Management Blog 005: Protecting Your Personal Information Online


www.kgga.co.ke


EXPERIENCE-BASED CYBER SECURITY

The advancement in technology has brought a lot of changes in our lives. It is something inevitable since we cannot stop time from running fast. If we do not go with the flow, we will be left behind. Our chances of success are slim because almost everything now runs online with a computer. From the simple procedure of securing our mobile phones to the more complicated verification process when opening a bank account, we could say that despite the security measures being initiated, we are still prone to fraud and misrepresentation. In this article, we will try to create a picture of what the title is all about.

SECURITY FEATURES OF MOBILE PHONES
     The PERSONAL UNLOCKING KEY (PUK) -  When a subscriber buys a phone and a SIM card for the first time, you will notice that there are portions in the kit that can be scratched with your fingernails. These are the two personal unlocking keys which you will use when the network totally blocks your signal because of three wrong attempts in entering a password. Network computers detect that the phone might be stolen or is in the hands of the owner but totally committed the error of remembering the password.

     PASSWORD PROTECTION. A mobile phone is a personal belonging and there could be personal and confidential messages or contents inside it. To avoid intrusion, the user generates a password for his protection. This should always be remembered for easy access.

     PATTERN PROTECTION. A series of dots to be connected using a registered pattern. A red color indicates that the pattern is wrong while a green one signifies accuracy.


SECURITY FEATURES ON BANK TRANSACTIONS

     THE VERI SIGN -  This is a common symbol telling a client that he is in the bank’s secured and genuine website and any personal information given will remain confidential. It is a certificate signifying the authenticity of what is being shown on your screen.

     ATM PIN -  A series of four or six numbers which will serve as personal identification number in doing balance inquiry or cash withdrawals. Prior to getting your automated teller machine card, a bank personnel will ask you to enter the PIN number twice which will be virtually  generated for your added protection.

      COMPUTER GENERATED SIGNATURE SPECIMENS.  A bank client has to sign a paper signature card and a computerized signature file. This signature will be verified once you make a check deposit or cash withdrawal.


ANTI-INTRUSION ACCESS TECHNOLOGY

     ADMIN PASSWORD. This is a security feature placed on computers with high classified information. The purpose is to prevent unauthorized copy or download of confidential files .

     SWIPE ACCESS CARDS. Offices of senior personnel handling very sensitive documents or files are installed with computerized doors in order to prevent unauthorized access.

     IRIS SCAN AND BIOMETRIC SECURITY. The eyes are read by lasers in order to identify who will enter a secured office or facility. Likewise, fingerprints are also used to identify an employee of a company.


Comments

Popular Posts