Page 48 - JDPA Volume 02, Issue 02
P. 48

Journal of Defence & Policy Analysis             Volume 02, Issue 02, December 2023








                                TRUTH UNDER ATTACK

                                             Isura Silva
                                  Business Consultant on Digital
                                          Transformation







           Introduction

           In an interconnected world where digital security is paramount, understanding
           the nuances of social engineering and its implications on personal data protec-
           tion is essential. Individuals often withhold the truth to avoid conflicts, manage
           priorities, or maintain relationships, inadvertently creating vulnerabilities. So-
           phisticated social engineering techniques exploit these human tendencies, pos-
           ing significant threats to personal data security. For instance, malicious actors
           can manipulate individuals into divulging sensitive information, such as Nation-
           al Identity Card numbers via One-Time Passwords, to create unauthorized digital
           wallets.

           Understanding the real threat

           Individuals may refrain from expressing the truth for various reasons, such as a
           desire to avoid unnecessary conflicts, prioritize more pressing matters, or preserve
           amicable relationships. Additionally, the apprehension of potential negative per-
           ceptions can dissuade individuals from truthfully conveying information, even
           though honesty might inadvertently cast them in an unfavourable light.

           The rise of sophisticated social engineering techniques poses a significant threat
           to personal data security. Malicious actors can leverage human vulnerabilities
           to obtain critical information, such as National Identity Card numbers through
           One-Time  Passwords, enabling them to create  unauthorized digital  wallets  in
           various banking institutions. This highlights the need for robust security mea-
           sures and increased awareness of such manipulative tactics to protect sensitive
           financial data from unauthorized access.

           The  possibility  of  mobile SIM card  duplication  in Sri Lanka has generated
           considerable  confusion,  fueled  in part by viral podcasts  claiming  its  feasibil-
           ity. However, it is crucial to dispel this disinformation. Firstly, replicating SIM
           cards in Sri Lanka, in the sense of creating an unauthorized functional copy, is


           Faculty of Defence and Strategic Studies, General Sir John Kotelawala Defence University, Sri Lanka
                                                                                    38
   43   44   45   46   47   48   49   50   51   52   53