Hmm, so it’s been six months that my book was released. And it has been in quite a few bestsellers lists. It was fun interacting with all my readers, doing reading sessions for the book and everything. I had been… practically on vacation for the past 8 months (if we don’t consider how terribly sick I fell for countless number of times and how many times i was in and out of the hospitals.) But now, when everything is over, and i sit here, the question arises – now what? I do enjoy writing like nothing else, but well, lets face it – it does not pay that well. And all my money reserves are now empty. The realization struck me like a bolt of lightning – I NEED A JOB! And once again I found myself signing in for Naukri.com and monster. I updated my CV for architecture and started applying. Then, I felt an idea tingling in my mind – what if I applied for a job in creative writing???!! 7 minutes laterI had a new CV ready – Rahul Saini – creative writer. And I floated that on the net.
Three days later I got a call from Wipro (!!!!!!!!) They told me it was an opening for some content developer or something. Now those of you, who know me, would be aware of the fact that I am ...technically challenged. I have difficulty updating my blog, talk of working for an IT company as a ‘content developer’!!!!!! Anyway, being myself, I said yes, as I generally love jumping into the unknown. So they asked me a few questions over the phone, like what according to me, was creative writing, and what content writing was. I told then what I thought about both. Then I was told that in a few days time, I would be given a call and would be asked to write an article on a topic that would deal with ‘Information Security.’
Today morning was when I got the call. The topic was four factor authentication. I was given one hour to write. This is what I wrote. Enjoy ;)
Three days later I got a call from Wipro (!!!!!!!!) They told me it was an opening for some content developer or something. Now those of you, who know me, would be aware of the fact that I am ...technically challenged. I have difficulty updating my blog, talk of working for an IT company as a ‘content developer’!!!!!! Anyway, being myself, I said yes, as I generally love jumping into the unknown. So they asked me a few questions over the phone, like what according to me, was creative writing, and what content writing was. I told then what I thought about both. Then I was told that in a few days time, I would be given a call and would be asked to write an article on a topic that would deal with ‘Information Security.’
Today morning was when I got the call. The topic was four factor authentication. I was given one hour to write. This is what I wrote. Enjoy ;)
Information Security. When I first heard the term, I felt that it must be something computer related. But to my surprise, it was not so. It was not only computer related. And not only that, unlike the computers, it was something that dated back in history as far as 50 B.C. Yes, it is said that Julius Caesar invented the first information security system that was called the ‘Caesar Cipher’ which would prevent his messages from being read (secure the information) if it fell into wrong hands. Since that time, this study has developed and evolved tremendously. And with the invention of computers, which along with all the other things they did, stored like astronomical amount of data, the rate evolution of this subject shot up like anything. Today, it’s not a simple subject anymore. It’s a complex study with numerous sub-heads. One such sub-head is four factor authentication.
Now what is four factor authentication. The name clearly suggests that it has to do with the authentication (verification/checking) of some four factors. We would get into the idea of what exactly is four factor authentication in a while, but first let us figure out why do we need this authentication or check. Lets say we have this person with us here, whose name is … Don. And he is trying to make this unusually huge transaction in his back account using … Internet banking lets say. Now how do we make sure that this person is the actual bank account holder? (For all we know he might have seen movies like Catch Me If You Can and Mission Impossible, and is a crook.) This four factor authentication is a check to make sure that this Don, is the right, trustable person or not.
Now, for year we have been following the two factor authentication system based on something you know (like your pin code or a pass word) and something you have (like some ID proof.) then later, with the advancement of technology, came in the third factor – something you are (like your biological or physical attribute – your fingerprint, your palm print, your iris pattern, your voice print, or even your DNA. Just like we have seen in the movies like Charlie’s Angles and similar) But, sometimes these three checks are not enough. So, recently have another check added. The somewhere you are check.
Now I am waiting for their reply!!!!!!
P.S – I have removed all the technical details. Didn’t wana bore you guys.