Chidinma's work mate has just had her Facebook account hacked. Someone is posting nude images on her wall. She has deleted them but Chidinma needs to explain to her the best way to protect her browser, so it does not happen again.
When Nasir is browsing the internet, he sometimes gets alerts that a virus just tried to get into his computer. Viruses can easily destroy all of the work on his computer and make it useless, but he does not worry because he practices safe browsing.
Nasir recently put up his email ID on a news and social forum. Now, he keeps getting over 50 spam mails in a day to sign up for irrelevant newsletters, free products and so on.
Nazir who works with Dundun Media house has a basic idea about IT security which he uses to protect himself online but he's still amazed by the ingenuity and determination of cyber criminals to break into computer networks. He wants to know the common ways in which his system can be breached.
Dolapo runs out of mobile data whilst waiting for her flight to Abuja where she holds a Campaign against "Girl Trafficking". She has to share a list of possible sponsors with her secretary. She connects to the airport wi-fi which is fictitious and now her communication has been intercepted.
Chidinma works with The Way Forward (NGO) to help locate sponsors of girl prostitution. She received several failed login attempts to their Facebook page but she isn't worried. She has enabled a 2-step verification for all their social media accounts.
Nasir is a correspondent for Dundun Media, which focuses on exposing corrupt practices amongst individuals in government. His laptop crashed and he urgently needs to send in his article for publishing tomorrow. He decides to use a neighbourhood cybercafe but is worried it may not be secure.
So, what is Digital Security and why do we need it? Before we go into that, let us tell you a little story of a man named Nasir...
Nasir and Dolapo are working together to track the activities of AGA on social media. They need to build up a case so law enforcement agencies can clamp down on AGA. How do they go about this, without contravening the Nigerian Cybercrime Act 2015
Nasir's computer was stolen and the results of his investigation on AGA and the story he was writing were unencrypted. He is worried that his sources may become compromised. If the documents had been encrypted then no one would be able to access them.