Skip to main content

Cybersecurity

What Is Cybersecurity About?
It is the on going effort to protect individuals, organizations and governments by protecting networked systems and data from unauthorized use and harm. It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.

We have become dependent on the cyber world/technology for almost all areas of modern day living, playing, and working, it is becoming more important that we understand its potential benefits/capabilities, as well as its threats, and ways to mitigate against them. We now all live and work in a participatory cyberspace/digital age. Computers, the data networks that interconnect them, and the services available over the networks make up this cyberspace. We all are now participators in this tech ecosystem!​

The CIA Triad
The CIA triad refers to Confidentiality, Integrity and Availability. Together, these three principles form the cornerstone of any organization’s security infrastructure framework.It is so foundational to information security that anytime data is leaked, a system is attacked, a user takes a phishing bait, an account is hijacked, a website is maliciously taken down, or any number of other security incidents occur, you can be certain that one or more of these principles has been violated.

Integrity
In everyday usage, integrity refers to the quality of something being whole or complete. In cybersecurity, integrity is about ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic and reliable.
 
Availability
Systems, applications, and data are of little or no value to an organization and its customers if they are not accessible when authorized users need them. Quite simply, availability means that networks, systems, and applications are up and running. It ensures that authorized users have timely, reliable access to resources when they are needed. Countermeasures to help ensure availability include redundancy (in servers, networks, applications, and services), hardware fault tolerance (for servers and storage), regular software patching and system upgrades, backups, comprehensive disaster recovery plans, and denial-of-service protection solutions.

Social Engineering
This is when an attacker sends a malicious email to an employee pretending to be colleague asking you to click a link, download an attachment or something of that nature. Avoid responding to such request. It is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Email Security -Business Email Compromise (BES)
In a BEC attack, a scammer impersonates a company executive or other trusted party and tries to trick an employee responsible for payments or other financial transactions into wiring money to a bogus account. Attackers usually conduct a fair amount of underground work, studying executive styles and uncovering the organization’s vendors, billing system practices and other information to help mount a convincing attack. BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually —and growing.

Mobile Device Security 
> Avoid using public Wi-Fi hotspot like in hotels, especially when accessing any password-protected sites or where you will enter any personal confidential information (E.g. Internet Banking).
> Protect your devices with a strong password/PIN (6 or 8 Digits recommended minimum) or fingerprint.
> Do not download apps from unknown sources, always use the vendor app stores.
> Activate encryption, Remote wipe, HGPS location (E.g. Find My Phone feature) and Physical security. Read what others are saying about the app in the review section in the app marketplace.
> Do not root (jail-break) your mobile devices.

Comments

Popular posts from this blog

WEB SERVER AND BROWSER INTERACTION

At one time or the other, you may have used or heard such expressions as “Downloading file from server”, “server is slow”, “Authentication required for server access”, and so on. These are everyday expressions used in the present Information Age. Now let us take a closer look at what a server really is, with emphasis on the type of server that makes it possible for access to the Information Superhighway – the Internet, known as Web Servers , as well as what actually happens when an internet user tries to access a website via a Web Browser by sending a (Hyper-Text Transfer Protocol) HTTP request to the web server. WHAT IS A SERVER? A server is basically a computer program that serves some sort of content to a client using a specified protocol. The term server also refers to the computer or virtual machine running the server program, which in fact is the most common use and understanding of the term. Today, most enterprise organisations with computer network infrastructure do host th

INTERNET PENETRATION - Nigeria Top Three in Global Online Search

Over the years Internet penetration has greatly improved across the developing countries of the world especially Nigeria which now has over 92 million internet users. Finding information online has become a common practice as people comfortably search for information using web search engines, especially Google  and get relevant search results that answers their questions and further provides them insight to related articles, events, photos, news and even map locations. Thanks to Google Map Local Guides like myself who diligently contribute to improve the map by sharing knowledge of the local environment. The mobile internet revolution has made it possible for people even in the rural areas to have access to internet on their mobile devices. During my University days, precisely in the year 2008, I carried out a questionnaire research on the topic: "How Effectively Do You Utilize Your Mobile Phones For Internet Access", the responses were amazing as people were alrea

MOBILE NETWORK PORTABILITY (MNP) COMING SOON IN NIGERIA

What is Mobile Network Portability (MNP)? Mobile Number  Portability allows mobile telephone users to migrate from one service provider to another and still retain their telephone numbers. It provides a platform whereby a subscriber on any of the existing GSM and some of the CDMA networks can switch from one service provider to another and still retain their phone numbers. For instance, with your current MTN line you can decide to migrate to ETISALAT or vice-versa, and still retain your "stable and popular" phone number. How MNP Works For instance, subscriber A whose original service provider is network P, might wish to change or port to network Q. This can be achieved by subscriber A sending a porting request to network Q, network Q sees the request coming from a user on network P and then contacts them accordingly to setup the process of exchange and transference of subscriber details, this is the most common and it is known as "Recipient-led" porting. Once a