header banner
ADVERTISEMENT
TECHNOLOGY

Data and cyber security

The Internet has revolutionized our modern society. Big data is the word of the day. Companies have vast access to d...
By Manish Adhikari

The Internet has revolutionized our modern society. Big data is the word of the day. Companies have vast access to data on a variety of issues from billions of internet users.


We have all felt the impact of consumer personalized marketing, including  advertisements on social media like Facebook, which generates advertisements based on our preferences of feed and our likes and reactions to news posts.


Various crawler and bots, which are automated, crawl through our web system and generate a large amount of information, often without our consent, which are used to profile for advertisements. Unfortunately, the ubiquity of the Internet has also led to its abuse and the rise of sophisticated cybercrimes.


Related story

Elon Musk will be investigated over fake news and obstruction i...


Online advertising is maturing with billions of dollars at stake, which opens up opportunities for adversaries to leverage the system to the detriment of consumers.  Malicious advertisers are constantly devising new strategies to exploit vulnerabilities using our personalized data. With the recent developments in junk email detection, spam senders changed their targeted communication medium.


Social networks and social media websites and recommendation services such as Facebook, Google+, MySpace, Twitter, YouTube, Flickr, SoundCloud, TripAdvisor, Amazon, and so forth are the major target for spammers.


So, what can we do? Prudent Administration can thwart many of these attacks, but online advertisement system and social media data are far too large to monitor manually. So we can use the same data to create a system using machine learning and secure learning to create a robust system. Some examples are using the data to feed a learning system to train and retrain a system and these systems are continually evolving in the defense line to be more efficient and effective.


Also to detect image based spam, computer techniques using image processing  can be developed to detect image based spam, natural language processing techniques can be used to detect fraudulent writing to detect plagiarism detection and authorization identification.


With use of personalized data, there is also increase in fraudulent activities and targeted cyber attacks which can be detected and decimated using the same personalized data to develop a secure system, using machine learning and secure learning, which evolves with time to create a robust and automated 


system.


The writer is a software engineer at Zyoba Labs Pvt. Ltd., Kathmandu 

Related Stories
SOCIETY, TECHNOLOGY, My City, People

Young Scientist Nischal Baniya set to present his research on bio-inks for acid...

2 min read
WORLD, TECHNOLOGY

The New York Times sues OpenAI and Microsoft for using its stories to train cha...

6 min read
WORLD, TECHNOLOGY

EU to resume negotiations on world's first AI law on Friday

3 min read
WORLD, TECHNOLOGY

Russia puts the spokesman for Facebook owner Meta on a wanted list

2 min read
WORLD, TECHNOLOGY

Musk's Neuralink to start human trial of brain implant for paralysis patients

2 min read

Trending

Top Videos

Bold Preety willing to fight for her musical career
Awareness among people on heart diseases has improved in Nepal’
Print still remains the numbers of one platform
Bringing home a gold medal is on my bucket
What is Nepal's roadmap to sage child rights