Hello hello, hey, Ian sir.
or can you hear me? I can hear you.
Yeah, it can get you a lot of effort. Yeah, let's give it a moment. So what else do you think about it? Sure.
So guys welcome to tonight's educational series. Since my eyes will be those is very special guest. We are with those, Jude. So let's give a moment for us as containers before we get
I believe that this is going to be an educational, our speaker person is really experienced and we are really in a 3-4-by-day day. We are really interested in what we have to see.
So guys please let's deform the tuition storage containers.
So guys, welcome to tonight's educational series. So tonight we'll be discussing about Sabbath security and privacy on the blockchain. I know many of you might be wondering how those Sabbath security works on the blockchain because most of us are from now with Sabbath security.
and most people who saw the IT or computer science, computer science students, they are familiar with sub-security and they believe it's for probably Web 2 that is no limited on the blockchain, but tonight we are going to hear more about sub-security and of course privacy on the blockchain.
And to be honest, the concept of privacy or the blockchain is not really known by a lot of the companies, most of them don't really know the use or the need for the privacy. But they believe that the blockchain is classified and there's nothing that can be done.
All right, good day everyone. Thank you for having me here on the Secret Network. Thanks to Poor Black and the entirety. Okay, so simply put on Jude, Judeozebe and I'm going to take advocate. I am Digital Transformation Consultant. I play
in the field of Web 3 and cybersecurity advocacy. Like you said, I've been here for a while, pushing for adoption of the digital economy. I'm also the founder and the convener of Cyberchain, which is a Web 3 advocacy
organization and will be carrying out events, conferences, webinars, trainings since 2018. I got into the space about 2017 and from that time till now, we've been doing our bit contributing our quota at different levels. So that just basically me. Thank you for having me.
So let's dive into tonight's discussion. So tonight guys, we will be discussing about cyber security and privacy on the blockchain. But before we get started, let's talk to you with what is cyber security and privacy web 2 before we come to the web 3D.
Okay, basically cyber security tools and measures that you apply to stasif online. Stasif online is two forms. First of all, protecting your digital identity.
then before you not talk about protecting your digital assets. So there are two things that has to do with you when you are in the digital space as it were two persons. First of all is protecting your digital identity. Afterwards you cannot talk about protecting your digital assets.
So cyber security basically at the business level is protecting who you are and what you have in the data space. Then privacy because cyber security is one thing, privacy is another.
you can decide to protect your assets and your identity, but you can also decide to be anonymous or be known publicly. So privacy now brought us on what level of content do you want the public to see about you?
So while on WarHand, you are applying cybersecurity to protect your personality so that your data identity is not stolen and your data assets are also not breached or stolen. You can also on the other hand determine the level of price
privacy you want. Do you want the entire world to know everything about you or do you want the world to know just a beat about you? You want everybody to know how much you sent to your girlfriend or how much donation you made or what you used your money to buy. You want them to know everything you'll tell
about your online transactions where you visited or you want them not to know anything at all. So that's privacy. And we're looking at it from the web to space. So looking at that, of course, when it has to do with your data assets,
then you'll be looking at authentication, you'll be looking at authorization. So what do you authorize? In a work level of authentication, do you want to give to your data assets? Looking at privacy, your communication, how secure do you want your communication to be?
So sometimes looking at work too, when you are on WhatsApp, you are chatting, you will see sometimes WhatsApp will show you that your communication is encrypted by end-to-end data encryption.
So that's the level of security and privacy. It is giving to you. In order was the message you are sending to your friend is only your friend that is receiving it. They are not making it public. That is for instant messaging.
However, when you make a post, for instance, on Facebook or on IG or TikTok, it can be seen by many. So that's not a fair-to-peer communication anymore. You know, everybody can see it. However, there's a higher level of privacy there too. You can now determine
Whether you want only your friends to see it or you want the friends of your friends to see it to their different levels of privacy which also falls and borders around Your cyber security posture now once you should know is whether you are on work two or three the moment
you go online, your digital footprint is expanding. If you are offline, your digital footprint is almost at zero level because you are not connected to any web. You are just where you are. So you can say something in your room and nobody will know what you said.
However, the moment you go online, your digital footprint has expanded. So if some people make a tweet and that tweet can put them in trouble, why then that tweet put them in trouble when they were in their house? Talking with your friends is because they were offline.
The moment you go online and you put a message out, your digital footprint has expanded. Somebody can crop your tweet. Someone can use a trade aggregator as a competitive trade for me and post it somewhere.
or even just save it. A five years later they can make reference to that tweet and that tweet can put you in trouble or that tweet can actually open doors for you. So the moment you start going online you know that your data footprint is expanding and as your data footprint is expanding the threat landscape is
is also expanding. Now for companies, when you're looking at privacy, data protection is important. We don't see companies talk about their expansion or their rollout plans on Twitter or LinkedIn. Those things should remain privates to the company. Those things should be open
offline because if you make so documents open you have exposed the data integrity of your company so data protection must also come into your privacy concerns. There's a whole lot to talk about but let's just keep it simple at this phase two, three levels.
Is that okay? Yeah, thank you very much. I love the parts you use analogies today, so this foundation is very simple and I believe everyone here should understand now what is the best of privacy web 2. Now let's talk about it with three aspects. What is the best of privacy web 3 and also what do we face with privacy web 3? Thank you.
Thank you very much. Okay, so cyber security in Web 3 is not different from cyber security in Web 2. The first thing we should understand is Web 3 is not necessarily a brand new technology. Web 3 is a combination of
three existing technologies. Web 3 is an improvement of Web 2 and Web 1. So if there was no Web 1.0, the crooks are being the Web 2.0. If there wasn't a Web 2.0, definitely they can't be Web 3.0, right? So that goes to tell all that Web 3
is an improvement on the flaws of Web 2 and Web 1. So the same principles of cybersecurity application you will use for Web 1.0 is the same principle you apply to Web 3.
like for companies, you have to implement unified trade managers, you have to implement firewalls, you have to implement online trading intelligence, you have to implement incident reporting. So for this, now this is called IT, right?
for data analyst. Now data analyst is different from when it comes to cybersecurity. So do that in charge of data integrity company as maybe a cybersecurity administrator. Yeah. The ad job is
to check on a daily basis for possible threats. That has to not do with threats monitoring. When you monitor and you suspect that a threat is coming to the network, there is a response that has to be done.
You first of all monitor if there is a threat. If there is a possible threat, there should be a response. Now this response is to mitigate against those threats. So when you act fast, you are able to mitigate against the threat.
by stopping them before they get into the company's network. For instance, even on your own mobile phone, perhaps you download an R, and whilst you are trying to do something you discover that your data is running faster than it used to run, your first suspicion should be that there's something wrong with
that app that you just downloaded or maybe your phone starts getting excessively hot. The first thing you should know is that app may be a vulnerable app that is trying to steal data from your phone. In some cases it may not be stealing of data.
some cases may just be the app is overwhelming your processor and some apps are like that. So it may not be a threat, it may just be an overdriven operating system or application, you can stop it. But in some other cases, it can be a threat. Now they are
Different tools, various tools you can use to protect your personal device or your corporate network environment. One of which is what I've mentioned a unified threat manager, if it's a competent environment, but if it's a small device like your phone, there are online threats detectors.
that you can use like simply put an anti-virus or an internet security software. Some VPN software, some VPN apps also come with threats, notifications or notifications that they will check. OK, possible is possible that