DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7207

Preamble

0

With the advent of dangerous malicious codes like Flame and Stuxnet, it has become evident that cybersecurity poses existential threats to institutions if not properly managed. As the risks of traditional wars abate, the Internet has since evolved as the 21st century battleground where malware, not rockets, can be used to launch attacks on infrastructures like power, telecoms, capital markets and financial institutions. Also, through espionage and hacking, organized crimes by nations, corporate institutions and individuals can steal vital intellectual properties (IPs) that drive innovations in any economy. When a country or an organization loses its competitive advantages, its market-winning capabilities will be weakened. Besides the malwares and worms, there is also the human element which poses risks to intellectual properties and business trade secrets due to the ease of moving digital wares.

In this book, we discuss cybersecurity and digital forensics within the broad nexus of policy, management and technology. The book is structured to deepen capacities for cybersecurity and forensics experts as they design mechanisms to prepare, detect, defend, defeat, and harden their organizations’ critical digital and information assets.

Cybersecurity is not a game of choice – it is the new normal. Unlike in the past, modern hackers are coordinated, well-funded and operate like corporations. Around the world, central banks have noted that financial institutions are losing hundreds of millions of dollars to cyber-related frauds and threats. The 21st century will be a century of cyber warfare and will require strategic readiness for organizations. These institutions have to plan beyond dependence on state institutions for cybersecurity protections. Specifically, in most emerging markets like Africa, the level of that preparation to secure and protect assets like power systems, telecoms, financial infrastructures, and water systems is still evolving.

Furthermore, the world has nuclear non- proliferation treaty, but none exists for cyberwar despite the potential economic dangers the latter poses to world commerce. Accordingly, many nations have started to deploy strategic commands to protect, defend and necessarily retaliate when their systems are attacked through cyber-means. The United States Pentagon has the Cyber Command inside the National Security Agency, the British has a similar unit inside the GCHQ. China, Iran, Russia, Israel, and many other nations have developed cyber-armies to protect their economies. In this book, we explain how nations can invent new policies and management systems besides deepening technological capabilities to confront the challenges of emerging digital warfare.

Experiences shared in this book have been possible through our cybersecurity business (First Atlantic Cybersecurity Institute, Facyber) and our data analytics firm (Milonics Analytics). Facyber works with organizations and nations to deepen their cybersecurity and digital forensics capabilities by training their workforce. We also provide cybersecurity research and consultancy. The programs cut across cybersecurity policy, cybersecurity management, cybersecurity Technology and cybersecurity intelligence / digital Forensics structured along certificate, diploma and nanodegree programs. Milonics Analytics, an IBM PartnerWorld, is a preeminent big data analytic business. We have captured our experiences and presented them in this book.

As information and communication technology (ICT) continues to facilitate the process of socio-economic development of nations, offering new ways of exchanging information, and transacting businesses, efficiently and cheaply, we would experience redesigns in the dynamic natures of financial, entertainment and indeed all industrial sectors. ICT would usher better means of using the human and institutional capabilities of countries in the public and private sectors, rapidly moving nations towards knowledge-based economic structures and information societies. These societies would comprise networks of individuals, firms and nations that are linked electronically and in interdependent relationships. Yet, as these changes happen, our world will experience more challenges in information security. Indeed, as economic systems go digital, the risks posed by unsecured weakest links at host, intermediary and client levels will become prominent. This book examines these multifaceted issues from a broad angle that combines policy, technology and management.

As you read this book, you may notice some repetitions. It was intentionally done. We understand that not many people would invest the enormous time required to read all the chapters. Indeed, some professionals may just be interested in some specific topics. To create a balance, we have made most of the chapters largely autonomous, and that means some concepts are repeated.

Finally, I want to thank our team in the Fasmicro Group organization and our partners especially Halogen Security Group which assisted significantly on this project.

I am very confident that you would enjoy this book.

 

Ndubuisi Ekekwe, PhD

First Atlantic Cybersecurity Institute

February 2018

Microsoft Plots a Future for Computing

0

It is very possible that in the next 7-10 years, most of the digital systems we are using today would become obsolete. The company that pioneered the Personal Computing industry is trying to reshape the industry. Yes, Microsoft has a bold new idea and it is going to be huge. Simply, the software giant wants to use public blockchains as enablers for authenticating and validating identities. Blockchain is the technology that powers Bitcoin and other cryptocurrencies.

In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems. Initially, the longtime tech giant will support blockchain-based decentralized IDs (DIDs) through the Microsoft Authenticator app.

Unlike the forms of identification used in the world today, a decentralized identity system is not controlled by any single, centralized institution such as a government or large tech company. The idea is that a decentralized identity system removes the possibility of censorship and gives an individual full control over their identity and reputation.

After looking at various types decentralized identity systems, Microsoft turned to public blockchains due to their ability to enable privacy, self-ownership, and permissionless access.

Unlike other players in blockchain, Microsoft has a platform to make real impact. With Windows, it has the ecosystem to execute a practical implementation that would affect millions of people.

The emerging problem of laser phishing will make the web very toxic and poison the hearts of people. Imagine where AI could pick people’s images and create digital fake versions that look real, and then use those elements to impersonate them. As these technologies evolve, authentic identification would become critical. That can only happen through shared ecosystems like distributed identity systems like blockchains.

Lagos, Start Making Apps for China; It Controls 25% of Global Market

2

China is booming, really amazingly. App Annie, an app consultancy, has reported that “China now accounts for $1 of every $4 generated globally across app stores, in-app advertisements and mobile e-commerce”. If that is the case, Lagos entrepreneurs may begin to adjust their strategies. We typically make for U.S. market since no one buys apps in Africa. Maybe, focusing on China could unlock more opportunities. Sure, it would be really challenging but that is what entrepreneurs are created to figure out. We need to think China because the alpha is there right now.

With the largest internet population and smartphone market in the world, China also the biggest app economy, according to recent estimates from analytics company App Annie.

It said China accounts for US$1 out of every US$4 generated globally across app stores, in-app advertisements and mobile e-commerce.

In the fourth quarter of last year, app users in China also spent more than 200 billion hours in apps. App Annie said that was more than 4.5 times the next largest market, India

From app to semiconductors, China has another win: the news is that Apple is in talks to start buying memory chips from Yangtze Memory Technologies, a Chinese chip maker. I do not know how Intel would feel. Because if YMT has gotten really good for Apple to consider it, it is then evident that YMT is now ready to cause dislocation in the global chip business. Chinese government has been pumping money into semiconductors. And Apple has come with a great seal of approval.

Just to show you how special Chinese citizens are emerging, Heathrow Airport is playing a vapor game with them: “Chinese travellers were asked to pay a minimum spend of £1,000 ($1,381) to receive a 20% discount, while other shoppers paid £250 to receive the same offer”.

Heathrow Airport have said a duty free discount event run by its commercial partner World Duty Free which offered different rates to Chinese and non-Chinese customers at the weekend was “unacceptable”.

Chinese travellers were asked to pay a minimum spend of £1,000 ($1,381) to receive a 20% discount, while other shoppers paid £250 to receive the same offer.

Users on China’s social media platform Weibo shared their outrage after the policy was revealed on a blog viewed over 10 million times, and one person posted a picture of a flyer, in Chinese, offering the discount to tourists spending over £1,000

What a nation – built by men and women.

Comment from LinkedIn

China is a practical example for the saying that “the bigger, the better”. It’s a country that is very huge, not just in quantity, but also in quality. Nigeria is barely 200 million (we don’t even know the figures), but many a times it conveys the feeling that we are overpopulated, and therefore it’s ‘impossible’ to provide resources and necessary infrastructures to take care of the ‘teeming’ population. We don’t seem to know how to get things done!

Well, if developing apps for Chinese consumers would make some of our local developers see alpha, I think is something they must give a go. Even if it requires coding in Chinese, they still have to try it out. We have more sellers than buyers in the land, that’s why everything seems to be in stasis; no disposable income

Cybersecurity Education Franchise Opportunities Across Africa

0

Africa’s leading cybersecurity training firm, First Atlantic Cybersecurity Institute (Facyber), has opportunities for African entities to join our partner (franchise) network. It offers opportunities for entities to represent and market Facyber products and services in selected countries of interest in Africa.

Facyber has a very expanding network in Africa, from Namibia to Cameroon, as partners use our technologies and solutions in their cybersecurity and digital forensics education. We continue to deepen that network and if you are interested, please indicate interest. You would be required to pay a one-time franchise fee.

At Facyber, we deliver solutions which can be integrated into HR training to support corporate cybersecurity awareness initiatives. Besides, our cybersecurity services cover policy, technology and management with relevance in key industrial sectors and markets. The training program has three classes: certificate, diploma and nanodegree.

Igbinedion University Nigeria offers Nanodegrees on our cybersecurity programs.

 

Sample Facyber certificate

 

Contact

Please contact tekedia@fasmicro.com or facyber@fasmicro.com if you are interested in becoming a Facyber franchise partner..

12.4 – Cryptography-Network and OS Security

0

Network and OS Security is the most important element in information security; it is in charge of protecting all information passed through computers and networks. It refers to all software and hardware characteristics, functions, operational measures, features, responsibilities, access control measures, and organizational and management policies needed to offer a satisfactory level of protection for […]

This post is only available to members.