Brand Name: O DATA
The initial idea for the brand is drawn up in the first stage. The sketches are then electronically based on an understanding of the theme. The different types of data leakage are represented graphically.
![](https://static.wixstatic.com/media/492362_eafbe48745e94d46b5dda8dc4441bbfd~mv2.jpg/v1/fill/w_980,h_735,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_eafbe48745e94d46b5dda8dc4441bbfd~mv2.jpg)
![](https://static.wixstatic.com/media/492362_963867527ea5419e9fbe95813f300fa3~mv2.jpg/v1/fill/w_980,h_735,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_963867527ea5419e9fbe95813f300fa3~mv2.jpg)
The main question: How was the data compromised?
![](https://static.wixstatic.com/media/492362_5f60bf17aabb49edae59155f47793f9f~mv2.jpg/v1/fill/w_980,h_694,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_5f60bf17aabb49edae59155f47793f9f~mv2.jpg)
Forms and Graphics.
![](https://static.wixstatic.com/media/492362_317d700d9cba407680ea24092843446a~mv2.jpg/v1/fill/w_980,h_693,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_317d700d9cba407680ea24092843446a~mv2.jpg)
![](https://static.wixstatic.com/media/492362_123df2984e074024b4e97753d8ecc045~mv2.jpg/v1/fill/w_980,h_693,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_123df2984e074024b4e97753d8ecc045~mv2.jpg)
![](https://static.wixstatic.com/media/492362_7c1693fca90c42e08c1f02fc96550713~mv2.jpg/v1/fill/w_980,h_693,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_7c1693fca90c42e08c1f02fc96550713~mv2.jpg)
![](https://static.wixstatic.com/media/492362_940a991cc34b4d6399e938df55ead9af~mv2.jpg/v1/fill/w_980,h_694,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_940a991cc34b4d6399e938df55ead9af~mv2.jpg)
Comments