Boma's Cyberattack welcome blog
Hello Everyone,
Welcome to my first blog, I am Boma Igonikon, a student at DMU and a Nigerian π and over the next 5 blogs, we'll go through the eerie yet amazing of cyberattack .We'll commence by knowing what a cyberattack is, go through the collected information, compare it intensively with expert analysis and give a summarized evaluation of what cyberattack means. As an individual apart from the ongoing vices of society which I try to solve.
Source: SC Media
Here is a simple pic of the core focus of this blog. These are attack devised simply to steal your personal information πΏ, be it things like your ID, address or email or your financial details like your bank card number or pin.
Source: World Nomads
Here's a pic of my home-city Lagos, a place full of culture and a vibrant atmosphere. Fun fact: Lagos is the most populated city in Africa with a population of 21 million and like most cities, it's a digital hub that relies on technology so much to run it's day to day activities. This blog is primarily focused on protecting places like this from cyberattacks.
Source: p-aratesh.org
This is my Uni, which although makes me tired from time to time, is where I've been carrying out my main research on cyberattacks. It's equipped with all the necessary equipment I need to carry out my research successfully. So, regardless of the reason which you need to know to to evade cyberattacks which could range from protecting personal info to saving your business. This blog will grant you the necessary knowledge you need to overcome cyberattacks.
Ever clicked a link and heavily regretted that decision ? Yes, same π. Cyberattacks of recent are increasing more than ever from suspicious links given to individuals π to global corporations. A recent review has shown the 4 main categories of cyberattacks which are; data breaches, network vulnerabilities, social engineering attacks and malware. These attacks exploit vulnerabilities in systems and lead to loss of delicate personal information and financial loss πΈ. This review emphasizes the usefulness of having good security measures to manage these threats effectively.
References: Dave, D., Sawhney, G., Aggarwal, P., Silswal, N. and khut, D., 2023. The new frontier of cybersecurity: Emerging threats and innovations.
P-Aratesh (n.d.) De montfort university. [Online image] Available at: https://p-aratesh.org (Accessed: 1 June 2025)
World Nomads (n.d.) Lagos cityscape, Nigeria. [Online image] Available at: https://www.worldnomads.com (Accessed: 1 June 2025).
Comments
Post a Comment