![]() Just as we live in physical houses, our computers, tablets, and smartphones are the homes of our digital selves. However, remember, analogies highlight certain aspects of these complex ideas, so be sure to search for further resources for more information. (Yes, we see the irony…) We hope the analogy will help you understand the fundamental differences between a few key concepts: privacy, security, and information security. Now that we’ve established that not all analogies hit the mark, let’s dive into one that we’ve come up with at Tresorit. Not to mention the problems around pervasive ad targeting. For example, the above can’t address social media being both a platform for fighting authoritarian regimes, and for spreading misinformation and destabilizing countries. The problem with analogies is that they generally highlight one side of complex phenomena. It’s even a tradition in some places… looking at you Speakers’ Corner. But the truth is there have always been people randomly shouting ideas in the middle of the street. We’ve all heard the classic “posting on social media is like shouting your ideas at strangers in the middle of the street” parallel. Taking habits out of the digital world and finding real-life parallels can also highlight just how absurd the things we do online are. The analogy problemĪnalogies are great for making technical concepts easier to understand. A slip of the tongue (or keyboard) is common even in our offices, and we work in the space. Information security, (cyber) security, and privacy are concepts so interconnected that it’s easy to get them mixed up. Security, privacy, and information security – Protecting personal information in 2022
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |