He said senior researchers and cyber security experts covered various topics on the subject matter. Thus, the workshop was facilitated through a blended approach comprising lectures, group work and presentations. Participants were able to assess the content and a certificate was issued after a successful completion of the workshop.
Speaking on the targeted group, TaGLA interim executive director Charles Senkondo said participants included computer security and technical support personnel, system administrators, network programmers, data base administrators and network engineers.
Others were ICT managers, auditors, military and police personnel and ICT stakeholders from the public and private institutions. While lecturing on fraud detection, investigation and prevention during a videoconference last year, Kenyan trainers Abdallah Komesha and Kitonyi Augustine hinted on cyber security.
They said since the effects of fraud including cyber attacks had far reaching consequences, organisations suffered financially and so managers should set clear guidelines and mechanisms of dealing with it. Although ICT has facilitated communication, it can easily be manipulated to steal personal information, cause financial losses and psychological burdens to victims.
Sometimes people receive e-mails from unknown sources and wonder how the senders managed to get their contacts. Others have their personal communication invaded by other users. This just shows the magnitude of cyber crime problem. Computer users everywhere are vulnerable to spyware.
This is a type of software that spies on what one does on one's computer by transmitting personally identifiable information (PII) from one's computer to some place without the user's knowledge. Spyware programmes collect personal information, such as internet surfing sites visited.
The result is slow connection speed, loss of internet connection or functionality of other programmes or computer damage.
"Key loggers record what keys one presses on one's keyboard and so we must be aware of this type of fraud," says Komesha, when explaining how personal information could be stolen by another user without one's knowledge. "Scammers can use one's details to steal one's online banking password or other personal information and use the information fraudulently.
A key logger can be connected to one's computer for fraud purposes without the knowledge of the user. So, it is good to familiarise oneself with how spyware is done to protect one's personal information saved on the computer," says Augustine. Spyware may cause direct and indirect economic decline due to losses suffered by prominent corporations and firms and their clients.
Through the use of computer and internet services, users can nowadays communicate faster, while in the past they relied on letter writing only, which was time consuming. So, letter writing has dropped considerably thanks to ICT advancement but there are side effects of ICT advancement, which we have to deal with to protect personal information from being accessed by other users.
Besides computers, mobile phones have also e-mail and SMS facilities. As a result, more and more people can access e-learning, e-government and e-commerce services and know what is happening. Yet, computer users must know about cyber security and protect their personal information from theft, while remaining linked to other users.
It requires detection and investigative skills to deal with cyber attacks, whenever they occur. Detecting spyware is difficult and should be made an aspect of routine business in both the public and private sectors. Resources must be allocated specifically for the task.
But all these risks can be minimised if more and more employees in the public and private sectors know how to protect personal, company, organisational or institutional information from being stolen, which can endanger people's lives and national security. It is also important to know how to protect one's computer from cyber attacks. So, knowledge is profitable and ignorance is costly. TaGLA workshop has proved that.
Most Popular Stories
- Bipartisan Budget Deal Gets Key Support in House
- TFA Recruiting DACA Recipients
- Bitcoin Clones Lurch Onto Financial Scene
- Clinton to Keynote Annual Simmons Leadership Conference
- Scotch Whisky Sales Raise Distillers' Spirits
- Holiday Shopping Off to a Slow Start This Season
- Health Coverage Disparities Emerge Among States
- Fake Deaf Interpreter Was Hallucinating, Has Schizophrenia
- Tea Party Glum in Face of Bipartisan Budget Deal
- Budget Deal Will Cut 220,000 Californians Out of Jobless Benefits