cyber security

intrusion of privacy

The invasion of privacy

2020-06-30

Privacy intrusion refers to the intrusion of someone’s private life without a valid cause, which grants the right of filing a lawsuit to the one whose privacy has been intruded. In most cases personages of the public are not safeguarded since they are presumably under the public watch thus theirContinue Reading

Encryption

Handling of a company’s encryption keys

2020-06-30

 Data loss is common news lately, it is also becoming a norm to hear about organizations losing very sensitive data. According to Privacy rights clearinghouse, more than nine hundred data loss incidents were reported publicly between January 2005 and February 2008 which lead to disclosure of sensitive data relating toContinue Reading

2008 Cyber-attack on the United States

2020-06-15

The development of United State cyber command was a result of the 2008 Cyber-attack on the United States. This attack was rated as one of the worst breaches of U.S. military computers ever recorded in history.  The attack commenced with the use of USB flash drive infected with malicious codeContinue Reading

Cyber Security

Cyber Security Guide

2020-05-15

This Cyber Security Guide is tailored for small-scaled and large-scaled organizations aiming to secure their IT resources from Cybersecurity threats. What Is Cyber Security? Cybersecurity is the practice of ensuring security for computing systems involving hardware, software as well as networks. This Cyber Security Guide provides a guideline to effectiveContinue Reading

Security awareness online and Cryptography

2020-01-13

Security awareness online How secure aware are you when using your desktop computer online?   Desktop computers offer quite fewer security mechanisms that actually are far much less satisfactory with regard to optimum protection. Desktop computers only offer the operating system security measures such as the firewall and maybe installed antivirusContinue Reading