header banner
TECHNOLOGY

Data and cyber security

The Internet has revolutionized our modern society. Big data is the word of the day. Companies have vast access to data on a variety of issues from billions of internet users.
alt=
By Manish Adhikari

The Internet has revolutionized our modern society. Big data is the word of the day. Companies have vast access to data on a variety of issues from billions of internet users.



We have all felt the impact of consumer personalized marketing, including  advertisements on social media like Facebook, which generates advertisements based on our preferences of feed and our likes and reactions to news posts.


Various crawler and bots, which are automated, crawl through our web system and generate a large amount of information, often without our consent, which are used to profile for advertisements. Unfortunately, the ubiquity of the Internet has also led to its abuse and the rise of sophisticated cybercrimes.


Related story

Oli wins hat-trick term as UML chair


Online advertising is maturing with billions of dollars at stake, which opens up opportunities for adversaries to leverage the system to the detriment of consumers.  Malicious advertisers are constantly devising new strategies to exploit vulnerabilities using our personalized data. With the recent developments in junk email detection, spam senders changed their targeted communication medium.


Social networks and social media websites and recommendation services such as Facebook, Google+, MySpace, Twitter, YouTube, Flickr, SoundCloud, TripAdvisor, Amazon, and so forth are the major target for spammers.


So, what can we do? Prudent Administration can thwart many of these attacks, but online advertisement system and social media data are far too large to monitor manually. So we can use the same data to create a system using machine learning and secure learning to create a robust system. Some examples are using the data to feed a learning system to train and retrain a system and these systems are continually evolving in the defense line to be more efficient and effective.


Also to detect image based spam, computer techniques using image processing  can be developed to detect image based spam, natural language processing techniques can be used to detect fraudulent writing to detect plagiarism detection and authorization identification.


With use of personalized data, there is also increase in fraudulent activities and targeted cyber attacks which can be detected and decimated using the same personalized data to develop a secure system, using machine learning and secure learning, which evolves with time to create a robust and automated 


system.


The writer is a software engineer at Zyoba Labs Pvt. Ltd., Kathmandu 

Related Stories
SOCIETY

APF drafts operational policy to secure upcoming e...

Armed police force-1765548177.webp
POLITICS

Gen-Z activist Dhungana to hold Satyagraha against...

gen  z-1765195289.webp
POLITICS

Leftist parties in Nepal: A rollercoaster of unity...

WA0J113Hvza2TsjHCNvT4DoyOfQIaVRCNWCHP00D.jpg
OPINION

Controlling cyber conflict

Controlling cyber conflict
OPINION

Nepal in the Emerging Cyber Warfront

rVNcO6GtaE94MNKEpOD5gUWyZsm1X9jnR1naiJMX.jpg