Connect with us
Advertisement

“Cyber Black Market” …more profitable than the global illegal drug trade.

Boitshepo Bolele

Malware today is a tool for cybercriminals. Viruses, botnets, worms and other types of “bugs” are used both in targeted and non-targeted attacks.

Today’s cybercriminals are no longer the frustrated nerd sitting at home with nothing better to do. Cybercrime is a business in itself – a business with one clear objective: to steal data and money for profit. Most malware attacks are in fact profit oriented. In fact, the “Cyber Black Market” is more profitable than the global illegal drug trade.

Technically, cybercrime as a business is not very different from other businesses. There are various players selling their own expertise and tools to others in the system. Crimeware is also readily accessible in easy-to-sell pre-packaged exploit kits in case someone with less computer skills would be interested.

Businesses are an interesting target for cybercriminals since they deal with lots of money, multiple transactions and often confidential information. And many businesses unfortunately do not have the necessary safety measures in place, which leaves them open to all attacks – even the opportunistic ones looking for easy targets. Most victims are targets of opportunity rather than specially targeted against. So whether you are big or small, all that matters is how easy it is to breach your systems.

For the victimized business, the results of a malware attack can be quite devastating. Downtime of IT systems will result in downtime for the whole business. Destruction or corruption of business data, on the other hand, will directly affect both day-to-day operations and revenue. Not to mention the risk and consequences of leaking sensitive data and losing the confidence of your customers and business partners.
For effective sustainable, cyber defence, upskill your team through the following programmes:-

Computer Hacking Forensic Investigator (CHFI)

The programme covers Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensic Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partitions, Using Access Data FTK and Special Steps,  EnCase,  Stenography, Passwords,  Log Correlation,  Network Forensics, Wireless Attacks,  Web Attacks, Email Crimes  , Mobile Investigation, Investigation Reports , Expert Witness.

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) programmes enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities

Certified Information Security Manager (CISM)

IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

Certified Information Systems Auditor (CISA)

CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.

CompTIA Advanced Security Practitioner (CASP)

Equips learners with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk.
Join me on facebook (eLearning Botswana) for more information on ICT Certifications and related opportunities. Or contact me on 3980347 or 74643211, email: admin@elearningbw.org

Continue Reading

Columns

Export Processing Zones: How to Get SEZA to Sizzle

23rd September 2020
Export Processing Zone (EPZ) factory in Kenya

In 2005, the Business & Economic Advisory Council (BEAC) pitched the idea of the establishment of Special Economic Zones (SEZs) to the Mogae Administration.

It took five years before the SEZ policy was formulated, another five years before the relevant law was enacted, and a full three years before the Special Economic Zones Authority (SEZA) became operational.

This content is locked

Login To Unlock The Content!

 

Continue Reading

Columns

Egypt Bagged Again

23rd September 2020
Samson

… courtesy of infiltration stratagem by Jehovah-Enlil’s clan

With the passing of Joshua’s generation, General Atiku, the promised peace and prosperity of a land flowing with milk and honey disappeared, giving way to chaos and confusion.

Maybe Joshua himself was to blame for this shambolic state of affairs. He had failed to mentor a successor in the manner Moses had mentored him. He had left the nation without a central government or a human head of state but as a confederacy of twelve independent tribes without any unifying force except their Anunnaki gods.

This content is locked

Login To Unlock The Content!

 

Continue Reading

Columns

‘RO, ‘RO ‘RO YOUR ‘BOT

23rd September 2020

If I say the word ‘robot’ to you,  I can guess what would immediately spring to mind –  a cute little Android or animal-like creature with human or pet animal characteristics and a ‘heart’, that is to say to say a battery, of gold, the sort we’ve all seen in various movies and  tv shows.  Think R2D2 or 3CPO in Star Wars, Wall-E in the movie of the same name,  Sonny in I Robot, loveable rogue Bender in Futurama,  Johnny 5 in Short Circuit…

Of course there are the evil ones too, the sort that want to rise up and eliminate us  inferior humans – Roy Batty in Blade Runner, Schwarzenegger’s T-800 in The Terminator,  Box in Logan’s Run,  Police robots in Elysium and  Otomo in Robocop.

And that’s to name but a few.  As a general rule of thumb, the closer the robot is to human form, the more dangerous it is and of course the ultimate threat in any Sci-Fi movie is that the robots will turn the tables and become the masters, not the mechanical slaves.  And whilst we are in reality a long way from robotic domination, there are an increasing number of examples of  robotics in the workplace.

ROBOT BLOODHOUNDS Sometimes by the time that one of us smells something the damage has already begun – the smell of burning rubber or even worse, the smell of deadly gas. Thank goodness for a robot capable of quickly detecting and analyzing a smell from our very own footprint.

A*Library Bot The A*Star (Singapore) developed library bot which when books are equipped with RFID location chips, can scan shelves quickly seeking out-of-place titles.  It manoeuvres with ease around corners, enhances the sorting and searching of books, and can self-navigate the library facility during non-open hours.

DRUG-COMPOUNDING ROBOT Automated medicine distribution system, connected to the hospital prescription system. It’s goal? To manipulate a large variety of objects (i.e.: drug vials, syringes, and IV bags) normally used in the manual process of drugs compounding to facilitate stronger standardisation, create higher levels of patient safety, and lower the risk of hospital staff exposed to toxic substances.

AUTOMOTIVE INDUSTRY ROBOTS Applications include screw-driving, assembling, painting, trimming/cutting, pouring hazardous substances, labelling, welding, handling, quality control applications as well as tasks that require extreme precision,

AGRICULTURAL ROBOTS Ecrobotix, a Swiss technology firm has a solar-controlled ‘bot that not only can identify weeds but thereafter can treat them. Naio Technologies based in southwestern France has developed a robot with the ability to weed, hoe, and assist during harvesting. Energid Technologies has developed a citrus picking system that retrieves one piece of fruit every 2-3 seconds and Spain-based Agrobot has taken the treachery out of strawberry picking. Meanwhile, Blue River Technology has developed the LettuceBot2 that attaches itself to a tractor to thin out lettuce fields as well as prevent herbicide-resistant weeds. And that’s only scratching the finely-tilled soil.

INDUSTRIAL FLOOR SCRUBBERS The Global Automatic Floor Scrubber Machine boasts a 1.6HP motor that offers 113″ water lift, 180 RPM and a coverage rate of 17,000 sq. ft. per hour

These examples all come from the aptly-named site www.willrobotstakemyjob.com    because while these functions are labour-saving and ripe for automation, the increasing use of artificial intelligence in the workplace will undoubtedly lead to increasing reliance on machines and a resulting swathe of human redundancies in a broad spectrum of industries and services.

This process has been greatly boosted by the global pandemic due to a combination of a workforce on furlough, whether by decree or by choice, and the obvious advantages of using virus-free machines – I don’t think computer viruses count!  For example, it was suggested recently that their use might have a beneficial effect in care homes for the elderly, solving short staffing issues and cheering up the old folks with the novelty of having their tea, coffee and medicines delivered by glorified model cars.  It’s a theory, at any rate.

Already, customers at the South-Korean  fast-food chain No Brand Burger can avoid any interaction with a human server during the pandemic.  The chain is using robots to take orders, prepare food and bring meals out to diners.  Customers order and pay via touchscreen, then their request is sent to the kitchen where a cooking machine heats up the buns and patties. When it’s ready, a robot ‘waiter’ brings out their takeout bag.   

‘This is the first time I’ve actually seen such robots, so they are really amazing and fun,’ Shin Hyun Soo, an office worker at No Brand in Seoul for the first time, told the AP. 

Human workers add toppings to the burgers and wrap them up in takeout bags before passing them over to yellow-and-black serving robots, which have been compared to Minions. 

Also in Korea, the Italian restaurant chain Mad for Garlic is using serving robots even for sit-down customers. Using 3D space mapping and other technology, the electronic ‘waiter,’ known as Aglio Kim, navigates between tables with up to five orders.  Mad for Garlic manager Lee Young-ho said kids especially like the robots, which can carry up to 66lbs in their trays.

These catering robots look nothing like their human counterparts – in fact they are nothing more than glorified food trolleys so using our thumb rule from the movies, mankind is safe from imminent takeover but clearly  Korean hospitality sector workers’ jobs are not.

And right there is the dichotomy – replacement by stealth.  Remote-controlled robotic waiters and waitresses don’t need to be paid, they don’t go on strike and they don’t spread disease so it’s a sure bet their army is already on the march.

But there may be more redundancies on the way as well.  Have you noticed how AI designers have an inability to use words of more than one syllable?  So ‘robot’ has become ‘bot’ and ‘android’ simply ‘droid?  Well, guys, if you continue to build machines ultimately smarter than yourselves you ‘rons  may find yourself surplus to requirements too – that’s ‘moron’ to us polysyllabic humans”!

Continue Reading
Do NOT follow this link or you will be banned from the site!