Skip to main content

Posts

Showing posts with the label cyber awareness

Data Analysis

Data Analysis . . . D ata Analysis in simple words is a method in which we collect data with the goal of discovering some useful information, informing conclusions, and which can support decision making. For example: when we want to book a flight from one place to another we go to many different websites of different flight companies or booking sites we gather data we see and then analyse their comfort ,their flight duration ,their prices ( this is data analysis ) and we come to a decision from the data we gathered ( this is decision making ) this is the same process as we first gather data we then analyse the data and we make a decision . What kind of Information? I nformation can be of many forms as to what we search ,what type of content we like or we watch ,places we visit ,our photos ,and everything the internet knows about us . What is the threat through data analysis? D ata Analysis is done by bigger companies as well as smaller companies and also each and...

Cryptographic Security

Cryptography . . .   C ryptography the use of codes or ciphers to protect the secrecy of a message or data or any short of communication between two parties or a group of people.The history of cryptography began way back in the medieval period where messages were carved in caves in a way that it was readable to only those who had access to the codes or who knew what those symbols mean. Cryptography has traveled a long journey from   Classic Cryptography   using pen and paper to solving complex mechanical encryption such as the Enigma Rotor Machine .  How Cryptography works? T he modern cryptography or encryption over data is achieved by using algorithms ( cryptographic algorithms are designed to convert letters or numbers or words or any kind of data into an encrypted/decrypted form using a specific key ) . In this algorithm method ,the sender has an algorithm the sender feeds some data to the encryption algorithm as an input and then the sender sets...

CyberAwareness

Cyber Security One of the most fundamental terms used by many practiced by none. We often use this heavy term to designate ourselves with the modern growing digital world.  Every single device in today's world is related to our lives one way or the other each of these devices know our day to day activities as they make our lives simpler as for example we often use Google Maps to find our way around day to day ,we use certain apps that manage our daily activities as they keep a track of our activities on daily basis. Now comes a bitter part if an intruder or maybe someone else get a hand on these apps identifying them as you gets to know everything that app knows about you everything from morning to evening, where we stay ,what we watch , what we do, our credit card details and many more.  In this digital age things have been a bit easier no doubt but at a big risk . Being secure in the digital age is very essential .Being a part of this day to day digital age we ha...