Wednesday, 30 August 2017

Cyber events in Kenya






In my opinion,

Many approaches to KDD (knowledge discovery in the database) are used to identify valid and useful patterns in data. This would include varying automated solution such as data mining or even log analysis, but this is a minimal approach. There are several frameworks that revolve around forensic audit - just to mention a few - COBIT, FISMA, NIST etc.

With only 4 hours it would be very difficult to come up with a report that is substantive and acceptable and labeled as expert opinion.

It would have been interesting to also read discovery of any SQL injections or cross scripting attack that may have hibernated the suggested 11% algorithms.
The "bomas triangle". This explanation suggested a TOCTOU attack where an attacker can influence time between system check and use. Also known as a race condition. In English going in between and taking advantage of the pulse of the moment. 

Did anyone think and confirm the possibility of a planted stealth software by experts? Otherwise known as a rootkit?

In my opinion, the courts did not have time and capacity to do an above average IT audit.

One caveat with my small brain, serious bad guys do not leave foot prints. They are that good.

In my submission, my FB friends, The concept of hacking is either a myth or extremely amateurish.

This is my contribution as an interested citizen.

I suggest the law fraternity get interested in cyber security as other security arms are currently doing. Kenya is undisputed one among equal of the digital nations league globally. More and more cyber event cases will be presented in courts and ignorance will not be an excuse to justice.



Again, the above is just an opinion from my angle of looking at digital nine. from the other side, it could be 6 and from my side, it still remains a 9 until I cross on the other sides.

Friends - let us see each other on the other sides.

1 comment:

  1. It's really a cool and helpful piece of information. I am glad that you simply shared this helpful info with us. Please keep us informed like this. Thanks for sharing. How To Password Protect Folder And Influence People.

    ReplyDelete