Posts

Evaluation Blog

Image
 For the final time, I must give you the readers a final welcome πŸ˜“. I really did not want this to end but it had to be so. We are in the last bit of my blog where I will be rounding off it all.  The aim of this post is to evaluate how I used the Gantt chart in my project process. The Image above is a picture of a Gantt chart which is a project managing tool primarily used for organising tasks and maintaining fixed time for given work. It's showing the the time period between the 4th of April to the 23rd of may which I set as the total time period it would take to complete my project. It was made mainly to help me manage time and finish tasks under given deadlines. It has helped me finish my project efficiently and effectively cause of how it helped me mange time well. Reflecting on this process, I acknowledge the importance of well structured planning in achieving set goals.  Figure 1: Introduction to cyberattack This slide just gives an introduction to the vast topic of...

Secondary Research blog

Image
 Hey friends πŸ˜‰✌, we have come to the part of the blog where I show you my analysis of another blog to give an insight on the topic in question.  In a modern world which is very dependent on technology and use of the internet, technology has been adapted for both good and bad purposes. The book I will be analysing in this blog explains the nature of cyberattacks(aim), gives real life situations and how we can prevent them. The book in question is called " Cybersecurity and cyberwar: What Everyone Needs to Know by P.W. Singer and Allan Friedman(2014)".  It is very important for anyone who wants a basic understanding of cyberattacks and I can proudly say that I learned the following things from the journal article:  1. Aim of cyberattacks: The primary aim of such dubious πŸ‘Ί operations is to steal or destroy delicate information either personal or financial for personal gain.  2. Methods of cyberattacks: The main methods used are Ddos, phishing scams and malware at...

Primary Research Blog

Image
 Hello again readers πŸ˜„, we are on to the part of the blog where you'll see the feedback of people on the current crisis of cyberattacks. This data is essential cause it allows me to collect data from individuals directly that have experienced cyberthreats. By conducting such surveys, I can a unique insight into the most prevalent attack techniques πŸ’€ and ensures I have specific and current cyberattack trends from the people who have experienced it.  Below is the link to the google form I made for several questions relating to the topic in question "Cyberattack".  Google form Link So, you may ask. How did I ask my questions and to who did I ask them to ? πŸ˜•. I asked them based on the idea of the forms through which cyberattacks occur and I approached a random bunch of 10 students. As you can see below, these are 2 examples of some basic questions that were asked.  The above question brings room for controversial beliefs 😠, as people have varying insights based on th...

Introduction Blog

Image
Hello readers!  Welcome to my 2nd blog post where I will mainly be focused on the topic in question which is cyberattack.  Let's start simple, what's a cyberattack ?. Let's use the imagination here, we could say it's like an ambush 😣 but done virtually by cyber robber using codes to steal instead of high tech gadgets and equipment. Instead of cracking safes with robbing equipment, they use network encryptors like VPN'S to hide and steal delicate information. That is bad if I do say so myself.  Cyberattack And any one of you could ask the question, what's this have anything thing to do with me πŸ˜’and why am I researching it ?. My main reason for choosing topic is due to the rising cases of cyberattacks globally and the effects it's had on mighty global corporations. Just to summarise, it's a growing problem that needs more awareness and  really helps individuals know the right measures to stay safe online. While cyberattacks are a major threat, comprehend...

Boma's Cyberattack welcome blog

Image
 Hello Everyone, Welcome to my first blog, I am Boma Igonikon, a student at DMU and a Nigerian πŸ˜„ and o ver the next 5 blogs, we'll go through the eerie yet amazing of cyberattack  .We'll commence by knowing what a cyberattack is, go through the collected information, compare it intensively with expert analysis and give a summarized evaluation of what cyberattack means. As an individual apart from the ongoing vices of society which I try to solve. Source:  SC Media Here is a simple pic of the core focus of this blog. These are attack devised simply to steal your personal information πŸ‘Ώ, be it things like your ID, address or email or your financial details like your bank card number or pin. Source:  World Nomads Here's a pic of my home-city Lagos, a place full of culture and a vibrant atmosphere. Fun fact: Lagos is the most populated city in Africa with a population of 21 million and like most cities, it's a digital hub that relies on technology so much to run it's d...