"Data Piracy is threatening Data Privacy".Information security starts with the CIA Triad-sounds more like mafia and counter-espionage jargon- is the bedrock of the cybersecurity edifice.CIA stands for Confidentiality, Integrity and Availability encompassing the entire gamut of Information security. Consider the following examples and contemplate on these real-life threats faced by all of us:
1)TWITTER SAYS 130 ACCOUNTS WERE TARGETED IN A MAJOR CYBER
ATTACK OF CELEBRITY ACCOUNTS TWO DAYS AGO SOURCE: BBC 17 JULY 20
2)MARRIOTT INTERNATIONAL NOTIFIES GUESTS OF PROPERTY SYSTEM INCIDENT SOURCE:
HTTPS://NEWS.MARRIOTT.COM/NEWS/2020/03/31/MARRIOTT INTERNATIONAL NOTIFIES GUESTS OF PROPERTY SYSTEM INCIDENT
3)Computers containing data relating to national security and VVIPs like Prime
Minister Narendra Modi were compromised in early September after
a security breach at the NIC (National Informatics Centre), Delhi Police
sources have said.The computers affected also stored data relating to National Security Advisor Ajit Doval, Indian citizens and senior government functionaries
There are Emotet Trojans, Email hacking,Rogue IoT devices, hacked admin passwords, stealth drones, compromised employees, even Central bank hacking, Pentagon data breach etc. etc. are happening all over the place. They pose risks of all kinds including an unimaginable quantum of funds being siphoned off which remain untraceable.
There are millions of people who are active in the Dark web and create this havoc in our real life on a day today. But cybersecurity has emerged as the foremost priority of any country, organisation or anything to do with the organized white web, which is legal,confidential and safeguards the sovereign interests. More so when it comes to individual data security and privacy. The fundamental right to existence of any human is threatened if his information security is breached and pirated.
As a result the Central Govt is keen on legislating GDPR(General Data Protection Regulation) Act similar to the EU GDPR and if all goes as planned this Act may become a reality during this year winter session of the Parliament.
Gartner has come out with the above trend with respect to Emerging Technologies which are likely to complicate and disrupt the Information security scenario.
In order to make the Cybersecurity robust National Institute of Standards and Technology has come out with a detailed Cyber Security Framework considering the ISO ISMS 27001:2013 standards.
In short, all the stakeholders of our economy must endeavour to protect their data and privacy with a robust framework and protect their passwords as they are the keys to the door to their individual privacy and prosperity.
Health is Wealth - the maxim remains true always. However, today the Health of Your Wealth in a digitalised world , depends on robust Cyber Security.