Upload your picture and provide the following description. Delete this line.
Name: Jinjae Lee
Short Description
For me, [Information Security Technology] means [digital art, many lotus flowers growing competitively high in dirty pond, colorful and beautiful petals, dirty and polluted pond, a bright sky, a dark pond]".
Long Description (up to 3 sentences)
The evil instinct of humans who do not hesitate to hack into other people's information for their own benefit resembles a dirty pond.
The sophistication and beauty of safe and stable information security technology, which is constantly developed based on wickedness as a driving force, resembles that of lotus flowers.
Information security technology, which is constantly evolving without complacency to defend against attackers, resembles a lotus flower that grows higher in competition with surrounding objects.
Upload your picture and provide the following description. Delete this line.
Name: Jinjae Lee
Short Description
For me, [Information Security Technology] means [digital art, many lotus flowers growing competitively high in dirty pond, colorful and beautiful petals, dirty and polluted pond, a bright sky, a dark pond]".
Long Description (up to 3 sentences)
The evil instinct of humans who do not hesitate to hack into other people's information for their own benefit resembles a dirty pond. The sophistication and beauty of safe and stable information security technology, which is constantly developed based on wickedness as a driving force, resembles that of lotus flowers. Information security technology, which is constantly evolving without complacency to defend against attackers, resembles a lotus flower that grows higher in competition with surrounding objects.