Print Friendly, PDF & Email

With increasing transformations in information technology telecommunication, digital transformation of the economy itself, the risk that users across industry verticals are getting exposed to is rising on a daily basis. Discuss the various risks and suggest measures to tackle them.

Topic:  Challenges to internal security through communication networks, role of media and social networking sites in internal security challenges, basics of cyber security; money laundering and its prevention.

5. With increasing transformations in information technology, telecommunication, digital transformation of the economy itself, the risk that users across industry verticals are getting exposed to is rising on a daily basis. Discuss the various risks and suggest measures to tackle them. (250 words)

Reference: Live Mint

Why the question:

With multiplicity in digital technology and services, the risks too have multiplied and calls for enhanced security. The article captures the same.

Key Demand of the question:

To analyze the new risks emanating from the advent of new digital technologies and suggest ways to tackle them.

Directive:

Discuss – This is an all-encompassing directive – you have to debate on paper by going through the details of the issues concerned by examining each one of them. You have to give reasons for both for and against arguments.

Structure of the answer:

Introduction:

Begin the answer by mentioning about technologies ushering in the new digital era and the risk that comes along with it.

Body:

In the first part, mention in detail the major and minor risks posed by the emerging digital technologies. Decentralized security, more bandwidth strain on current security monitoring, building security by design into the manufacturing of IoT devices, need for suitable encryption, Privacy concerns, supply chain issues, traffic integrity, global title leasing etc.

In the next part suggest measures to address the above mentioned risks. Use of use UICC based mechanisms, secure authentication, single sign-on services, data encryption and using Layer Two Tunnelling Protocol etc.

Conclusion:

Conclude with a further way forward.

CategoriesINSIGHTS