<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">Oops…in my previous email the right word should be ‘social re-engineering’ rather than ‘social engineering’. </font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"> </font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">Social engineering is “a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures” </font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">or </font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">“the act of manipulating people or exploiting people's weaknesses to gain unauthorized access to secure information, assets, or facilities”</font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"> </font></span><span lang="EN-US"><font face="Times New Roman" size="3"> </font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">Social re-engineering is “the act of ensuring that the people-aspect of the information security spectrum is well taken-cared of”.</font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"> </font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">Kind regards</font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">Mwende</font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"> </font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman">References</font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman"><a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html">http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html</a> </font></font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="Times New Roman" size="3"> </font></span></p>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font size="3"><font face="Times New Roman"><a href="http://www.harriskern.com/index.php?m=p&pid=377&aid=64">http://www.harriskern.com/index.php?m=p&pid=377&aid=64</a><b style="mso-bidi-font-weight: normal"></b></font></font></span></p>
<br>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><i style="mso-bidi-font-style: normal"><span lang="EN-US" style="mso-fareast-language: EN-GB"><font size="3"><font face="Times New Roman">Disclaimer: Views expressed here are the author’s own</font></font></span></i></p>
<br>
<div class="gmail_quote">On Tue, May 5, 2009 at 1:42 AM, mwende njiraini <span dir="ltr"><<a href="mailto:mwende.njiraini@gmail.com">mwende.njiraini@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Thank you, Evans and Judy for your contributions to today’s discussion.<span> </span></span></font></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US"><span></span></span></font> </div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US"><span></span>Privacy is usually not a concern until one encounters an infringement.</span></font></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US"></span></font> </div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><font face="arial,helvetica,sans-serif"><span lang="EN-US">For example theft and misuse of personal information held the government, your bank, school, employer, local supermarket, etc may result in irritating phone calls/emails from a telemarketing agents who have gained access to your shopping patterns through loyalty cards or a surprise phone call from a long lost friend who has just seen your photo in an online version of ‘fashion police’</span><span lang="EN-US" style="FONT-FAMILY: Wingdings"><span>J</span></span><span lang="EN-US">!</span></font></div>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><span><font face="arial,helvetica,sans-serif"> </font></span></span></p>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unfortunately, most citizens do not have the time or money to start legal proceedings in this regard.<span> </span>Consequently, ‘social engineering’ has been proposed as the best method to overcome the challenges associated with infringement of privacy.<span> </span>This involves exercising your right to opt-in or out, carefully reading privacy policies and end user agreements.</font></span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"></span> </div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US">Further discussion on this topic is most welcome! </span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"></font></span> </div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Kind regards</span></font></span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Mwende</span></font></span></div>
<div class="im">
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US"></span></font></span> </div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US">
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><i><span lang="EN-US"><font size="3"><font face="Times New Roman">Disclaimer: Views expressed here are the author’s own</font></font></span></i></p></span></font></span></div>
<br><br></div>
<div>
<div></div>
<div class="h5">
<div class="gmail_quote">On Mon, May 4, 2009 at 9:57 PM, Judy Okite <span dir="ltr"><<a href="mailto:judyokite@gmail.com" target="_blank">judyokite@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">First- We need to create a culture of reading the terms and<br>conditions....on the websites.....that is always the first defense and<br>
that's why they have it there.<br><br>on the other hand - Your personal information being out there,without<br>your consent...is another thing altogether!<br><br>Secondly- a lot of capacity building(lack of a better word) is<br>
needed...as far as sharing personal information online is<br>concerned....from as early as introduction to internet ....whatever<br>kind of information,that is online, just make sure you will still be<br>proud of it 10 years to come, this will define you...whether its true<br>
or false....your have just created your online profile!<br><br><br>Kind Regards,<br>
<div>
<div></div>
<div><br>On 5/4/09, Evans Kahuthu <<a href="mailto:ifani.kinos@gmail.com" target="_blank">ifani.kinos@gmail.com</a>> wrote:<br>> The purpose of Information Security/Cybersecurity is to protect an<br>> organizations's valuable resources, such as information, hardware and<br>
> software. Through the selection and application of appropriate safeguards,<br>> Information Security helps the organization's mission by protectiing its<br>> physical and financial resources, reputation, legal position, employees, and<br>
> other tangible and intangible assets.<br>> The issue of cybersecurity/Information security simply comes down to three<br>> things: 1) Confidentiality, 2) Integrity and Availability.<br>> Information Security management/cybersecurity entails the identification of<br>
> an organisation's information assets and developemt, documentation, and<br>> implementation of policies, standards, procedures and guidelines, which<br>> ensure their Confidentiality, Integrity and Availability.<br>
> Unfortunately, cybersecurity is sometimes viewed as hindering the mission of<br>> the organisation by impossing poorly selected bothersome rules and<br>> procedures on users, managers and systems. On the contrary, if well<br>
> implemented, Cybersecurity rules and procedures can support the overall<br>> organisational mission.<br>> In the case of Kenya, the way to create a culture of cybersecurity is<br>> through management tools such as data classification, security awareness<br>
> traininig, risk assesment and risk analysis in order to identify threats,<br>> classify assets, and rate their vulnerabilities so that effective security<br>> controls can be implemented.<br>><br>> Regards,<br>
> Evans<br>><br>><br>> On Sun, May 3, 2009 at 10:59 PM, mwende njiraini<br>> <<a href="mailto:mwende.njiraini@gmail.com" target="_blank">mwende.njiraini@gmail.com</a>>wrote:<br>><br>>> Good morning,<br>
>><br>>><br>>><br>>> The focus of our discussion this week is on cybersecurity and trust. We<br>>> will seek to address privacy and data security issues.<br>>><br>>><br>>><br>
>> Like many other Kenyans, we frequently register to use various online<br>>> services provided by the government and businesses. The registration<br>>> process requires that we provide personal information including physical,<br>
>> postal address, telephone numbers, credit card numbers, etc. The younger<br>>> generation and the young-at-heart are readily sharing “personally<br>>> identifiable information” including photos and events through social<br>
>> networking sites including facebook, youtube, myspace, flickr, twitter,<br>>> etc.<br>>><br>>><br>>><br>>> Personal information collected and made available in the public domain<br>>> such<br>
>> as the electoral register, telephone directory can be combined with<br>>> information for example from supermarkets loyalty cards to create<br>>> valuable<br>>> market information to track individual preferences and purchase<br>
>> profiles.<br>>> This information may unfortunately be subject to abuse and theft.<br>>> Consequently, ‘trust’ in policies and the security measures that the<br>>> government and businesses establish to protect user information is<br>
>> therefore<br>>> an essential element for the success of e-transactions (both e-government<br>>> and e-commerce)<br>>><br>>><br>>><br>>> - How can we create a cyber security culture in Kenya? What is the role<br>
>> of the educators, peers and parents in digital literacy with respect to<br>>> privacy and security?<br>>> - Does the current legal environment provide for the protection of<br>>> privacy on the internet? How can we establish a balance between<br>
>> security<br>>> and right to privacy?<br>>><br>>> Looking forward to hearing from you.<br>>><br>>><br>>><br>>> Kind regards<br>>><br>>> Mwende<br>>><br>
>><br>>><br>>> References<br>>><br>>> 1. Protecting your Privacy on the Internet:<br>>> <a href="http://privacy.gov.au/internet/internet_privacy/index.html#2" target="_blank">http://privacy.gov.au/internet/internet_privacy/index.html#2</a><br>
>><br>>> 2. Privacy Policies: <a href="http://www.facebook.com/policy.php?ref=pf" target="_blank">http://www.facebook.com/policy.php?ref=pf</a>,<br>>> <a href="http://twitter.com/privacy" target="_blank">http://twitter.com/privacy</a><br>
>><br>>> 3. Article 12 of the Universal Declaration of Human Rights :<br>>> <a href="http://www.un.org/en/documents/udhr/index.shtml#a12" target="_blank">http://www.un.org/en/documents/udhr/index.shtml#a12</a><br>
>><br>>> 4. Office of the Privacy Commissioner of Canada: Protecting Your<br>>> Privacy on the Internet: <a href="http://www.priv.gc.ca/fs-fi/02_05_d_13_e.cfm" target="_blank">http://www.priv.gc.ca/fs-fi/02_05_d_13_e.cfm</a><br>
>><br>>> 5. Privacy illustrations:<br>>> <a href="http://www.priv.gc.ca/information/illustrations/index_e.cfm" target="_blank">http://www.priv.gc.ca/information/illustrations/index_e.cfm</a><br>>><br>
>> 6. <a href="http://www.diplomacy.edu/ISL/IG/" target="_blank">http://www.diplomacy.edu/ISL/IG/</a><br>>><br>>><br>>><br>>> *Disclaimer: Views expressed here are the author’s own*<br>>><br>
>> _______________________________________________<br>>> kictanet mailing list<br>>> <a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>>> <a href="http://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">http://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
>><br>>> This message was sent to: <a href="mailto:ifani.kinos@gmail.com" target="_blank">ifani.kinos@gmail.com</a><br>>> Unsubscribe or change your options at<br>>> <a href="http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com" target="_blank">http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com</a><br>
>><br>>><br>><br><br><br></div></div>--<br>"Each of us is great insofar as we perceive and act on the infinite<br>possibilities which lie undiscovered and unrecognized about us." James<br>Harvey Robinson<br>
<div><br>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br><a href="http://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">http://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br></div>This message was sent to: <a href="mailto:mwende.njiraini@gmail.com" target="_blank">mwende.njiraini@gmail.com</a><br>Unsubscribe or change your options at <a href="http://lists.kictanet.or.ke/mailman/options/kictanet/mwende.njiraini%40gmail.com" target="_blank">http://lists.kictanet.or.ke/mailman/options/kictanet/mwende.njiraini%40gmail.com</a><br>
</blockquote></div><br></div></div></blockquote></div><br>