Академический Документы
Профессиональный Документы
Культура Документы
IBM Security
Alex Kioni MSc, CISSP, CISM, CEH, ITILv3 Security Systems Lead Technical Consultant Central, East & West Africa Region
Local Trends
Data from the Banking Fraud Investigations Department (BFID) indicate that financial institutions reported Sh1.5 billion (~ $17.6million) was stolen from customers accounts in the year to April (2013). Businesses in Kenya are experiencing numerous cases of insider threat including data leakage and insider fraud. Poorly designed and insecure web applications expose Government and local financial institutions to possible compromise and defacement by cyber criminals. Automated attacks targeting Government & organizations in Kenya are going undetected due to poor detection and prevention methods.
2 IBM Security Systems 2013 IBM Corporation
Cyber criminals are selling stolen credit cards issued by Kenyan banks online for $10 US dollars. Kenya has a higher percentage of malware infected PCs compared to global averages. Kenyan ISPs have poor IP reputation scores leading to email and web traffic getting blocked. There is evidence of botnet activity originating from Kenya presenting the greatest threat to critical infrastructure and corporate networks.
Accused of stealing $3,791,329.05 (Sh328, 644,155.17) on July 8 at the Standard Chartered Bank head office.
Cyber criminals are selling stolen credit cards issued by Kenyan banks online for $10 US dollars.
Businesses in Kenya are experiencing cases of insider threat including data leakage and insider fraud
10
Government
The explosion of digital information and integrated infrastructure makes the Government and its agencies ripe for technology security breaches.
The chances of breaches in Government are, in fact, even greater and more varied than they are in private business and industry.
Not only does the federal government provide repositories for civil, state and defense secrets but we are in the process of integrating sensitive personal data such as citizen tax information, citizen registration, business registration, assets databases, and land registry. It also maintains vast technology infrastructures that run its operations and programs. Theft of government and citizen information or a cyber attack that compromises the ability to conduct government business can have serious and far-reaching consequences.
11 IBM Security Systems 2013 IBM Corporation
ibm.com/security
12