Monday, July 11, 2016

Cyber System In The Digital Age


CYBER SYSTEMS IN THE DIGITAL AGE  
The bad news is that the cyber systems that have become the underpinning of virtually all of aspects of life in the digital age are becoming increasing less secure. There are multiple reasons for this distressing trend. First, the system is getting technologically weaker. Virtually no one writes code or develops “apps” from scratch. We are still relying on many of the core protocols designed in the 1970s and 80s. These protocols were designed to be “open,” not secure. Now the attacking community is going back through these core elements of the Internet and discovering still new vulnerabilities.

So as new functionalities come online, their own vulnerabilities are simply added to the existing and expanding vulnerabilities they are built upon. The reality is that the fabric of the Internet is riddled with holes, and as we continue to stretch that fabric, it is becoming increasingly less secure. Additionally, vulnerabilities in many open source codes, widely in use for years, are becoming increasingly apparent and being exploited by modern “zero-day”

The bad guys are getting better. Just after the turn of the century, the NSA coined a new term, the “APT,” which stood for the advanced persistent threat. The APT referred to ultra-sophisticated cyberattack methods being practiced by advanced nation-state actors. These attacks were characterized by their targeted nature, often focused on specific people instead of networks, their continued and evolving nature, and their clever social engineering tactics. These were not “hackers” and “script kiddies.” These were pros for whom cyberattacks were their day job. They were also characterized by their ability to compromise virtually any target they selected. APTs routinely compromised all anti-virus intrusion detection and best practices. They made perimeter defense obsolete. Now these same attack methods, once practiced only by sophisticated nation-states, are widely in use by common criminals. The increasing professionalism and sophistication of the attack community is fueled by the enormous profits cyberattacks attacks, and the patching system we have relied on to remediate the system can’t keep pace. In 2015 Symantec estimates there are now more than a million malicious apps in existence. In fast-moving, early stage industry, developers have a strong incentive to offer new functionality and features, but data protection and privacy policies tend to be a lesser priority. The risks created by the core of the system becoming intrinsically weaker is being further magnified by the explosion of access points to the system, many with little or no security built into their development.

Conclusively: Some analysts are already asserting that there are more mobile devices than there are people on the earth. If that is not yet literally true, it will shortly be. It is now common for individuals to have multiple mobile devices and use them interchangeably for work and leisure often without substantial security settings. Although this certainly poses a risk of data being stolen directly from smartphones, the greater concern is that mobile devices are increasingly conduits to the cloud, which holds increasing amounts of valuable data.
By:  KIYABO NELLY
      BAPRM 42587

Effective Security Program


ENSURING AN EFFECTIVE SECURITY PROGRAM IN THE ORGANISATION
There are several elements that we have found to be critical to ensuring an effective security program in the organizations.
  • Be open and honest about the effectiveness of your security program and regularly share an honest assessment of your security posture with the executive team and board.
We use a data-driven approach that scores our program across the categories: risk intelligence, malware prevention, vulnerability management, identity and access management, and detection and response. Scores move up and down not only as our defenses improve or new vulnerabilities are discovered but also as threats change. The capabilities of the adversaries are growing, and you need a dynamic approach to measurement.
  • Invest in security before investing elsewhere. A well-controlled environment gives you the license to do other things. Great and innovative products and services will only help you win if you have a well-protected business.
  • Don’t leave the details to others. Active, hands-on engagement by the executive team and the board is required. The risk is existential. Nothing is more important. Your involvement will produce better results as well as make sure the whole organization understands just how important the issue is.
  • Never think you’ve done enough. The bad guys are smart and getting smarter. They aren’t resting, and they have more resources than ever. Assume they will attack.
Defending against cyber threats is not something that we can solve for our company in a vacuum. At Visa, we must protect not only our own network but the whole payments ecosystem. At the heart of Visa’s security strategy is the concept of “cyber fusion,” which is centered on the principle of shared intelligence—a framework to collect, analyze, and leverage cyber threat intelligence, internally and externally, to build a better defense for the whole ecosystem.
Championing security is one of Visa’s six strategic goals. This is an area where there are no grades—it is pass or fail, and pass is the only option. Cybersecurity needs to be part of the fabric of every company and every industry, integrated into every business process and every employee action. And it begins and ends at the top. It is job number one.
accounts had been compromised—a pivotal moment for our industry. The losses experienced by our clients, combined with the impact on consumer confidence, galvanized our industry to take actions that, we believe, will have a meaningful and lasting effect on how the world manages sensitive consumer data—not just payments. We are taking action as an ecosystem, to collaborate and share information across industries and with law enforcement and governments and to develop new technologies that will allow us to prevent attacks and respond to threats in the future.
Consumer purchases online and with mobile devices are growing at a significant rate. In order to prevent cyberattacks and fraudulent use of consumer accounts online, Visa and the global payments industry adopted a new payment standard for online payments. The new standard replaces the 16-digit account number with a digital token that is used to process online payments without exposing consumer account information.
By:  ULAYA SIJALI A. (BAPRM 42681)

Sunday, July 10, 2016

Challenges of Digital World




CHALLENGES OF THE DIGITAL WORLD
DIGITAL WORLD.
The digital world is the world where the best possible use is made up of digital technologies. It means the daily work which takes a lot of time to be completed is done with the help of digital devices (computer internet) in a shorter period of time with productivity and creativity. In today’s world most of the businesses are done in the websites, internet or trough social media compared to the traditional kind of business which was a face to face kind of a business. Even the office tasks such as meetings are done through the aid of internet.
The digital technology has brought about changes in the work place not only offices can be entirely virtual but also there is an emergence of different applications from the remote and mobile emails to video conferencing and tele working which brought about flexibility and efficiency in working places. In today’s world it is not necessary for a person to attend somewhere so that things can get done, or he can give supervision for a certain work but rather he or she can communicate through his or her digital device and give instructions from where he or she is.
Challenges:
Difficult to use the technologies: normally there is a learning process in every inverted technology.  Nowadays devices are becoming more complex as they offer a wide range of function. There is a risky of corresponding loss in terms of easy to use. Certain important parts of the user base particularly sensitive to easy of use, especially the older users or user with limited digital literacy. In the digital world there is a need of focusing attention on ensuring that a maximum number of people can use technology with a minimum amount of training.
Different regulations: the regulators must adopt quickly the changes on a certain technology and they must also remain conscious for the original rationale for regulation, such as the traditional definition of the tele-communication, computing and broadcasting. The regulators and policy makers have a special role in shaping the digital world of tomorrow. So new product converged in the market will blur the traditional tele-communication definitions but need to be classified, like are they tele-communication traditions? Do they qualify for broadcasting?  Not only such classification have an impact on how services are marketed and priced, but it will also affect how the regulators examine the level of marketing competition in a particular sector.
Creating, accessing and sharing:  the aim of having a digital world is to have a society where everyone will be able to create, utilize and share different information and knowledge. But there is an argument that not only should everyone have the ability to utilize and access information and knowledge but also to create and share that information and knowledge. This marke the shift from one way kind of communication where by societies used radios and television to get information to an interactive society. In which customers or consumers become content creators in their own right.
The security and privacy balance: the other challenge of living in the digital world is to strike the right balance between security and privacy. Through the inversion of digital technology people are able to access different kind of information that were meant to be of privacy. And other were not meant to be public matters because of security reasons.
KIYABO NELLY
BAPRM 42487

Digital Channels In Businesses


THE USE OF DIGITAL CHANNELS IN BUSINESSES
With the introduction of the first commonly used commercial websites in the 1990s, digital technology brought a new level of convenience to customers. However, digital convenience came at the expense of meaningful engagement as digital transactions substituted physical interactions. In addition, digital channels develop in isolation, resulting in inconsistency and dislocation between digital and physical channels.
The legacy is one of frustration for today’s customers, when for example they find they cannot complete an interaction they began online when they walk into the store. The frustration is particularly felt by digital natives who have grown up used to immediacy and convenience and expect to be ‘known’ at every interaction with a company, regardless of the channel in which they choose to engage. Now, however, new technologies exist that make it easier than ever before for companies to bring channels together, and to deliver a consistent engagement model whether customers choose to ‘tweet’ or to take their feet to the street.

 Innovative companies are taking the elements of each channel that their customers value most, and combining them to deliver a more valuable experience overall. For example, fashion retailer All Saints has integrated the convenience of web browsing in their physical stores by adding internet enabled kiosks on-site, so customers can browse and check availability on-line, and then try the item on in-store and get the best of both worlds. Apple stores use mobile Point of Sale terminals to add the convenience of ‘click to pay’ to their physical shopping experience and provide customers with an email receipt from the POS terminal.
Organizations must focus on delivering a seamless and meaningful cross-channel engagement model for their stakeholders. shows how the engagement model has changed to date, and how it may evolve in the future. To get this right will require an agile strategy that means incorporating the latest technology as it is released, and adopting a test and learn approach.

In conclusion of that, companies should adopt a continuous improvement strategy, launching new digital channels early and iterating based on customer feedback.

By:  ULAYA SIJALI A. (BAPRM 42681)

Saturday, July 9, 2016

E-GOVERNMENT

E-government (short for electronic government - is also known as e-gov, Internet government, digital government, online government, connected government). As of 2014 the OECD still uses the term digital government, and distinguishes it from e-government in the recommendation produced there for the Network on E-Government of the Public Governance Committee. According to Jeong, 2007 the term consists of the digital interactions between a citizen and their government (C2G), between governments and government agencies (G2G), between government and  citizens (G2C), between government and employees (G2E), and between government and businesses/commerce (G2B). Essentially, e-government delivery models can be broken down into the following categories:
  • G2G (government to governments)
  • G2C (government to citizens)
  • G2E (government to employees)
  • G2B (government to businesses)
This digital interaction consists of e-citizen at all levels of government (city, state/province, national, and international), governance, information communication and technology (ICT), and business process re-engineering.
The advantages of e-government
·         Democratization
One goal of e-government will be greater citizen participation. Through the internet, people from all over the country can interact with politicians or public servants and make their voices heard. Blogging and interactive surveys will allow politicians or public servants to see the views of the people they represent on any given issue. Chat rooms can place citizens in real-time contact with elected officials, their offices or provide them with the means to replace them by interacting directly with public servants, allowing voters to have a direct impact and influence in their government. These technologies can create a more transparent government, allowing voters to immediately see how and why their representation in the capital is voting the way they are. This helps voters better decide who to vote for in the future or how to help the public servants become more productive. A government could theoretically move more towards a true democracy with the proper application of e-government. Government transparency will give insight to the public on how decisions are made and hold elected officials or public servants accountable for their actions. The public could become a direct and prominent influence in government legislature to some degree.
·         Environmental bonuses
Proponents of e-government argue that online government services would lessen the need for hard copy forms. Due to recent pressures from environmentalist groups, the media, and the public, some governments and organizations have turned to the Internet to reduce this paper use. The United States government utilizes the website to provide “internal government forms for federal employees” and thus “produce significant savings in paper.
·         Speed, efficiency and convenience
E-government allows citizens to interact with computers to achieve objectives at any time and any location, and eliminates the necessity for physical travel to government agents sitting behind desks and windows. Improved accounting and record keeping can be noted through computerization, and information and forms can be easily accessed, equaling quicker processing time. On the administrative side, access to help find or retrieve files and linked information can now be stored in databases versus hardcopies stored in various locations. Individuals with disabilities or conditions no longer have to be mobile to be active in government and can be in the comfort of their own homes.
·         Public approval
Recent trials of e-government have been met with acceptance and eagerness from the public. Citizens participate in online discussions of political issues with increasing frequency, and young people, who traditionally display minimal interest in government affairs, are drawn to electronic voting procedures.
Although internet-based governmental programs have been criticized for lack of reliable privacy policies, studies have shown that people value prosecution of offenders over personal confidentiality. Ninety percent of United States adults approve of Internet tracking systems of criminals, and 57% are willing to forgo some of their personal internet privacy if it leads to the prosecution of criminals or terrorists.

BY FUMBUKA  SEIF   S


42554 BAPRM III

Start Your Own Business

Start your own business
1. Start with an idea
If you’re thinking of starting a business, you first need to come up with a realistic idea you can turn into a product or service.
Find local support, including help with developing business ideas:
Protect your intellectual property
You might already have an idea for a business, or have invented something you think people will want to buy. Find out how to protect your intellectual property to make sure nobody copies it without your permission.
ü  Turn your idea into a business                                 
1.Research your market - identify potential customers. Talk to them and find out if your idea is meeting a real need.
    2. Develop and plan - test your product or service with real customers, make changes, and test it again. Keep doing this until you’re sure there’s a demand for it.
     3. Find partners and suppliers - think about who you’re going to work with to develop and sell your idea.
       4.Set up your business - work out which legal structure is right for you, and register for tax.
  ü  Get funding
When you start a business, there’ll usually be a period when you’re investing lots of time, effort and money before you start making a profit. Before you do this, it’s important to research your market to make sure your customers will really pay for your product or service.
Once you’re confident they will, explore sources of funding to help with the costs of starting up your business.
ü  Government schemes
You might be able to get help from a government-backed support scheme if you need some initial funding to test and develop your business idea.
Search for business finance using the finance finder tool to see which schemes you may be eligible for.
ü  Get a bank loan
Once you can show that there’s a market for your idea, one option for funding your start-up costs is getting a bank loan. You’ll need to be able to:
       ·  give the bank realistic cash flow forecasts
        ·  prove that you’ll be able to pay back the loan with interest
Watch a video on forecasting business finances, including sales, profit and loss, and cash flow.
The bank might require you to provide security against your loan, like your house or car, in case you don’t repay. You should think carefully about how much risk you’re willing to take on before you get a loan or give any personal guarantees.
Find business finance in your area using the British Bankers’ Association’s finance finder tool, including business angels (individuals who invest in start-up businesses), regional funds, government schemes and banks.
Selling shares
If you need more investment, you might be able to raise money to fund your growth plan by selling shares in your business. You can do this by getting friends and family to invest. However, if this isn’t enough you can look for sources of ‘equity funding’, including:
      ·‘business angels’ (wealthy individuals who invest in start-up businesses)
         · ‘venture capital’ from companies who invest large sums of money in businesses that they think will grow quickly (known as ‘private equity’ companies).You should get legal advice before selling shares in your business.
BY NYANGE LINDA
BAPRM 42653

New Media

NEW MEDIA
New media is a 21st century catchall term used to define all that is related to the internet and the interplay between technology, image and sound. In fact, the definition of new media changes daily and will continues to do so. New media evolves and morphs continuously. What it will be tomorrow is virtually unpredictable for most of us, but we do know that it will continue to evolve in fast and furious ways. However, in order to understand an extremely complex and amorphous concept we need a base line.
A defining characteristic of new media is dialogue. New media transmit content through connection and conversation. It enables people around the world to share, comment on and discuss a wide variety of topics. Unlike any past technologies, new media is grounded on interactive community. Most technologies described as new media are digital often having characteristics of being manipulated, networkable, compressible, dense and interactive. This includes the internet, websites, computer multimedia etc. The rise of nee media has increased communication between people all over the world and the internet. It has allowed people to express themselves through blogs, websites, videos, pictures and other user-generated media.
New media is used to describe content made available using different forms of electronic communication made possible through the use of computer technology. Generally new media describes content available on-demand through the internet. This content can be viewed in any device and provide way for people to interact with the content in real-time with the inclusion of user comments and making it easy for people to share the content online and in social with friends and co-workers. New media includes websites and blogs, streaming audio and video, chat rooms, email, on line communities and web advertising.
New media is a way of organizing cloud of technology, skills, and processes that change so quickly. New media can be characterized by the variegated use of images, words and sounds. These internet of image, words, and sounds are different from old media formats. New media holds out a possibility of on-demand access to content anytime, anywhere on any digital device as well as interactive use feedback, creative participation and community and formation around the media content.
New media has a profound effect on three of the most essential categories of society in the 21st century that is economics, politics and the exchange of ideas. The most interesting part of new media has to do with restructuring of research, global economics, social interaction and the currents of writing and dissemination o all information that has accompanied its emergence.
Another importance of new media is democratization of the creation, publishing, distribution and consumption of media content. What distinguishes new media from traditional media is the digitizing of content into bits.
BY: KIYABO NELLY
BAPRM 42587