Monday, November 30, 2015

Cyber Security in Uganda and the Region.





There is a direct link between the development of technologies and the threats that emerge within that society. 



Computer Related Threats 



Your computer is safest as long as it is not connected to the internet. The advice given to people who are connected to computer networks is therefore to restrict access to certain computers in order to reduce the threats that may emerge from the Internet. This in the present age can be asking for too much. This new age in computing has created a corresponding rise in providers who specialize in the development and creation of anti-virus software. Because most computer users are more accustomed to windows operating systems, they have been much more vulnerable to attack. As such others have chosen to adapt to additional technologies and operating systems like linux. These systems see also vulnerable except the threats have a different nature. 

It is common to see unusual files while using a Linux devices which would be undetected in the windows environment. 



Peripheral Devices and Security 



The increase in capacity and speed of devices has meant that the flash disks has experienced a greater use. As a result these devices have been used and designed to get full access to Unsuspecting PC users. Mini programs can be created and stored on Flash Disks these can then load once the devices are detected by the computer. These mini-programmes can then sit in hidden parts of the system structure where they can wreck havoc to users. Windows has created a unique system especially with it earlier versions of windows experience that repeatedly questions the administrator of the computer whether he/she is sure that the software they are installing is from a verified source. 



People who traffic In malware often take advantage of people and their unwillingness to purchase software. So free software comes with all sorts of hidden programs and viruses that are used to gain access to the user. 



Mobile Technology Related Threats 



Mobile Phone use has increased exponentially in the third world and with this increase we have also seen a rise in harmful software. The rise in usage also created a rise in creation of mobile applications. The same systems that were designed to sit on the desktop have had to be scaled down to mobile. A lot of revenue has been generated by mobile application developers. Unfortunately, these development have also brought with them some major Security challenges. 

Some systems take advantage of the web and use the browser to get into the mobile phones system. The most common use of these invasions is to capture user data, in order to get access to contacts and images stored on the mobile phone. In addition to this there have been attempts to use turn on the microphone or the cameras that sit on these phones in order to gain control of user data for the purpose of blackmail. 



Banks and threats relating to computerization (ATM-asynchronous transmission)



The developed world having made more strides in the use of ATM technologies often employs the same methods to attack less developed countries. There have been attempts before to replicate user data and ATM cards by capturing four digit codes and then withdrawing money. 

Others have bought and installed fake ATM machines where they install cameras in order to see the details of people as they withdraw their Money. 

The ATM systems are connected to Windows Xperience which Microsoft is no longer supporting. This means that to be safe, the bank has to make sure that it is using the latest server systems in order to make sure that they can get access to updates from Microsoft as well as Fixes. 



Payment platforms and banks



The arrival of mobile platforms and the decision to connect this with banking means that an extra level of vulnerability now exists. Because these systems are built by people using certain platforms, there is a great need to secure them to avoid attack. The mobile device has been a breakthrough for banks because it allows the users to be identified as a unique individual and can transform the manner in which the bank relates to the user. The banks have seen this as a calculated risk and have therefore designed systems to match this need. In addition to the changes in banks, the governments in most of Africa have had massive registration drives that have enable most phone users to sign up and therefore have unique identifiers with their mobile phones. This should make the job of banks a little easier. 



Payment platforms for mobile and Telecom Companies



We have seen an invasion of sorts of the telecom company into the finance industry. The reduced costs of mobile devices as well as the registration of mobile devices has brought services closer to people in the third world who are often rather suspicious of large financial institutions. The rise of the micro finance and micro lending systems has also made the adoption of mobile and finance related technologies much simpler. 

The challenge of Security in this regard has therefore given birth to threats from three directions. Telecommunications, Finance and Mobile (device). We have also found the challenge of dealing with the human resource in each of these industries. 

No comments:

Post a Comment