0% found this document useful (0 votes)
16 views14 pages

Group 2

Uploaded by

07ginxiehow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views14 pages

Group 2

Uploaded by

07ginxiehow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

GROUP 2

COMPANY NAME: INFO MASK


INFOMASK
New tab
www.info-mask.com

MISSION
To prevent the bypass of any
devices,Equipping them with
security, to ensure that information
from lost and stolen devices are
safe.
New tab New tab
www.zanasyra.com
www.info-mask.com

OBJECTIVE
To implement a strong security measures on
all devices to prevent unauthorized access
and data breaches, ensuring that sensitive
information remains protected.
New tab New tab New tab
www.info-mask.com
www.zanasyra.com

5
4.5 OBJECTIVE
4
3.5
To enrich and strengthen data protection
3
2.5
2
measures for providing a robust SUBTITTLE
1.5 security,and ensure that information
1
0.5
from lost or stolen devices remains
0 secured and inaccessible.
2019 2020 2021

Series 1 Series 2 Series 3


New tab New tab New tab New tab
www.info-mask.com
www.zanasyra.com

5
4.5 ISSUE WE WANT TO ADDRESS
4
TEXT TEXT TEXT
3.5

Lack of device security ,allowing intruders to


3
2.5
2
text text
bypass the securitytext textor stolen text text
of lost SUBTITTLE
1.5 devices,to
text text collect informations
text text or to use
text the
text
1
device for themselves.
text text text text
0.5
0
text text
text text
2019 2020

Series 1 Series 2
2021

Series 3
text text text text
New tab New tab New tab New tab
www.info-mask.com
www.zanasyra.com

GENERAL PUBLIC
TEXT TEXT TEXT
Many people lose their devices or get
robbed.
text textAnd it happens SUBTITTLE
that devices are
text text text text
prone to a security bypass,
text text
therefore ,experts text
can text
easily intrude text
and text
text text
collect text text
their information. text text
text text text text text text
New tab New tab New tab New tab
www.info-mask.com
www.zanasyra.com

INCREASED CYBER THREATS


TEXT TEXT TEXT
People might be threatened because of their
stolen
text text text text SUBTITTLE
information,they might receive threat
text text
such as leak of privacy, and family
text text textcan
threat.Their accounts textalso be stolen
text text
or
text text
used to scam othertext text
people. text text
text text text text text text
New tab
www.info-mask.com

Process of Implementation
Conducting Seminar:
Conduct a free seminar about how does a security
bypass happens and what are the things that we should
and not do with our devices to prevent it from being
bypass if such an event occur.
New tab New tab
www.zanasyra.com
www.info-mask.com

Process of Implementation
Free Education
We will offer an IT related course a free
scholarship.This will help poor people with goals in
life,and this will hone individuals by providing them
knowledge and skills that can lead them to a
promising future.
New tab
www.info-mask.com

BENEFICIARY
General public
-By providing a robust security, they would
benefit from better protection of their
personal data, reduced threats,and
scams,and will give a greater sense of
confidence in using digital technologies
safely.
New tab New tab
www.zanasyra.com
www.info-mask.com

Expected Outcomes
1.Reduced Risk to users
-If someone's device is compromised, it could lead to phishing
or fraud targeting their contacts. The service We provides
prevents those things to happen ,this keeps others safe from
scams or impersonation.
2.Deterrence for Criminals
-Our service makes devices become harder to unlock
and access, they become less valuable to criminals,
which could lead to a reduction in thefts
New tab New tab New tab
www.info-mask.com
www.zanasyra.com

Expected Outcomes
3.Safer Digital Environment
SUBTITTLE
- Users are better protected from cyber threats,
identity theft, and privacy violations. This will
result in a more secure and confident general
public
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy