Login to Your Account

Free Recharge

  • What will you do to secure your data from Data theft and cyber crimes

    It seems that man has overpowered the technology, there seems no ending in the advancement in the field of science. Looking at the pace of development for the last half century, we can't even imagine where will we reached in the next half century. And no doubt with this advancement, face of crime has also started changing, the news of hacking and other cyber crime has been increasing day by day.

    In the world of technology where the data is the heart and soul, if the cyber crime continues at this peak there is no where we can reach, the future of us will be shattered in the dark. Well, taking about about the data security and its future, Shri Mithileshwar Thakur is presently posted as Additional Director General in the Directorate of Anti Dumping and Allied Duties at New Delhi has written beautifully, the following is the original form of the article as published in the indianbureaucracy

    The importance of data in our modern day lives, particularly in the context of the criticality of the role it plays in decision- making, can hardly be over-emphasized. Wrong set of socio-economic indicator data can lead to incorrect & unsound analysis, faulty diagnosis and consequently an entirely misdirected public policy prescription having enough potential to play havoc with the governance.

    Technology has always been a double-edged sword. Most glaring example of this is digitisation of data. While digitisation has made accessibility of data far easier for common citizens, it has also ended up increasing the risk of its vulnerability to theft, tampering and manipulation.

    Data theft and cyber crimes have become an everyday affair. Hacking is not only not uncommon but also an object of fancy and fashion among high-tech miscreants. The online availability of plethora of hacking tools has made things worse. Vast majority of Fortune 500 companies (roughly 97-98%) is said to have been hacked with the rest being unsure and uncertain. No computer network can possibly claim to be 100% safe and secure, with new definitions of viruses multiplying every passing day outpacing the R & D efforts of anti-virus software giants. Most of the reputed companies , agencies and entities therefore employ ethical hackers in an effort to develop counter-defense mechanisms to guarantee protection against system and data security breaches . The disturbing news however is that present day anti-virus softwares are reportedly capable of detecting roughly 5% of the newly created viruses only. This is reason enough to sound alarm on the vulnerability of stored data .

    In this digitally evolved world, any virtual attack on the impregnable digital barrier of the sensitive and supposedly protected websites of any sovereign nation is much more damaging and demoralizing than the attack by the enemy country across its physical boundary. India, being the biggest platform of data outsourcing, needs robust data protection mechanism to deal with the threat. The awareness with regard to data security and data privacy in our country is somehow not of the desired level .

    This menace can be handled at two levels: one at technological, the other at legislative level .

    India does not have any separate law exclusively designed for data protection. However, Indian courts have interpreted ‘data protection’ within the ambit of “Right to Privacy”as implicit in the Article 19 and 21 of the Constitution of India. Data protection issues nonetheless get adequately addressed by Section 43 A and Section 72 A of The Information Technology Act 2000.

    Technically, data security concerns can be tackled by implementing tiered data protection and security model including multiple perimeter rings of defense to counter threats, employing logical security –i.e. combination of data encryption, authorisation, authentication and passwords, , use of firewalls, anti spyware and virus detection programs on servers and network-addressed storage systems We can and we must use our enormous prowess of software technology to create impregnable firewalls, uncommon encryption codes to beat hackers in their own game and even use our technological superiority to export this technology to the rest of the world .

    You can add us to your circle on Google+, follow us on Twitter, join the photo community on Pinterest, or like our Facebook page to keep updated on all the latest news.