I was in secondary school when I got hold of a Korean drama named City Hunter🌆😍.
This drama dealt with government secrets, hacking techniques, cybercrimes, and Korean federal agencies.
In an episode, the actor named Poochai was searching for information about the products of a chemical company. He decided to sneak in, but shockingly to me when he got inside he took the shredded trash of the organization😲.
Then, I wondered why he did that; why he took the trash bin of the chemical company instead of searching through the building🔍. When he got home, he sorted the trash and taped together some documents📼. With that new document, he disrupted the company’s activities and got revenge on the CEO👏 .
In my study of Cybersecurity, I learned about the protection of data and privacy in an organization. From my studies, I discovered that the chemical company didn’t have good physical security and lacked proper disposal of confidential data.
Now, I will be kind enough to share the different safe practices I learned 😂. These practices include:
📍Turning the firewall on
📍Installation of antivirus and antispyware
📍Managing of operating system and browser
📍Setting up password protection
Read till the end to discover Poochai’s technique😉😋.
There are simple tips provided for setting up passwords:
📍Avoiding easy or guessable passwords
📍Use of passphrases in creating passwords
📍Better still, use a password manager (I use Bitwarden).
For the protection of privacy:
📍Ensure the use of two-factor or multi-factor authentication
📍Open authorization
📍Lookout for spoofing
📍Email and web browser privacy.
This course widened my horizon by listing best practices for posting, sharing, or removing data. Practices such as
📍Encryption (EFS, Encrypting File System is a window feature that encrypts data)
📍Backup Data to avoid losing vital information
📍Permanently deleting data by overwriting it (use of SDelete from Microsoft), physically destroying a hard drive or storage device.
The course advised individuals to understand how their data is used by reading the terms of service. Organizations should state clearly the use of customers’ data through data policy.
In earlier studies and courses taught by the cybersafe foundation, I discovered that what Poochai did is called dumpster diving (here it is now, my secret is out🤣🙈).
Dumpster diving is the act of searching trash physically or in recycling bins on computers for helpful information.
Oya now, my cyber gurus, what is the difference between
Two Factor Authentication and Multi-Factor Authentication?
Have you ever heard of Dumpster Diving?
Finally, have you watched City Hunter🙃?