As our dependence on electronic devices increases, from ordering food to paying bills and hailing cab services and making use of online maps to travel to different destinations, the unseeing eyes are also following us everywhere tracking our every move.
We all know of GPS tracking when hailing a cab but did you know that you are being tracked at all times? By having the smartphone with you at all times, with the ‘Location’ being turned ‘on’, every move is being tracked. Some might not worry about this constant tracking by strange individuals, but I do think that it is necessary to know all the possibilities that are present before forming our own conclusions about them.
It is quite a possibility that you will be using ‘Google maps’ for taking you to different places and you might be signed onto multiple devices using the same ‘gmail’ account. While, it looks perfectly harmless and seems that your life is getting simplified in every way in this electronic era – the reverse is unfortunately true.
How you are being tracked:
As an example, sign into your Google account and click on ‘Maps’ in the right hand corner. Once inside Google Maps, click on the menu and pick ‘Your timeline’. Now, you can see all the places you have visited in the last couple of years! You can also see the time of visit, the duration of visit,the latitude and longitude of the places that you visited! In addition, all these details are visible for a prolonged period of time too!
You might have visited 100 places over a period of 5 years and chances are all of them might be listed right there on the screen! You may have forgotten where you went in October of 2017, but your device and ‘Location history’ does not forget!
So, what can be done?
If you would like to delete all of your location data and prevent your location from being saved in the future, follow the steps below:
Once this is completed, your Location history will neither be visible to you or anybody else(at,least for some time!) In today’s age, with so much information and power in our hands, it is up to us to do all the homework and control the data that is exposed to the outside world by disabling the various settings.
Like any other system, the global economy is susceptible to failure at many different points. Unfortunately, due to the interconnectedness of the world, an economic crisis in one country could have disastrous consequences for other countries. This was the case during the United States economic crisis of 2008 in which the stock market crashed.
Economic collapse on any scale usually happens as a result of disparities in the system that can easily be overlooked in the absence of clarity. However, blockchain technology could help avoid a financial crisis due to its transparency, security and decentralized mechanism. Cryptocurrencies such as Bitcoin are powered by this same technology which acts as a ledger for all transactions carried out on a network.
The endless benefits of the technology have attracted countless investors over the years. Now, it is fast becoming an addition to every major corporation, from IBM and Mastercard to Nasdaq. Its properties are also attractive to financial institutions which constitute the industry that is most in need of the benefits it provides.
The financial crisis of 2008 caused by a lack of transparency, greatly impacted various significant financial institutions and economies on a global scale. Blockchain technology affords banks full transparency, allowing them to spot such a crisis from a mile away. This way, they can take the appropriate preventive measures to ensure that it does not happen again. Banking authorities must make an effort to study the technology and better understand how it can be a force for the prevention of the next financial crisis.
The economic crash of 2008 was the worst economic disaster in the U.S. and the world since the 1929 Great Depression. The crisis caused a great recession after the cost of housing fell by 31.8%, even lower than that of the Great Depression. Although the crash occurred in 2008, the first signs were observed in 2007 when the prices of homes were too high.
As a result, homeowners began to default on mortgage payments, leading to a downward economic turn which spread to the U.S. financial sector and eventually affected other countries. At the time, houses became extremely cheap, and homeowners were given loans worth up to 100% of the value of their new homes. Taking advantage of the profitable real estate sector, banks also made investments in subprime areas.
The affected institutions stretched from investment banking corporations to commercial banks, insurance companies, and lenders. The situation was so bad that financial institutions had to lay off their staff. Apart from financial institutions, the crisis affected individuals and businesses that were reliant on credit payments at the time. The economic disaster led to massive suffering on the part of businesses because banks stopped giving loans out. They did not trust anyone to pay back the loans due to the state of the economy.
Shortly after the crisis began, the American auto industry was on the edge of destruction and pleaded for a federal bailout. Unfortunately, banks were in the middle of damage control and bailouts were nearly impossible to get. Globally, share prices plunged, and the recession trickled down to other countries.
By the end of the year, most countries in the world including Germany, Japan, and China had gone into an economic recession as well. According to the National Bureau of Economic Research, the great recession had begun in December 2007, making it the third longest recession in the country since World War II.
In Europe, investors who had been involved with real estate securities in the U.S. took a hard hit. The same could be said for investors in smaller countries. However, China and Japan were able to escape that situation but registered huge losses where export was concerned. Their American and European markets were experiencing a fall in demand due to the recession.
Developing countries that depended on foreign investments for growth capital also lost their markets and investments. Since the largest countries were in a recession, the situation became a hopeless one with no chance of an easy recovery. Two years after the end of the recession, the unemployment failed to fall below 9 percent.
Banks are looking to use blockchain technology because its transparency can reduce the issue of financial losses that stem from a lack of it. There are three major ways in which the banks hope to achieve this:
When banks have a bird’s eye view of all the financial transactions within an economy, it is easier to find discrepancies and adjust them. Due to the immutability and append-only function of a blockchain, it is easy for banks to keep open records of transactions that can be tracked easily.
Tracking cash flow can help institutions find and mitigate economic threats that may arise due to bad policy and bank operations. Using this technology, the banks can determine whether a financial institution, including shadow banks, requires support or control.
Another way that blockchain technology promotes financial security as a way to prevent an economic crisis is by providing access to information. With this information, these institutions can determine risks and potential points of failure within the system. It can also clarify the effects of various monetary policies and help out in the gathering of statistics for research purposes. Generally, if the banks have more information, then they can perform better and cut the costs associated with running separate systems as opposed to a single blockchain.
Banks can prevent fraud and bad debtors using smart contracts and digital cryptographic identities. Each institution can create smart contracts between the customers and banks, as well as between the banks and the central bank. This creates an immutable record of the exact terms of the contract and will only execute when the terms are fulfilled. Banks can also avoid loan fraud by using digital identities to find out the loan history of each customer, drastically lowering the chances of bad debt in the process.
The use of a cryptographic ledger ensures that stored information can only be accessed using cryptographic keys which are usually in possession of the owner of that information. A hacker would have to compromise every single system on a network to break such a system. This makes blockchain a secure way to store information.
According to the People’s Bank of China, shadow banking falls into three main asset classes– entrusted loans, trust lending, and banks’ acceptances — which saw a $555 million increase in 2017. Using blockchain technology, banks can eliminate shadow banking since all transactions will be recorded.
The financial crisis of 2008 left many nations utterly devastated. The trickle-down affected various sectors even outside the financial sector, resulting in a near collapse of the economy. However, the world moved on from the effects of that event, and most countries have been able to pull themselves out of recession. However, it is essential to take measures that ensure that the crisis is not repeated.
For banks, the best bet may be the use of blockchain technology to securely store data, access information and ensure transparency in the system. Used properly, it can serve as an open system in which all transactions within the economy are recorded. With a clearer view of all banking processes, banks and other financial institutions can successfully prevent another economic crisis.
This article originally appeared on Mintdice.com
When I first got married and moved to the US(several years ago! :)) I hardly knew what ‘Halloween’ was. All I knew was kids were dressed up as ghosts and goblins and asked for treats(and that is all I know today, too! ;)) Fast forward, to today – Oct 31st, 2018 and we are celebrating Halloween in Bangalore, India too! I thought I was done celebrating Halloween for my kids once we moved out of US! But no – we celebrated it from the very first year we moved to Bangalore, India and no one was unhappy! 🙂
And so, to answer my title question, yes, Halloween is celebrated in India! – with the usual tricks and treats! 🙂 But of course, not all of India celebrates it – only the bigger cities of India which are the melting point of different customs and cultures celebrate it.
How do we celebrate it here?
It is a similar celebration as in the US. There are stores that start selling Halloween costumes and masks well in advance of the Halloween day. The entire Halloween preparation is exciting for the kids. While we don’t have explicit pumpkin patch visits and pumpkin carvings – we still do the other fun things! 🙂
Kids deciding the costumes, picking them up, buying candy are all the same fun things as in the US. The marked difference is the weather in Bangalore, India is not that chilly as in Detroit for this time of year.
The kids go trick or treating in their respective communities and some communities like ours have close to 400+ flats and one can imagine the amount of treats from all the houses!
The city of Bangalore boasts of Halloween parties for adults too. There are ‘Spooky Halloween Hip Hop night’ and ‘Halloween Vibes’ as you can eat and dance the night away!
Did I ever feel I left the US?! 🙂
It is a reality that the cyber security landscape is rapidly changing everyday. New threats emerge constantly and what was true 5 years ago might not be true today. In this reality, it is important to re-skill ourselves constantly.
Living in a hyper connected world, we are constantly signing into systems to access different types of information. Unauthorized individuals should never be able to access our resources. How can this be done? By the very basic and fundamental concept in Information security – ‘access control’.
What is Access control and what are the different types?
Access control ensures that only authorized individuals can access appropriate resources. Physical access control ensures that physical resources like specific rooms, buildings are accessed by appropriate people.Logical access control ensures that resources like networks, files are accessed by appropriate people.
We observe the principles of ‘access control’ all around us unknowingly. When we share a post on social media platform, we set the permission to ‘public’ or ‘private’ or ‘Friends’ as the case may be. This makes sure that the post is visible only to necessary people and not all.
The simple example of checking email can also be mentioned here. The correct combination of username and password authenticates the user to access his resources (email, in this case).
The different stages of access control are:
‘Identification’ is done by providing the user with a unique id number, username or account number. ‘Authentication’ is done by providing the password or personal identification number. This correct combination of username and password reiterates the fact that the user is in fact “who he claims to be”. Once the user has been authenticated, the user next has to be authorized to access the resource. The ‘access control matrix’ is checked to make sure that if the user is the “person” authorized to access the requested resource. This is “authorization”. Finally the user is “accountable” for all the actions taken. To ensure accountability, user’s login information and subsequent actions are noted.
Now that we have seen what is meant by ‘access control’ – we see the different access control models. There are three main types of access control models and they are discretionary access control, mandatory access control and role based access control. Every organization has different business objectives. The type of access control to be implemented is entirely dependent on its objectives as well the culture of the organization.
Discretionary access control:
Before we discuss the different access controls, we see what is meant by a “subject” and “object”. The “subject” is the one that is making the request for the resource and the “object” is the resource itself. In discretionary access control model, he who creates the information is the “owner”. The “owner” can decide who can access which data. Recall, that this is authorization. This is normally implemented by “access control lists” or ACLs. ACLs are specified by the system administrator and enforced by the operating system. The majority of the operating systems such as Windows, Linux and Macintosh systems are DAC based.
Mandatory Access Control:
The ‘mandatory access control’ is much more structured and organized than the DAC. In this type of access control, the operating system has the final say on who can access which resource. Users have security clearance (secret, top secret, confidential) and data is also classified in a similar way. The clearance and classification are stored as ‘security labels’. When a user makes a request for a resource, it is dependent on the clearance of the individual, the classification of the data and the security policy of the system. This is enforced by the security officer and implemented by the operating system. This type of access control is used where security is of utmost importance. Normal DAC systems will not be suitable when the need is to classify data of special security clearance. We need MAC systems with special operating systems to enforce the rules.
Role based Access Control:
Role based access control or RBAC is also known as ‘non-discretionary access control’. In Role based access control, access to a particular resource is governed by the “role” an employee is mapped to. This type of access control is tougher to configure as the organizational policies have to be translated to roles. For example, an employee in “HR” does not need access to resources in “payroll”. RBAC is easy to configure when the employee turnover is high. When “Sam” from “Finance” leaves the organization and “Wendy” joins, “Wendy” is just mapped to “Finance” and she takes the same roles and responsibilities as the previous employee. There is no additional configuration needed here.
Access control is the basis of many topics and the RBAC model forms the basis of many identity management solutions.
We saw a very small portion of a fundamental concept in Information security. Join me as I uncover more!
Harris, S. All in one CISSP. In S. Harris.
She could never get her eyes open in the morning. Try as she might, once the sun shined, her eyes wanted to keep shut. In her childhood, her mom would wake her up in the morning and she would doze right back to sleep savoring those extra special moments of happiness. Who would really get up so early at 6:00 a.m. was her greatest thought! She could sit all through the night along with her father and they would have great fun watching television together. She was the typical “night owl” who was extra productive at nights too.
Years rolled by and she had to change her ways for sometime at least. Obviously, college and work will change any person. And a night owl could not be a “night owl” forever. She soon got married and life was running smoothly.
Few months into the marriage, she figured that her husband was an “early riser” and was amusedly shocked! 😉 He could get up by 4:00 in the morning and go about his chores happily…:) Going to gym, responding to emails, calls in the morning, anything and everything before the sun was up was his policy. She shuddered at the thought of getting up at 4:00 a.m. or the “middle of the night”, as she called it.
Slowly, she felt her nocturnal habits returning and both the husband and wife were working at the opposite sides of a day… A ‘night owl’ vs a ‘early bird’ – they were a match made in heaven!! 🙂
In all the years that they have been married, there has been one thing that has puzzling her all along though. She really wasn’t sure what exact time, he got up … was it 3:30 a.m. , 4:00 a.m. or 4:30 a.m. Sometimes, he stated a later time to keep her early rising queries at bay(otherwise, she would gasp with “You have got up so early?!!!!! and spread the good news all around to families and friends!!)
She always thought “I wish an alarm would ring loud and notify me whenever my husband gets up”!! 🙂
If you liked this post, rate it! 🙂
It has been a while since I wrote about my US-India stories, right? 😉 The US is always a dream country for many from India. The ‘H1B’ visa is the highly sought after visa and is one of the most popular work visas to the US. It is primarily used by companies to fill positions by employing skilled foreign labor.
Every foreign worker(eg. Satya Nadella, Sundar Pichai) in the US would have gone through the H1 visa grind. Most individuals who come to work in the US, start off with the H1 visa and if all goes well, move onto apply for the Green card or permanent residency. Five years after one has acquired the GC, one can apply for US citizenship.
So, where does H4 visa fit in now? H4 visa is the dependent visa to H1 visa issued by the US immigration service. The spouse and the children of H1 visa holders are issued H4 visas.
During my entire stay for 14 years in the US, I have noticed it is mostly the wives who are on the H4 visa. I am sure you are thinking what is the “woe” related to this visa… it is just that individuals on this visa do not have work privileges and that might be bummer for many…(there is a reason behind it)
While many are excited to just join their husbands on their American journey, the H4 visa women’s career comes to a grinding halt. Most(if not all) are very well educated and highly experienced women who cannot work because of their visa status. The H4 visa wives unfortunately go from active workplace leaders to waiting- to- work professionals. It is a frustrating experience for many as they try and polish their resume with new skills. They also learn to drive on American roadways all along thinking that they will work some day.
So, what happens next?
Many like me find work sponsorships. Others, wait till their husbands get their green card(after which both husband and wife can work) which used to be a good 5 years when we were there(but not sure how long it takes now)
Some even seek US higher education and manage to get a work visa after that. All in all, it is quite a game of visas and waiting for the woman who moves in behind her husband. While many adjust to the waiting game there are others who think their career would have been better in India after all…
In the wake of the Facebook data breach that supposedly compromised 50 million accounts and other personal data last week, it is but imperative to look at yet another aspect of ‘Information security’ – ‘Single sign on’.
What is ‘Single sign on’?
Remember, the time when you discovered a new website or app ? You had to register to get into the site. You were presented with these options:
‘Continue with Google’
‘Continue with Facebook’
in addition to a lengthy sign up process. In a hurry to understand what the new craze was, you just signed in with your ‘Facebook’ or Google account information instead of going through the whole signing up rigmarole. This is ‘Single sign on’ wherein by just signing into Facebook or Google, you can access many other apps and sites with ease.
What is the downside of ‘Single sign on’?
It seems to be such an easy thing to do – just sign in with one account and we can access so many other sites with ease. So, what is exactly the problem? If you have signed into multiple accounts using Facebook or Google, when the main ‘sign on’ site gets hacked, it is quite a possibility that the other apps that use ‘Single sign’ on method of being authenticated would have their data breached too.
So in essence, you are exposing the data related to all other apps to the hackers too!
How do we ensure the safety of our data in the wake of the breach?
Since there is nothing that is simple and easy in this world, single sign on comes with its own troubles. In case of the Facebook data breach, you would have definitely received appropriate messages and notifications if, your account was indeed hacked. In addition,it is good to always:
These security tips will hold good for some time before the next breach occurs!
No sooner had I written about maintaining a ‘minimum online presence’ on my Hacking post, I had several comments relating to that(either, ‘it was not possible’ or ‘how do we that’) While it is next to impossible to grow a business or forge business relationships without a good social media presence, it is also imperative to reveal only what is needed. In this post I will discuss what I meant by ‘minimum online presence’:
Going to an online world is just like going to work – if we will not reveal everything about ourselves to everyone at our work place – we should not reveal everything about our self in the online world too! It is best for your business to thrive but not at the cost of your kids/personal safety or your financial information.
For any other information that has to be shared, visit the person, call or private message the person. It builds good business/personal relationships too! 🙂
This is my eighth post for #MyFriendAlexa by @Blogchatter
I had written a post long back about why Bengaluru or Bangalore, India is an ideal place for NRIs to return back…in that post I carefully avoided one of the Bengaluru’s worst kept secrets – the notorious and infamous Bengaluru traffic! 🙂
Bengaluru not having the same infrastructure as a Chennai – is more prone to nasty traffic. The roads are definitely more narrow and with the area seeing rapid growth with new apartments, malls and the metro construction – you can imagine the state of the roads!! Numerous vehicles try to get past the small space everyday causing frustration and delays. Living in the heart of India’s Silicon valley and literally sitting in the eye of the traffic storm , I get to witness the serpentine traffic as I step out each day(and remember in India we have vehicles of all shapes and sizes- the autos, the bikers, the water tankers, the buses, the cars, the SUVs, the bicyclists, the pedestrians) Here are a few realities :
So, how does everybody go about their work?
And the silver lining – if you have lived and commuted in Bengaluru, you can drive anywhere in the world! 🙂
This is my seventh post for #MyFriendAlexa by @Bloghchatter
Born and brought up in Tamil Nadu(a state in Southern India) and having lived close to 23 years in the state,I have never done a post on my home state – how did it happen? Let’s get started right away…:) Here are a few points about my beloved state:
These are a few things that I could think of that make Tamil Nadu…can you think of anything else? Add them in comments below! 🙂
This post is my sixth post for my #MyFriendAlexa by @Blogchatter.