Skip to main content

Cybersecurity

What Is Cybersecurity About?
It is the on going effort to protect individuals, organizations and governments by protecting networked systems and data from unauthorized use and harm. It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.

We have become dependent on the cyber world/technology for almost all areas of modern day living, playing, and working, it is becoming more important that we understand its potential benefits/capabilities, as well as its threats, and ways to mitigate against them. We now all live and work in a participatory cyberspace/digital age. Computers, the data networks that interconnect them, and the services available over the networks make up this cyberspace. We all are now participators in this tech ecosystem!​

The CIA Triad
The CIA triad refers to Confidentiality, Integrity and Availability. Together, these three principles form the cornerstone of any organization’s security infrastructure framework.It is so foundational to information security that anytime data is leaked, a system is attacked, a user takes a phishing bait, an account is hijacked, a website is maliciously taken down, or any number of other security incidents occur, you can be certain that one or more of these principles has been violated.

Integrity
In everyday usage, integrity refers to the quality of something being whole or complete. In cybersecurity, integrity is about ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic and reliable.
 
Availability
Systems, applications, and data are of little or no value to an organization and its customers if they are not accessible when authorized users need them. Quite simply, availability means that networks, systems, and applications are up and running. It ensures that authorized users have timely, reliable access to resources when they are needed. Countermeasures to help ensure availability include redundancy (in servers, networks, applications, and services), hardware fault tolerance (for servers and storage), regular software patching and system upgrades, backups, comprehensive disaster recovery plans, and denial-of-service protection solutions.

Social Engineering
This is when an attacker sends a malicious email to an employee pretending to be colleague asking you to click a link, download an attachment or something of that nature. Avoid responding to such request. It is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Email Security -Business Email Compromise (BES)
In a BEC attack, a scammer impersonates a company executive or other trusted party and tries to trick an employee responsible for payments or other financial transactions into wiring money to a bogus account. Attackers usually conduct a fair amount of underground work, studying executive styles and uncovering the organization’s vendors, billing system practices and other information to help mount a convincing attack. BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually —and growing.

Mobile Device Security 
> Avoid using public Wi-Fi hotspot like in hotels, especially when accessing any password-protected sites or where you will enter any personal confidential information (E.g. Internet Banking).
> Protect your devices with a strong password/PIN (6 or 8 Digits recommended minimum) or fingerprint.
> Do not download apps from unknown sources, always use the vendor app stores.
> Activate encryption, Remote wipe, HGPS location (E.g. Find My Phone feature) and Physical security. Read what others are saying about the app in the review section in the app marketplace.
> Do not root (jail-break) your mobile devices.

Comments

Popular posts from this blog

WEB SERVER AND BROWSER INTERACTION

At one time or the other, you may have used or heard such expressions as “Downloading file from server”, “server is slow”, “Authentication required for server access”, and so on. These are everyday expressions used in the present Information Age. Now let us take a closer look at what a server really is, with emphasis on the type of server that makes it possible for access to the Information Superhighway – the Internet, known as Web Servers , as well as what actually happens when an internet user tries to access a website via a Web Browser by sending a (Hyper-Text Transfer Protocol) HTTP request to the web server. WHAT IS A SERVER? A server is basically a computer program that serves some sort of content to a client using a specified protocol. The term server also refers to the computer or virtual machine running the server program, which in fact is the most common use and understanding of the term. Today, most enterprise organisations with computer network infrastructure do host th...

INTERNET PENETRATION - Nigeria Top Three in Global Online Search

Over the years Internet penetration has greatly improved across the developing countries of the world especially Nigeria which now has over 92 million internet users. Finding information online has become a common practice as people comfortably search for information using web search engines, especially Google  and get relevant search results that answers their questions and further provides them insight to related articles, events, photos, news and even map locations. Thanks to Google Map Local Guides like myself who diligently contribute to improve the map by sharing knowledge of the local environment. The mobile internet revolution has made it possible for people even in the rural areas to have access to internet on their mobile devices. During my University days, precisely in the year 2008, I carried out a questionnaire research on the topic: "How Effectively Do You Utilize Your Mobile Phones For Internet Access", the responses were amazing as people were alrea...

WHATSAPP: HOW TO BACKUP CHATS & MEDIA ON GOOGLE DRIVE

With Google Drive cloud storage service you can backup WhatsApp media which includes chats, photos, videos, audio and documents. It is goodbye to data loss! The importance of performing this backup is if you change or lose your device you can always retrieve all your previous media files with ease. Google has recently announced a new agreement with WhatsApp regarding backup of WhatsApp chats and media on Google Drive which will allow users have extra storage different from their normal Google Drive storage quota. The announcement reads; "Due to a new agreement between WhatsApp and Google, WhatsApp backups will no longer count against Google Drive storage quota. However, any WhatsApp backups that have not been updated in more than a year will automatically be removed from storage. This policy will go into effect for all users on November 12, 2018 though some users may see the quota benefits earlier. To avoid the loss of any backups, we recommend that people manually back up...