| |February 20189enabled through anonymous authentication and data security but it depends on a more sophisticated understanding of privacy and a deeper trust in technology. For example: a traffic service provider needs to know the speed and position of the car, and whether the data is authentic, i.e. coming from an actual car and not a hacked source. The traffic service provider should be able to perform these tasks without being able to figure out the car owner's name or even the car model.The society has gotten accustomed to this data revolution very quickly. Data has become their addiction and they use it to deal with their daily issues. We all are a part of this data stimulated society and we perceive it for a long-term use, from individuals to private citizens to organizations and governments everyone is intact, so our success depends not on hiding it but understanding it.We should understand that privacy is a phenomenon, with diverse interpretations across communities, countries and cul-tures. Ideas of appropriateness vary widely, as do people's expec-tations of how their data should be used. This complicated con-cepts of universal ethics in deal-ing with data, and makes it much more crucial for governing bod-ies to craft regulations that care-fully consider these sensibilities.With technology being devel-oped to make internet more reli-able and secure, the NASSCOM report suggests that in next 10 years, the IT economy in In-dia will be USD 350 billion, and 10 percent of that will be the cyber security pie. In this modern age where people can-not survive without reticula-tion and webbing, data plays an important role in their lives. This utility must be taken seriously and assuring security of the private information should be a priority. The automotive eco-system -- transporta-tion and government, semiconductor compa-nies, car OEMs, tier 1's, insurance companies, law makers and others -- must collaborate to ensure that system-level standardized approach-es and privacy and security standards are adopted.Security requires keeping one step ahead with the latest cryptographic techniques and delivering the best security solutions in both hardware and software. As more devices connect to the network, cloud and to each other, we are provided with new opportunities to make our lives easier, adding value with increased functionality and intelligent services. This connectivity requires more computing and security to ensure reliability, safety and quality. But the pieces of this technology puzzle are coming together in order to embrace the IoT sooner than expected.Considering the security vulnerability, the question is, are we ready for it? C ISECURITY REQUIRES KEEPING ONE STEP AHEAD WITH THE LATEST CRYPTOGRAPHIC TECHNIQUES AND DELIVERING THE BEST SECURITY SOLUTIONS IN BOTH HARDWARE AND SOFTWARE
<
Page 8 |
Page 10 >