Cyber Security

One of the biggest challenges that cybersecurity incurs in the whole industry of ICT is that entities conveys ungenuine identities by claiming who they are not, therefore intruding systems and causing damages which result in lack of trust among entities that exchange information. Moreover, though there would be trust on identity of entities exchanging information, entities trust each other for a given set of event of outcomes and context, but for other contexts there would be lack of trust for a given set of event outcomes. Here the challenge lies in how to trust not only identity of entities involved in exchanging information, but also in how to universally trust all possible event outcomes in which entities are involved. 

These challenges relating to building the trust among entities are found in emerging technologies that most African countries are embracing such as fin techs, etc. To ensure that identities of entities involved in transactions are private and real, transactions are safer, RURA Innovation and Cyber-Security Department is putting in place Cyber-security regulations tools based of the newly enacted ICT law by adopting and promoting enabling technologies such as the Digital Object Architecture, Public Key Infrastructure, and Blockchain with IoT. Indeed, since all these technologies incorporate the PKI, they are the right ones to address issues of unguine identities and unprotected transactions among entities exchanging information using different applications on the market.