





Conclusion:    


Data Analysis has many positive impact and negative too, like the ads often displayed are somehow related to the stuff we wanted are all because of some data ,Artificial intelligence programs are all just some sets of data...
It all just comes down to the way or perspective we use the data for if used for good can bring many positive impacts but if used for negative that too can bring a lot of impacts obviously negative impacts.

We should always think before giving any form of data so that it never turns back upon us...


        

Comments

Popular posts from this blog

Privacy and Confidentiality

Differences Privacy : Basically the term privacy refers to keeping your information yours or limiting it to close family or your friends or your contacts,  Whereas on the other hand,  Confidentiality: talks about that a subjects information will stay a secret but this time from the perspective of the person receiving that information.  For example : on any social media platform we tend to share our information to limited or specific people or groups that is a matter of privacy concerns, but the same when it is about our passwords, our biometrics, our messages ,ATM pins, CVV these are all confidential information. These are some basic terms but play a vital role in our everyday lives , we all need privacy we don't want anyone sniffing our day to day activities we all want our space and that's the reason why being secure not just online but offline too is needed. Because privacy is not just  what we demand for its a right we all have. #RightToPrivacy ...

CyberAwareness

Cyber Security One of the most fundamental terms used by many practiced by none. We often use this heavy term to designate ourselves with the modern growing digital world.  Every single device in today's world is related to our lives one way or the other each of these devices know our day to day activities as they make our lives simpler as for example we often use Google Maps to find our way around day to day ,we use certain apps that manage our daily activities as they keep a track of our activities on daily basis. Now comes a bitter part if an intruder or maybe someone else get a hand on these apps identifying them as you gets to know everything that app knows about you everything from morning to evening, where we stay ,what we watch , what we do, our credit card details and many more.  In this digital age things have been a bit easier no doubt but at a big risk . Being secure in the digital age is very essential .Being a part of this day to day digital age we ha...

Critical Urban Infrastructure

  Urban Infrastructure is at a critical stage from a cybersecurity perspective. When we mostly talk about cybersecurity, we take computers into play, mobile devices, IOT’s but the infrastructure well unfortunately no we never even think that the infrastructure is at a potential risk. As Infrastructure is also a tempting place for adversaries. Not just the infrastructure but the Urban-Infrastructure, as living in the digital age just how everything seems to be so easily available and accomplished it is even for those sneaky adversaries whose only intention is to compromise the system in any way possible and just for information every single system infrastructure that we use in our day-to-day commute including communications, money dispensers, banks, waste management, cabs, traffic signals, vehicles, electricity, water, health care and well everything is controlled digitally one way or the other. And in an Urban Infrastructure everything will be as easy as a push of a button (no...