wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How secured are you online ?

profile
Sohrab Vakharia
Aug 02, 2017
0 Likes
0 Discussions
492 Reads
This question comes to our mind everytime we do any sort of transaction online. We believe that we are safe as there are companies established to take care of our data. While banking we believe that banks take care of everything. We often believe that if  anything goes wrong then we can contact customer support and will get solutions of our life. Do you really think your are secured? I don't get this statement " staying safe online" . Let me tell you some industrial facts. Now there are security professionals and organisations, giving information security solutions to the companies. When a chief information security officer or a certified information security auditor issues a certificate to the company they conclude the amount of security using a percentage metric. The maximum amount of security promised to any organisation is just 5%. Now well I am sure this will drive you crazy, like hell had fallen upon you. But let me throw more light on it. When it is said that we are 95% insecure, that means there are 95% techniques available for exploiting the security measures. Agreed!! But who really knows these techniques? Do we know? No. I don't think so. As it is said "ignorance is bliss." Truly it is. Less than 2% people staying would know these exploits and hence we feel safe. Amazing!! Isn't it ?  ?? Feel free to drop your queries below.

Comments ()


Sign in

Read Next

social media issue

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Virtual Memory

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Understanding Mobile Device Forensics

Blog banner

Operating System Objectives and Functions

Blog banner

Virtual memory

Blog banner

Dancing Classes In Mumbai

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

File management in os

Blog banner

Interrupts in OS

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Service Operation

Blog banner

"THINGS TO REMEMBER WHEN YOU'RE AT YOUR LOWEST"

Blog banner

Malicious softwares

Blog banner

Direct Memory Access

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

IT service level agreement

Blog banner

Service transition principles

Blog banner

Blog name

Blog banner

Operating system

Blog banner

Dos (Denial of service) Attack

Blog banner

Why Data Security Is Important

Blog banner

Virtualization

Blog banner

Memory management

Blog banner

BrainGate Technology

Blog banner

Deadlock

Blog banner

Mumbai local ......

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Processes : Process description and control

Blog banner

Deadlock and starvation

Blog banner

Mail merge

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Malware

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Types of Threads

Blog banner

Goa Trip With Friends

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

Metasploit

Blog banner

ONLINE NEWSROOMS

Blog banner