Privacy or Security - What matters to you?

Privacy or Security - What matters to you?

Many of us get confused between #security & #privacy and assume that both walk hand in hand. If something is private, it must be secure too OR if something is secure, it definitely must be private too. This is however, incorrect and a misconception.

Security & Privacy are TWO different concepts and each of them must be paid attention depending on how important, valuable and confidential the date is for you.

A leak in privacy may however offer scope to security breaches and a leak in security may deplete the privacy as well. They are dependent in terms of IMPACT however saving both is one of THE most critical and tough task for a professional.

Imagine someone walking naked on a busy street, if the person covers its genitals - security is priority. If the person covers its face - privacy is.

And in an ideal scenario - both must be covered.

=================================================================

There is a price tag to every #ease and #comfort !

The approach of #security by design is highly dependent on the level of #exposure to #risk you got the appetite for.

Here is an example of Truecaller or any other CALL & SMS filtering application.

>I want to save my time that gets wasted in distinguishing between a legit SMS vs a promotional, advert or simply a spam SMS.

>OK, so what do I do?

>I get a #privacy filter. This filter will separate out my SMS into two sections in my phone. One legit, other prospective Ads/Spams.

> Wow! my life is sorted!

> Wait a minute! Did i read it clear what this app is telling me?

No alt text provided for this image

No matter my life will be easy, save time. I may even trust the integrity of Truecaller for a moment that they will not read my messages, they will not misuse my OTPs etc. (believe it for a moment as fictional)

But what if, some vulnerability in the application takes away by valuable data?

The bank account may be wiped out it minutes, identify theft may happen. All with slightest of what? - Ignorance of clicking 'ENABLE'.

You must have heard advice from many, to count & spend with your hands and avoid credit cards. Why elders have been advising us so? Because when we spend each currency bill with our hands we know with our eyes and senses the amount we are spending. We over-spend when the currency gets digital.

On the same parameter, we may be aware and cautious about physical security (nations got army, air-force, navy) all this that for? To safeguard. We FAIL to have that level of seriousness and discipline when it comes to 'digital security/privacy'.

Stay Aware | Stay Secure | Share what you Learn


要查看或添加评论,请登录

??Archie Jackson ??的更多文章

  • Potential Attacks on Satellite Communication

    Potential Attacks on Satellite Communication

    With the LOS (low orbit satellite) internet communication, security professionals must brace themselves with knowledge…

    1 条评论
  • Understanding and Mitigating OTP and CAPTCHA Bypass Techniques

    Understanding and Mitigating OTP and CAPTCHA Bypass Techniques

    In today’s digital age, cybersecurity is paramount. Two common security measures, One-Time Passwords (OTPs) and…

    4 条评论
  • MITRE EMB3D? Threat Model

    MITRE EMB3D? Threat Model

    What is the MITRE EMB3D? Threat Model? The MITRE EMB3D? Threat Model is a comprehensive framework designed to identify…

    1 条评论
  • CISOs, Role that Requires Depth & Breadth both!

    CISOs, Role that Requires Depth & Breadth both!

    I wrote this article in July 2021 My Article in 2021 > Cyber Ready? And exactly 3 years later, today July 2024 there is…

    12 条评论
  • Fight AI, with AI

    Fight AI, with AI

    Fight AI with AI, that’s what Precision AI by Palo Alto Networks promises. Precision AI automates detection…

  • The New Wave Of AI-Enhanced Identity-Based Attacks

    The New Wave Of AI-Enhanced Identity-Based Attacks

    Attackers Leverage Full Identity Lifecycle: By considering the entire identity lifecycle, attackers identify…

  • Is Your Institution, Cyber-war Safe?

    Is Your Institution, Cyber-war Safe?

    In the event of a major global conflict such as World War, it is highly likely that cyber warfare would play a…

  • Adversarial Threat Landscape for Artificial-Intelligence Systems

    Adversarial Threat Landscape for Artificial-Intelligence Systems

    MITRE ATLAS? (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a globally accessible, living…

    5 条评论
  • API Security Best Practices

    API Security Best Practices

    API (Application Programming Interface) is a set of defined rules and protocols that allows one software program to…

  • Harness the Power of Identity Orchestration

    Harness the Power of Identity Orchestration

    What Is Identity Orchestration? A flexible and adaptive integration framework that allows you to easily create identity…

    1 条评论

社区洞察

其他会员也浏览了