Chronicle (Zimbabwe)

Cyber Security Ministry was long overdue

- Herbert Marufu

PRESIDENT Mugabe reassigned 10 ministers and made 8 new appointmen­ts in a Cabinet reshuffle on Monday. The former Finance Minister Patrick Chinamasa was assigned to head the Ministry of Cyber Security, Threat Detection and Mitigation. The new Ministry is mandated to deal with the growing abuse of the Internet. Cyber threats are increasing at an alarming rate every year and the ability for organisati­ons and countries to defend themselves against full-scale distribute­d attacks quickly and effectivel­y is becoming more and more difficult. In order to be safe and secure on today’s Internet, organisati­ons must learn to become more automated.

This means being capable of characteri­sing attacks across hundreds or even thousands of IP sessions and improving their ability to recognise attack commonalit­ies. With intrusion detection systems and trained network security auditors in place, organisati­ons and nations have a reliable means to prioritise, and isolate only the most critical threats in real time.

Chinamasa’s appointmen­t to the newly created ministry was long overdue as government­s across the globe are appreciati­ng the seriousnes­s posed by cyber threats. The Government, by enacting the new ministry, has demonstrat­ed its commitment to curbing emerging threats of regime change using various Internet platforms.

Social media and digital technologi­es have become a new threat to the New World Order. In the wake of the Arab Spring protests of North Africa in 2011, a considerab­le amount of attention has been focused on the role of social media and digital technologi­es.

The use of social media platforms has shown how collective intelligen­ce, dynamics of the crowd in participat­ory systems such as social media, have immense power to support a collective action — such as fomenting political change.

As of April 5, 2011, the number of Facebook users in the Arab world surpassed 27.7 million people. Some critics have argued that digital technologi­es and other forms of communicat­ion — videos, cellular phones, blogs, photos, emails, and text messages — have brought about the concept of a ‘digital abuse’ in parts of North Africa and South.

Facebook, Twitter and other major social media played a key role in the movement of Egyptian and Tunisian activists in particular. Nine out of ten Egyptians and Tunisians responded to a poll that they used Facebook to organise protests.

Zimbabwe has not been spared either as since last year the country has been under threat from the #Tajamuka/Sesjikile, and #downwitheG­oventment protest groups among others. Recently, Zimbabwe witnessed an arbitrary rise in the price of basic commoditie­s which was driven by social media-borne speculatio­n of imminent 2008-type of commodity shortages.

The establishm­ent of the Ministry is set to assist in dealing with the growing abuse of social media in the country.

During the Arab Spring, people created pages on Facebook to raise awareness about alleged crimes against humanity, such as police brutality in the Egyptian Revolution. Whether the project of raising awareness was primarily pursued by Arabs themselves or simply advertised by Western social media users is a matter of debate. Jared Keller, a journalist for The Atlantic newspaper, claimed that most activists and protesters used Facebook (among other social media) to organise.

He, however, argued that the sudden and anomalous social media output was also caused by Westerners who had interests and negative agendas, that broadcast them to further their interests.

Zimbabwe’s detractors who are bent on destroying the country have realised that they have failed to effect regime change using their traditiona­l modus operandi of strikes and demonstrat­ions and have resorted to social networks.

Minister Chinamasa, therefore, has a mammoth task on his hands. Likewise, in Western countries social media networks are sometimes the only instrument­s for rebels to co-ordinate their efforts and communicat­e among themselves.

The role of mainstream electronic media devices such as cell phones, emails, and video clips (e.g. YouTube) remain very important in spreading word about the country to the outside world. These too have also been abused. This justifies the need for a ministry which solely tackles the challenges posed by the various cyber-activities of the country’s citizens and other interested groups.

Security Concerns: The terminolog­y With the perpetual connectivi­ty to the Internet through multiple devices increasing cyber security concerns arise. Anyone can fall victim to cyber security attacks.

Cyber security brings with it an ever-evolving library of terminolog­y that at times can be difficult to understand. Below we attempt to demystify some of the more common terms utilized today.

Cybercrime Cybercrime is the act of using a computer or other Internet technology as a tool to commit illegal acts. Examples include piracy, phishing, fraud and identity theft.

Pwned Commonly used by gamers, “pwned” is computer slang, meaning “own.” For example, if you’re playing a game and another player beats you he can say that he “pwned” you. In cyber security, being “pwned” means that a hacker has gained control of your computer.

Torrent Files Files that are constantly moving across a network. Torrents are tagged so that any particular torrent can be located from anywhere on the network with the correct software.

Malware Malware (aka malicious software) is a software file or programme that has the power to contaminat­e your computer by infecting it with viruses, worms, spyware, trojans (malware disguised as legitimate software) and more. Malware can steal, delete, encrypt, hijack and alter sensitive personal data. Malware comes through the internet via email, software downloads and torrent files. If you have frequent spam pop-ups, your computer is extremely slow or it crashes often, you’re likely a victim of malware.

Ransomware Ransomware is a type of malware that locks your computer screen or files by freezing it, preventing access until a ransom is paid. This happens mainly with large organisati­ons and companies like universiti­es, hospitals and banks.

Ransomware generally starts with the appearance of an unusual file or notificati­on on the screen that will not allow you to use your computer, followed by instructio­ns on how to pay the ransom.

Ransomware can be accidently downloaded from websites, attachment­s from spam emails, or from a payload (component of a computer virus that executes a malicious activity). Ransom is asked in the form of money, gift cards and bitcoins so that the receiver cannot be traced. Paying the ransom does not guarantee your system will be unlocked.

To protect yourself from ransomware attacks, avoid clicking on links and opening attachment­s from strangers.

Avoid any phone calls where the caller is demanding an immediate payment for a civil or criminal offence that they are claiming you are responsibl­e.

Consider all of your alternativ­es to ensure that you’re backing up your most critical data in the safest way possible.

DDOS (Distribute­d Denial of Service) Attack DDOS is a single attack on your computer system from multiple systems which have been compromise­d by malware.

This attack creates an overload of incoming traffic and messages, causing the system to shut down. DDOS attacks utilise botnets (machines that have been compromise­d) through attachment­s and emails containing malicious software.

meOnce a system has been compromise­d, the attacker controls the systems, instructin­g them to flood your site with fake requests. The attack can last anywhere from minutes to months, depending on how long the attacker decides.

Additional informatio­n from www.uknow. uky.edu

 ??  ??
 ??  ?? Minister Patrick Chinamasa
Minister Patrick Chinamasa

Newspapers in English

Newspapers from Zimbabwe