From the lines of code to the hardware or software bugs therein, from debugging to uploading, everything is centered around a platform within an infrastructure. From fiber optics to broadband, information, proprietary, confidential or otherwise, all are transmitted over TCP/IP
over a network. Be it an app or a news, text, images and videos do not inhabit in isolations, and hence they can be intimidated by external entities. While securing a mobile device or an end point is our daily language and practices, to those outside the cybersecurity cohorts are somewhat baffled by the notion of a hacker
's attempt or an attack, 24 x 7! While jargons such as VPN
may sound familoiar, but does it matter? What is the meaning of vulnerabilities
? To advocate prevention, detection and protection; to report and response to an incidence by waging the best strategies and tools to recover and reclaim within the shortest possible time are all in the hands of the cyber forensic team! Indeed, what does an average smartphone user or even a user whose eyeballs move from screen to screen in their daily life know about the critical issues in this crime-filled cyberspace
Lin was inspired and has created a Series of 100 images that portray the threats and exploits from infrastructure to cyberspace: a phenomenal mission of cyber security aesthetically. Unprecedented, these images are purposed to inform the public-at-large and IT professionals alike. With finger on Android, each of these digital artworks were created in a microsecond via FAME.
FAME (Finger or fist Accelerated Mathematical Engine) is a deployment of Lin's newly established Four New Mathematical Theorems, announced in London, June 1, 2016. Fundamentally, thes theorems unleash the power of human fingers or fists with total freedom, revolutionize interactions, offers infinite opportunities in mobile device computing. Indeed, what is common between these digital artworks and cyber security? Speed & accuracy!