-
Anonymous is real Governments up your game
Introduction With recent Anonymous hacking on Deputy President , Kenya Defense Forces twitter accounts and defacing of three government web sites it is important to understand hacktivists group Anonymous. Understanding Anonymous ideology and attack methods will help governments or targeted organizations to prepare for such attacks and how to mitigate them. Anonymous group of hackers… Continue reading
-
Can CCTV cameras help fight off terror?
Introduction The Government of Kenya is in the process of implementing Closed Circuit Television (CCTV) security system in major towns of the country . The huge financial commitment calls for a carefully considered strategy to implement this grand project. It’s important to carefully consider crucial factors that will ensure all components involve are functioning to… Continue reading
-
Exploitation of Network Centric Warfare Domain in Kenyas’ Politics
By Mwangi wa Ngugi (2008) Abstract The study of Network Centric Warfare and Network Centric Operations enables the understanding of how warfare missions are accomplished, organised, and interrelated. This study has revealed the outcomes of the exploitation of Network Centric Warfare and Network Centric Operations attributes. These attributes are Information, Physical, Cognitive and Social domains.… Continue reading
About Me
Peter Mwangi Ngugi – Bsc.Computer Science, Master Computer Security, CEH,MCITP,ACE
Specialization in Computer Security, Digital Forensics and Physical Security. Expert in a wide variety of
Computer Security, Digital Forensics, and Physical Security equipment and tools, both in the corporate industry and academia. Motivated to
provide tight security solutions and forensic investigations during these perilous times of cybercrime, fraudsters, unethical intruders, and
terrorism.
Recent Posts
- Exploitation of Network Centric Warfare Domains in Kenyan Politics – Reprint
- ‘Mulika Mwizi’ Phones: The Admissibility Challenge for 2G Evidence in Courts.
- Sample-Template for Information Security and Risk Management Awareness Training Program for your Organization
- From the archives: Phishing 06′
- Opinion: The Admissibility of Digital Evidence from Older, Active Handsets
Newsletter
google.com, pub-9127196933927426,DIRECT,f08c47fec0942fa0