Posts

Showing posts from June, 2022

Student Idea

Image
 Student Idea (B2C, 2022) Data security and privacy, The features of these services are hard for users to anticipate on their own the threads and protect their own data. Therefore, users cannot protect themselves from outside access. This means users do have specific expectations from software/services for data storing and sharing.  The expectations mentioned can be found in the "General Questions Analysis" on my blog.  Also, the suggestions of people who use these services and software for data storing and sharing on daily basis are on the same blog mentioned. Reference(s):  B2C, 2022. [online] Available at: <https://www.business2community.com/tech-gadgets/establishing-the-strength-of-your-businesss-cyber-security-0420017> [Accessed 8 June 2022].

Gantt Chart Update

Image
GANTT CHART UPDATE  

Academic Paper Summary

 Academic Paper Summary Privacy and Security of Personal Information To address the issue of personal privacy, several technological solutions have been offered. The identity of an individual can be separated from the rest of the information given during a transaction in practically any circumstance imaginable - while making purchases, browsing the Internet, responding to surveys, or doing medical testing, for example. Companies built on those technologies, on the other hand, have struggled to reconcile the interests of the numerous parties involved in the privacy equation, ultimately failing to win widespread adoption. While many people are concerned about the privacy and security of their personal information, economic incentives have not resulted in widespread adoption, and government intervention has increased companies' responsibilities for collecting personal information without determining their liability for data misuse. It appears that "selling" privacy is more d...

Software Examples

Image
Examples The examples given are aiming the same objective as Files.com and have similar functionalities. Which are, storing, sharing, securing, and minding users' privacy. 1-Acronis Cyber Protect (ACP, 2022) -Anti-malware and antivirus        -Continuous data protection -Fail-Safe patching                       -Global threat monitoring and smart alerts -Forensic Backup                               -Data compliance reporting and data protection map -Safe Recovery                                    -Global and local allowlists from backups (ACP, 2022) 2-FIREEYE       (FIREEYE, 2022) -Security information and event management (SIEM)     -Security orchestration, automation, and  ...

Software - Evaluation & Functionalities

Image
 Files.com (Files.com, 2022) Files.com is available on all platforms. (Files.com, 2022) You can put your files in folders. Furthermore, store them in categories. (Files.com, 2022) Personalizing the files and folders in matters of importance or like. (Files.com, 2022) Functions for the files and folders. (Files.com, 2022) Managing folders and categorizing.  (Files.com, 2022) Sharing your files and folders. Reference(s): Files.com, 2022. [online] Files.com. Available at: <https://www.files.com/docs/features/files> [Accessed 7 June 2022].

Software (Overview)

Image
 Files.com (G2, 2022) Files.com is a cloud-based MFT file transfer platform that allows people, teams, and businesses to securely share and move files (B2B). Files.com is a one-of-a-kind solution that combines the basic benefits of FTP software with the security and automation of MFT software (SA, 2022). Reference(s):  G2, 2022. [online] Available at: <https://www.g2.com/products/files-com/reviews> [Accessed 7 June 2022]. SA, 2022. [online] Available at: <https://www.softwareadvice.co.uk/software/88282/files-com#:~:text=Files.com%20is%20a%20SaaS,file%20transfer%20(MFT)%20software.> [Accessed 7 June 2022].

Primary Research Questionnaire - General Questions Analysis

Image
 General Questions Analysis Software(s) used on a daily basis According to the chart above showing the applications used on daily basis, Whatsapp is the most common application used, whilst Google Meeting is the least used application. Other than Whatsapp, Instagram, Teams, and Discord are applications mostly used on daily basis. Services used for data storage and share According to the graph, it can be said that people mostly use Google Drive and iCloud for data storage and sharing. Other than these two, people also choose to use a hard disk drive. Privacy and Security of Data While 40% of the answers show that four people do worry about their data security and privacy. However, while the other four are not worrying about it, the rest two have never thought about it. Worries? According to the chart, people do mostly worry about "Data Loss in the cloud". Furthermore, "Lack of Control", "Accidental exposure", and "Companies trading your personal data...

Primary Research Questionnaire - Demographic Questions Analysis

Image
 Demographic Questions Analysis AGE  According to the pie chart graph, that we got from the question "How old are you?"; 10 people have answered the question, and as a result, we can spot that there is no one "Under 15". This is also expected because the questionnaire was only shared with classmates and some close friends. 6 people from the "15-20" age range, one person from the "21-25" age range, one person from the "26-30" age range, and two people from "31 and over". SEX According to the "SEX" chart, there is only one female person that answered my questionnaire. That is also expected because we have only one female person in our class. The rest (9 people) are male. Education Status From the "Education Status" chart, we can see that there is quite a range of people answering the questionnaire.  Numbers are:   Collage (4) A-Level (2) Undergraduate (3) Postgraduate (1) The answer range being large is mostl...

Primary Research Questionnaire (Google Forms)

Research Questions  Demographic Questions:     1 - How old are you?      2- Your gender?       3- Your education level/status?          Research Topic Related Questions:     1- What software(s) do you use on a daily basis?     2-What services do you use for data storing and sharing?     3-Do you worry about your data privacy and security while storing them in services?     4-What are your worries? (Optional)     5-Do you ever hesitate while storing your important personal data?     6-What are your concerns? (Optional)     7-What are your expectations from the storing and sharing services?     8-Have you ever confront a data securing problem with software?     9-What was the problem you came across? (Optional)   10- Do you have any favorite software/service for data storing and sharing that you would suggest to others?  ...

Diagram 2 - LifeLock by Norton

Image
  LifeLock by Norton LifeLock protects you from identity theft by constantly monitoring your personal information for evidence that it has been stolen by a hacker or someone else. It offers services such as Social Security Number alerts, data breach notifications, restitution for stolen monies, credit monitoring, credit file locks, payday loan checks, and more (USN, 2022). (GAPfcu, 2022) LifeLock is a member of the Online Trust Honor Roll and has teamed with Norton, a provider of digital security software. LifeLock monitors significant data breaches, credit reporting agencies, and the dark web to alert you if your information has been compromised (ConsumerAffairs, 2022). (Norton, 2022) Reference(s): ConsumerAffairs, 2022. Top 710 LifeLock Reviews. [online] ConsumerAffairs. Available at: <https://www.consumeraffairs.com/privacy/lifelock.html> [Accessed 6 June 2022]. GAPfcu, 2022. LifeLock-with-Norton-Logo_black - G.A.P. Federal Credit Union. [online] G.A.P. Federal Credit Unio...

Diagram 1 - GNU Privacy Guard (GPG)

Image
 GNU PRIVACY GUARD (GPG)    GnuPG encrypts and signs your data and conversations and includes a flexible key management system as well as access modules for a variety of public key directories. GnuPG (GPG), is a command-line utility with features that make it simple to integrate with other applications (GnuPG, 2022). "Arguing that you don't care about the right to privacy because you have nothing to hide is no different from saying you don't care about free speech because you have nothing to say" (Edward Snowden) (gorodche, 2022) Encryption protects your privacy and the privacy of others with whom you communicate. Encryption complicates the life of bulk surveillance systems (GnuPG, 2022). (gaw, 2022) Reference(s):  gaw, 2022. [online] Available at: <https://www.goanywhere.com/managed-file-transfer/encryption/gnupg-gpg> [Accessed 6 June 2022]. GnuPG, 2022. The GNU Privacy Guard. [online] Gnupg.org. Available at: <https://gnupg.org> [Accessed 6 June 2022]. ...