Physical security threats We know that physical security is the primary and foremost important while we talk about security. There are many threats in physical security that one needs to understand and mitigate. Mitigating physical security threats, individuals or an organization needs to take certain unavoidable steps. A few [...]
About Shishir VaidThis author has not yet filled in any details.
So far Shishir Vaid has created 22 blog entries.
Physical Security When we talk about security, physical security is one of the important and most vulnerable types. Physical security is the protection of assets which are visible and actions that may cause damage to invisible assets. Physical assets are referred to as human, IT assets, furniture or anything [...]
We know that mobile networks are going to play an important role in digitalization. First of all, mobile networks are to provide the strong backbone, similarly, the enterprise will take an end to end lead. Realization towards IoT potential by enterprises will actually help with the exponential growth of [...]
Mobile networks are going to play a major role in the world leading to digitalization. Role of mobile networks toward IoT is to provide strong backbone where an enterprise is going for an end to end lead. IoT opportunity in the automation industry A recent study shows that the [...]
As IoT opportunities, IoT devices are ready to lead the category of connecting devices by 2018. This category was earlier lead by mobile phones. A study estimates the great potential economic impact of approximately $11Trillion using IoT devices by the year 2025. IoT opportunities are going to impact with [...]
Cyber attack is a result of a vulnerability to social engineering. In other words, it is a type of attack by cybercriminals, from one device to another or many devices in that network. Such cyber attacks are, with an intention to attack and gain an access to information, either [...]
Social Engineering is another term that is used in the Information Security domain. It refers to the several activities resulting in frauds that are carried out, through human interactions. In other words, it is another way of manipulation, as a result, people share their confidential information with the source. [...]
Does this term "human firewall" sounds familiar to you? Does "human firewall" carry any relation with respect to "network firewall"? Is "human firewall" really required? If yes, how is it important and helpful in our everyday life? These are a few out of many probable questions which may come [...]
Does the term "Juice Jacking" sounds familiar to you? If no, then let us understand what does juice jacking mean and how does it relate to you. In this hi-tech world, we are very much dependent on the gadgets like smartphones, tablets etc. These gadgets play a major role [...]
After understanding what is Robot, fears towards digitalization in broader sense and interlinking of technology & humanity, let us discuss fears in detail. Common fears towards digitalization: A robot is an Artificial Intelligence learning device and may learn to act badly. Penetration towards private information by hackers. Spying on [...]