Skip to main content

Cyber Security Issues Take Centre Stage at Fifth Kenya Internet Governance Forum

Cyber security was a key focus during the 5th Kenya Internet Governance Forum (KIGF) held last week at Strathmore University under the theme 'Connecting Counties for Enhanced Multi-stakeholder Internet Governance'.
The key points raised at the forum - which brought together representatives from government, private sector, civil society, academia as well as the internet community - revolved around the emerging legal issues and challenges relating cyber security. According to the Kenya Cyber Security Strategy released in February 2014, criminal organizations and hack-tivists from all over the world are - and will continue - to exploit ICT vulnerabilities in Kenya as the country matures into an Information Society, adding that country faces an increasingly evolving cyber threat landscape. Currently, Kenya ranks fifth in terms of hacking globally.
To deal with the threat of cyber insecurity and protect data, Kenya's ICT Ministry developed the National Cyber Security Strategy which defines Kenya's cyber security vision, key objectives, and ongoing commitment to support national priorities by encouraging ICT growth and aggressively protecting critical IT infrastructure.
Angela Ng'ang'a, corporate affairs manager for East and Southern Africa, Microsoft said: "The choices we make will be critical in how the cyberspace evolves. There is need to develop a clear cyber security strategy as the cyber attacks have become more sophisticated."
She added that the threats are expected to increase with the increased access to the internet as well as increased uptake of cloud computing solutions and big data.
Dr Joseph Seville, director, @iLabAfrica pointed out that there is need to develop local expertise by improving knowledge of technical issues and skills to fight crime on cyberspace, along with creating awareness on the importance of such training.
In recent years, the government, financial institutions and other key players in the private sector have suffered from various forms of cyber-related crime, with financial institutions losing millions in revenue due to poor cyber security systems and lack of proper guidelines on how to deal with the incidences.

Comments

Popular posts from this blog

structured programming

INTRODUCTION TO PROGRAMMING Definitions Computer programming is the aspect of translation of user’s ideas in to a form that can be understood by the computer by the use of an acceptable tool called computer programming language. A computer program is a set of coded instructions for the computer to obey and process data. Programming language is set of instructions or a tool used for writing computer programs. NB the purpose of computer programming is to solve the users needs i.e. developing instructions for the computer with the aim of solving a particular user problem. This enables the computer to accept and manipulate data and print results automatically. Development of computer programming languages. Introduction Primary function of programming languages is to provide instructions to the computer system so that it can perform a processing activity. Each programming language uses a set of symbols that have special meaning. Each language has its own rules called ...

Carriers commit to kill switches by 2015, but ruin implementation to protect profit

This week, the major telecommunications carriers in the United States finally agreed to make a mandatory “kill switch” option available on all cell phones by 2015. It’s a move that has been praised as a long time coming and slammed as incremental. However, it has also been resisted in certain corners by those who feel that the option will be abused. No one disputes that mobile phone theft is on the rise. The San Francisco police department has reported that a whopping 67% of all theft cases are related to mobile devices; 10% of phone owners have reportedly had a device stolen at some point. Consumer Reports claims that 1.2 million phones were stolen in 2012, with 3.1 million reported thefts in 2013. The question is whether a manufacturer-enabled “kill switch,” a method of disabling a device remotely, would be an effective means of short-circuiting a thriving market in stolen devices. US carriers have previously balked at manufacturer-implemented kill switches. Sam...