The Beginning-1

A thrilling piece

Mimi's Diary

Hello guys,

Welcome to my world!

God!!! I am so excited to be here and at last owning my own space and finding my solitude (you will get to find out soon why I choose to call it my space).

I don’t even know what to type or write about first but let me just bore you a little with my personal introduction.

Am a whole lot of things; a writer, a photographer, an environmentalist, a lover of art, a politician, an avid reader, a foodie, and of course my latest found hobby an adventurous tourist.

Don’t let me bother you too much with my hobbies because I will be talking about them one after the other in due time and how I come about becoming them.

My journey to creating this blog is actually a very funny but interesting one.

In 2016, a friend of mine just called me…

View original post 325 more words

Advertisements

THE UNENDING STRUGGLE IN NIGERIA

The unending struggle in Nigeria by Abdulwasiu A. Otuoze
I wonder if it was the people that oriented Nigerians about education that explained wrongly or it was Nigerians that understood wrongly.

When they said education for all, they didn’t refer to school alone. Look at developed and developing countries and how their children’s are being educated, regardless of the status, financial supremacy, political luxuriant of every parents in abroad, their child(ren) will still be engaged with after school job or business to suffice themselves and be independent in some sorts, and with such experience, they tend to have things to do after school that will be of benefit to their lives and living.

What we understand and practice in Nigeria is of myopic magnitude and different in direction, when a Nigerian child(ren) is in school, what he/she thinks and what the parents advice is to disengage from every other activities and concentrate on school and probably make first class or the best of grade as every parent will so desire.

It is paramount to have good grades as that is your basic aim of being in school but if that is your only goal then you are limiting yourself to only one tool.

As Abraham Maslow rightly said; “if the only tool you have is a hammer you tend to see every problem as a nail.” This is where our struggle becomes hellacious …

Every year in Nigeria, over three hundred thousand (300,000) students graduate from tertiary institutions, and about two hundred and fifty thousand (250,000) embark on NYSC, after their one year of service, let us assume only two hundred thousand (200,000) of them seek for job. Combining private, government and every other job opportunities yearly we won’t have up to hundred thousand (100,000) job opportunities, even if we decide to coincide in agreeing that hundred thousand (100,000) are employed, the remaining hundred thousand will be left unemployed.

This is a consistent repulsive condition that occur every year, apparently, nothing is getting better in Nigeria especially the case of unemployment, considering the analysed figure of unemployed graduates, it implies that over the last ten (10) years, over 10 million unemployed resides in Nigeria and 10 million more to join in the next 10 years if the situation didn’t get worse, though we tend to have more graduates every consecutive year.

I think this is where the affected will agree with George Santayana when he said; “A child educated only at school is an uneducated child.”

A definition we should reflect on is that; Education is the process of facilitating learning, or the acquisition of knowledge, skills, values, beliefs, and habits. When you learn a particular skill and develop such skills so as it can fetch you your needs, you are educated, the comedic portion of this is that to those that didn’t go far or at all in school measures your education with your capability, for instance, when you go back home having studied Electrical Engineering, you will be seen as unserious if you can’t repair some electronics or fix wiring of any sort even if you are a first class graduate. Though, they are wrong but not completely wrong and also not blameable, they are wrong because they don’t know what being an Electrical Engineer is and right because your education should reflect on what you can do.

A piece of advice I will confer to the imminent youths is to learn a skill and if you’ve already learnt one, then develop it. Otherwise, engage yourselves with business orientation, be business oriented and equip yourselves with acquisition and training certificates. We all heard the story of Jack ma and his likes, such stories are not just to inspire or motivate our conscience, it is to swing us into actions that will propel us to an unimaginable height.

Our efforts can put Nigeria in a better economic league. If our determination remain unshakeable, then together we can.

Abdulwasiu A Otuoze
University of Ilorin

The Western nations must not be the sole barometer by which Africa judges herself.

The Western nations must not be the sole barometer by which Africa judges herself.

The tumultuous events in Spain this weekend, and the silence of the EU, the UN, the USA, and most European governments (Belgium and Slovenia being the exception that have spoken up), shows the West will discard any rules that do not suit them.

The EU has stated the Catalonia matter is an internal Spanish matter for the Spanish to deal with. The British Foreign office have also released a similar statement. Majority of the limited ‘muted scolding’ is coming from opposition parties/opposition politicians in Europe.

HOWEVER, if the wide-spread crackdown in Catalonia had taken place in an African nation, the EU/UN/USA/Western Govts, would all be falling over themselves to scream – ‘Rule of law’, ‘Respect democracy’, ‘Illegal to try to stop a vote’, ‘Wicked to unleash the police against citizens’ etc etc.

They would be criticising that African nation, telling their nationals to leave as it is unsafe, threatening sanctions etc etc.

Please do not misunderstand. I am not knocking the West. The West has been a force for both good AND bad in Africa. However Africans must understand that whatever the West does, is mostly based on protecting and promoting its own interests.

Africa must look to itself for the answers to shape this continent into an economic and political powerhouse. We alone are our only ‘saviours’.

It is time our intellectuals, leaders of thought, writers, business titans, politicians, and ordinary citizens, begin formulating concrete ideals and ideas of what we want our individual African nations to be. ~ Bucky Hassan 2017

The Bad Apples in the State Governance

The President in his magnanimity and concern for the welfare of workers at state and local government levels, approved bail out money to states for the salaries of workers at those two levels, and specifically mentioned that the money should be channelled accordingly. State governors, a number of them, in their hard heartedness channelled the money in utter disobedience and without recourse to the welfare of the target population veered the allocated money to other things. Now they are shamelessly back demanding for further money. What sort of leaders are these people?
Yet they want to be regarded with semblance of being pro-people!
Rather than giving the state government, the Federal Government should demand the payment schedule of workers at state and local government levels and let the Federal system pay such directly to effect the clearance of the backlog of salaries and entitlements. Some people may not agree with this approach. And this may be strenuous and painstaking, but the people should be helped to get what is meant for them rather than giving money to these “Judas” called governors. Workers at state and local government levels have suffered enough in the hands of this bunch of bad managers to be allowed to continue to toy with the welfare of people.
Dr. Haroun Omeiza Isah

The Life of a Woman

The life of a woman
She bears pain than a man
She appears weak
But stronger than we think
She feels pain from a flow
A natural flow that she didn’t sow
A cramp painful than a stab from a knife
Yet she didn’t quit life
She feels pain during mating
Forget the joy, I’m not rating
For 9 months she carries a baby
Then gives birth and remain chubby
The pain of a woman in labor
More painful than a tumor
For year(s) she breast feed her progeny
With milk more comforting than the most calm symphony
Despite her pain
Her love is a gain
As a sister, she is the best
As a daughter, she is the sweetest
As a mother, she is beyond being best
In her hand, the world is held fit
Paradise lies in her feet
Regardless of any condition
She possesses the greatest power of intuition
She is the most special of God’s creation
She is a nation

©Abdulwaasiu A O
#BeDifferent

Here Are the New Members of the United Nations Security Council — TIME

(UNITED NATIONS) — Sweden and Kazakhstan won contested elections for coveted seats on the Security Council on Tuesday and the Netherlands and Italy ended a battle for another seat by agreeing to split the two-year term on the U.N.’s most powerful body. The U.N. General Assembly met to choose five new council members and it…

via Here Are the New Members of the United Nations Security Council — TIME

[MAN OF PEACE; REST IN PEACE] ADIEU MY DEAREST BROTHER

He is a friend, a brother, an ally. An agent of peace. I can’t still believe that our brother is gone. Life is indeed illusion. Words alone cannot express our taught and feelings. Though the song is ended but the melody lingers on.you will forever be remembered for your positive contributions to humanity. Your living love remains with us.                                      Life is indeed a phantasmagoria because in the long run we are all dead. Rest in peace my brother, friend, and mentor.     He is John Paul Ojoajogwu Usman [MAN OF PEACE, REST IN PEACE]                            ADIEU MY DEAREST BROTHER.

 

CYBER SECURITY, CYBER WARFARE,CYBER ATTACK, AND CYBER CRIME.

  1. CYBER SECURITY

This is defined as the maintenance and defense of information resources by addressing threats to information that are stored online i.e. by internetwork information systems.According to [1] Cyber security refers to the protection of everything that is potentially exposed to the Internet: our computers, smart phones and other devices; our personal information; our privacy; and our children.The Internet is an amazingly useful and versatile tool that has become indispensable for work, Education, personal entertainment, and staying connected with family and friends. Use it responsibly, while taking care to protect yourself and your data, and you will continue to find it a valuable resource

  1. CYBER WARFARE

This refers to conflict and attacks that are internetwork based in other to bring down a nation’s or organizational information systems such as networks and web sites so as to achieve some political or organizational goals. They are often motivated politically. It is a threat to lives of many nationals in the world because it enhances the stealing of confidential information and can cause a major disaster in online businesses and financial institutions. It also paves way for activities supported by military organizations with the purpose to threat the survival and well-being of society/foreign entity [2].

According to [3] “Cyber warfare refers to a massively coordinated digital assault on a government by another or by large groups of citizens” It is the action by a nation-state to penetrate another nation’s computers and networks for the purposes of causing damage or disruption. But it adds that “the term cyber warfare may also be used to describe attacks between corporations.

3.  CYBER ATTACK

Cyber-attack is an illegal attempt to harm someone’s computer system or the information it contains using the internet.[4]                                                                                                             Cyber-attack is intangible i.e they are crimes that occur in a virtual world. They are unlike the tangible wars that occur physically. Cyber-attack may be targeted. I.e. it may be targeted at specific persons, company or a nation. A successful attack will typically allow the attacker to gain access to the victim’s assets, allowing stealing of sensitive internal data and possibly cause disruption and denial of service in some cases. [5]

A typical example can be the actions of a jealous boyfriend spying on his girlfriend’s online activities by hacking into her social media accounts. Another example is a situation where an attacker exploits the vulnerabilities of an organization and attacks the organization by gaining an unauthorized access to their database server in which confidential documents or information is stored. Other examples of cyber-attack are listed below:

  • Mass mailing worms.
  • Trojans sent to various people via email.
  • Network attacks
  • Bypassing security mechanisms
  • Denial of Service (DOS) attacks
  • Distributed Denial of Service (DDOS) attacks

Though, the solutions to cyber-attack are not specific, this is because there are various ways through which an attack can be launched. But, some solutions are listed below:

  • Detect malware, communications and behaviour invisible to standard defense
  • Analyze the risk and characteristics of the attack and attacker
  • Adapt security automatically to provide protection
  • Respond using the insight needed to counter your specific attackers

 

  1. CYBER CRIME

A cybercrime is defined as an act involving the use of computers or other technologies to engage in criminal activity in a virtual setting such as the Internet. [6]

Cybercrimes share three elements:

  • Tools and techniques to perpetrate a crime
  • Approach or methodology for executing the criminal plan —known as a vector
  • Crime itself that is the end result of those plans and activities (a cybercrime is the main objective of the criminal’s activities)[7]

 

REFERENCES

[1] NJ Consumer Affairs. (2013) cyber security handbook [On-line]. Available: http://www.njconsumeraffairs.gov/News/Brochures/Cyber-Security-Handbook.pdf. [December 23, 2015]

[2] Isaca. (2014) cyber security fundamentals glossary [On-line] Available:http://www.isaca.org/knowledgecenter/documents/glossary/cybersecurity_fundamentals_glossary.pdf

[3] F. Schreier. (2015) dcaf horizon working paper no. 7 on cyber warfare. Available: http://www.dcaf.ch

[4] Cambridge Advanced Learners Online Dictionary. Available: http://dictionary.cambridge.org/dictionary/english/cyberattack.html [December 28, 2015]

[5] GFI white paper (2012) Targeted cyber-attacks. Available: http://www.gfi.com/whitepapers/cyber-attacks.pdf [january 3, 2016]

[6] Tommie Singleton et al.The top 5 cybercrimes. Amaerican Institute of CPAs. New York, 2013

[7] M. Dunk (2008) cloud security. Available :http://cloudsecurity.trendmicro.com/us/technology-innovation/cyber-security