2. Given the variability in privacy practices across platforms noted by Bradshaw et al. (2020), what steps can regulatory bodies take to ensure more consistent application of privacy standards?Answer: To address the inconsistencies highlighted by Bradshaw et al. (2020), regulatory bodies could create more unified, global standards for privacy policies, perhaps extending the principles of …
Author Archives: George Chukwuemeka
(Teaching Aide) ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND ECOMMERCE PLATFORM
INTRODUCTION1.1 Background of the studyIn the modern digital age, personal data has become one of the most valuable resources forbusinesses, leading to significant concerns regarding privacy and user security. Platforms suchas social media, email services, and online shopping sites rely heavily on user data to drivetheir business models, often collecting vast amounts of personal information. …
WALKTHROUGH ON ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND ECOMMERCE PLATFORM
This project is all about expanding our understanding of the complex issues surrounding data privacy, including how policies are written, how engaged users are, what the laws say, and the ethical side of things. It points out the need for easier-to-understand policies, stronger enforcement of regulations, and better education for users to truly protect their …
Server Security in the Era of ChatGPT
The critical role of security and compliance in managing applications and data environments is undeniable. Deploying a GenAI platform differs significantly from a standard Infrastructure as a Service (IaaS) setup, particularly in terms of data access rights and control. According to research by TechTarget’s Enterprise Strategy Group, even companies that initially favored cloud solutions are …
Three Questions and Answers on Packet filter firewalls
(Teaching Aide) PACKET FILTERING FIREWALLS
PACKET FILTERING FIREWALLS 2.0 Overview of Packet filter firewalls Packet filter firewalls are a foundational approach to network security, primarily functioning to control network access based on simple, predefined rules. It analyses data packets at the network and transport layers of the OSI model by examining packet headers and determining whether to allow or …
Continue reading “(Teaching Aide) PACKET FILTERING FIREWALLS”
Walkthrough on Packet Filter firewall.
The main purpose of this project is to extensively discuss packet filter firewalls mentioned during our lectures, understand, and document the operational principles of packet filter firewalls.It also throws more insight on the types, advantages, and limitations of packet filter firewalls in network security. This project also highlighted the core functions of packet filter firewalls …
Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects
This article highlighted how researchers explore the security vulnerability in the Nexus Android botnet’s command and control (C&C) panel. This security researcher exploited the vulnerability of C&C panel by compromising the panel to gain valuable threat intelligence. The article also highlighted the model of mobile Appinjects, which is use to gain the knowledge of overlay …
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
In the recent times hackers have been threat to organizations all over the world however these hackers claim to come from different regions and the North Korean hackers have been in news for the recent attack links to them which is known as undocument backdoor and remote access Trojan(RAT) called Veilshell. This is specifically built …
Continue reading “North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks”