Connect with us

TechNews

NCS South West Chapters sensitize Internet users on safety, security amidst Covid-19 pandemic

Published

on

Comercio
NCS South West senimar on COVID-19 and internet safety

A consortium of Nigeria Computer Society (NCS) State chapters comprising Lagos, Oyo Osun, Ogun, Ondo and Ekiti, have called for increased awareness among internet users to stay ahead of cyber criminals who are exploiting the present coronavirus pandemic to unleash havoc on individuals, organizations and nations.

This is contained in a communique issued at the end of a virtual seminar hosted by the consortium of NCS Chapters for parents, educators, professionals across various disciplines and moderated by Dr. Seyi Osunade and Dr. Ronke Thompson.

COVID-19

Coronavirus pandemic

Different speakers raised important points in the course of the seminar:

Risks Applicable to Internet Users:

In a keynote presentation by the Coordinator, NCS South West, Dr. Bukola Onashoga on Risks Applicable to Internet Users, she explained the relationship between COVID-19 and Internet security. She acknowledged that the emergence of COVID-19 has changed our ways of life and that many businesses and activities are now being conducted online. Consequently, this has led to proliferation of new attacks in the cyberspace, which include: phishing, viruses, worms, malwares, ransomware etc. Dr. Onashoga further discussed what to do and available solutions to the Internet threats.

Dr. Bukola Onashoga

Dr. Bukola Onashoga

She emphasized good password creation, and demonstrated how to create a master password on the web browsers; such as Firefox or Opera mini which gives access to users’ accounts in a secured way.

Dr. Bukola Onashoga, an Associate Professor of Information Security and the immediate past Head of Department of Computer Science, Federal University of Agriculture, Abeokuta Ogun State, Nigeria, also demonstrated the use of password manager.

Child-Centered Cybersecurity

Prof. Karen Renaud also spoke on Child-Centered Cybersecurity highlighting the need for age appropriate techniques to inform and teach security measures to children.

She spoke about the 3C’s: content, contact and conduct that can be used to moderate children use of the Internet.

e-learning

Children using e-learning tools

Renaud emphasized the need for adults to be informed and trusted to serve as guides for children online.

Malware

On his session, Mr. Olu Olumuyiwa focused on malware, stressing that malware is one of the most dangerous threats to the internet world.

The speaker identified the origin and features of various software-related attacks on Internet and its users.

He highlighted signs of infection, mode of spreading and how to stop the possibility of being attacked by malware.

SophosLabs

SophosLabs’ sample of WHO COVID-19 Email Scam

The speaker, Mr. Olumuyiwa is a professional technical consultant in Hewlett Packard, USA where he serves as a certified Lead Consultant in software Defined Networking alongside experiences in F5, Firewall, Routing, and switching management.

Practical demonstration of cyber-attacks and their mitigations

Similarly, Mr. Victor Funmipe Olofinlade the Manager, Security Operations center, CyberSOC Africa, a security professional with experience in the tech-space, spoke on Attack methodologies and practical demonstration on how to combat cyber-attacks.

The speaker who dwelt on practical demonstration of cyber-attacks and their mitigations, mentioned common hacking techniques.

He remarked that social engineering and phishing attacks top the list of commonly deployed hacking techniques.

COVID-19

SophosLabs tracking how the use of “COVID-19” and “coronavirus” in domain names, spam, phishing attacks, and malware has skyrocketed

“Social engineering occurs when people are being lured into divulging their credentials and sensitive information, while Phishing occurs through downloading of executables”, Olofinlade said.

The speaker also made exposition on phishing attack vectors like embedded pdf and docs, fake websites and malicious links.

He mentioned some online tools that can be used to identify attacks.

Advertisement
Click to comment