despite the lack of guidance from a central government or sector regulatory. • As well as, Internet Service Providers (ISPs) have been able to provide much improved services. • For the last five years, there were very high development of Internet growth in Somalia.
via the EASSy cable. • SOMNET launched 4G LTE service. • Somtel launched 4G LTE with cooperation with Alcatel-Lucent • Contracts signed to build the DARE and G2A submarine cable systems. • Rapid development of Mobile Money • Federal Government approved National Communications Bill. Source: “https://www.budde.com.au/Research/Somalia- Telecoms-Mobile-and-Broadband-Statistics-and-Analyses”
connectivity. – Trust is assumed, no security • The Internet has become fundamental to our daily activities (business, work, and personal) NO ONE IS SAFE !!!
Protecting Information in Transit Ensuring Network Availability Preventing Intrusions Responding To Incidences Goals must be communicated to all users, staff, managers, through a set of security rules called “security policy”
for an organization: Protecting the organization’s ability to function Enabling the safe operation of applications running on the organization’s IT systems Protecting the data the organization collects and uses Safeguarding the organization’s technology assets
relating to information technology, the Internet, and virtual reality. The term Cyber Security is used to refer to the security offered through online services to protect your online information.
Response Team” was found in 1988. • A CERT is an expert group that handles computer security / Cyber Security incidents. • Alternative names: • Computer Emergency Readiness Team • Computer Security Incident Response Team (CSIRT)