DEV Community

Cover image for How my Kid’s tablet turned me into a Cybersecurity Analyst
DAPHNE Chiedu
DAPHNE Chiedu

Posted on

How my Kid’s tablet turned me into a Cybersecurity Analyst

How My Kid’s Tablet Turned Me Into a Cybersecurity Analyst
As a parent, I want my child to explore technology safely. But as someone stepping into the world of cybersecurity, I can’t help but instinctively assess risks even with something as mundane as my kid’s Lenovo Yoga Tab (Android).
Today, what started as a simple parental check-in quickly turned into an exercise in risk assessment, threat modeling, and log analysis and it's quite hilarious.
Before handing over the tablet, I did what any cybersecurity professional would do assess its attack surface. I know that outdated systems are a playground for exploits, so I checked if the tablet had the latest Android security patches and updated apps. I also disabled unnecessary permissions, and turned off developer mode to minimize potential risks. Keeping everything updated is the first line of defense.
Downloading a “harmless” kids' app should be simple, right? Not necessarily. Before installing, I would always check what data it collects and where that data goes. I also reviewed permissions: does a drawing app really need access to the microphone, location, and contact list? If so, why? Threat modeling isn’t just for businesses, it’s a mindset. Before trusting an app, I ask: What’s its purpose? What does it access? Where does my data go?
I make it a habit to review app permissions weekly. Checking which apps have gained new permissions since the last review, removing apps that are no longer in use, and I realized what i was doing was what any Security Operations Center (SOC) team would do to monitor logs for anomalies. Continuous monitoring is key.
Securing my kid’s tablet wasn’t just about protecting a single device—it was a hands-on exercise in real-world cybersecurity thinking. The same principles apply whether you’re securing a personal device or a large enterprise network: assess vulnerabilities, model threats before trusting applications, and continuously monitor and review permissions. I believe cybersecurity isn’t just for IT professionals it’s for everyone. And sometimes, it starts with a kid’s tablet.

Heroku

Deploy with ease. Manage efficiently. Scale faster.

Leave the infrastructure headaches to us, while you focus on pushing boundaries, realizing your vision, and making a lasting impression on your users.

Get Started

Top comments (1)

Collapse
 
kelechiedeh profile image
Kelechi Edeh

This is really insightful!

AWS Q Developer image

Your AI Code Assistant

Automate your code reviews. Catch bugs before your coworkers. Fix security issues in your code. Built to handle large projects, Amazon Q Developer works alongside you from idea to production code.

Get started free in your IDE

👋 Kindness is contagious

If this article connected with you, consider tapping ❤️ or leaving a brief comment to share your thoughts!

Okay