<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Chineme</title>
    <description>The latest articles on DEV Community by Chineme (@ms_chineme).</description>
    <link>https://dev.to/ms_chineme</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F891984%2Ffc11908f-1850-4e08-b43a-57b5222fd38d.jpg</url>
      <title>DEV Community: Chineme</title>
      <link>https://dev.to/ms_chineme</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ms_chineme"/>
    <language>en</language>
    <item>
      <title>Here Is Why You Should Should Stop Using That Password!</title>
      <dc:creator>Chineme</dc:creator>
      <pubDate>Sat, 10 Sep 2022 20:17:50 +0000</pubDate>
      <link>https://dev.to/ms_chineme/here-is-why-you-should-should-stop-using-that-password-5b73</link>
      <guid>https://dev.to/ms_chineme/here-is-why-you-should-should-stop-using-that-password-5b73</guid>
      <description>&lt;p&gt;Password is one of the most critical things to look out for and also something to be careful with.&lt;/p&gt;




&lt;p&gt;There are different passwords many people should not be using,  and there are also password mistakes we make. Before we dive into these, we should know its definition.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What Is A Password?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;It is a word, phrase, or string of characters used to gain access to a site, app, network, device, or place. It is used to verify or authenticate one’s identity.&lt;br&gt;
Another word for it, depending on the context, is PIN or Passphrase.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PIN:&lt;/strong&gt; Personal Identification Number. PIN comes in numbers, used in debit cards, mobile phones, point of sale machines (POS), and home security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Passphrase:&lt;/strong&gt; It is a sentence combined with different words from a name or thing. Some people use each first letter of their names to form a passphrase e.g. &lt;em&gt;Daniella – “Dumb Avenge Nice Important Eleventh Lover Liver Ascend&lt;/em&gt;”&lt;br&gt;
Some people use this because it is easier for them to remember than a “&lt;em&gt;Y5gswP06:@97&lt;/em&gt;”.&lt;br&gt;
You can set your password as only letters, numbers, or symbols. For example “Laughing” or “Crying”.&lt;br&gt;
It can also be a combination of letters, numbers, and symbols, e.g. &lt;em&gt;P@ssw0rd&lt;/em&gt;, &lt;em&gt;D12ne1Y3&lt;/em&gt;.&lt;/p&gt;




&lt;p&gt;In this digital era, many people use devices, and apps and visit sites that require passwords, but unfortunately many use weak passwords, increasing the chances of their sensitive information and properties having unauthorized access by cyber attackers.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Different Password Mistakes People Make – The Don’ts&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Using their names, family names, or loved ones' names as passwords.&lt;/li&gt;
&lt;li&gt;Using their date of birth as their card PIN.&lt;/li&gt;
&lt;li&gt;Using common words or common combinations e.g. “Password”, “&lt;em&gt;Password123&lt;/em&gt;”, and “&lt;em&gt;Qwerty&lt;/em&gt;”. It sounds funny, but some people use these as their passwords.
You can use password checkers like Kapersky, NordPass, and other reliable ones to check the strength of your password. Use only password checkers you trust.&lt;/li&gt;
&lt;li&gt;Making use of simple numbers like &lt;em&gt;12345&lt;/em&gt;, &lt;em&gt;54321&lt;/em&gt;, &lt;em&gt;11111&lt;/em&gt;, etc as their PINS.&lt;/li&gt;
&lt;li&gt;Giving your passwords to people you don’t trust.&lt;/li&gt;
&lt;li&gt;Using the same password for everything. Don’t do this because if a hacker cracks your password for a particular site or app, you are in trouble because he or she can have unauthorized access to other things of yours just because you use one password for everything.&lt;/li&gt;
&lt;li&gt;Storing your passwords in your note apps or places that are easily accessible.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;strong&gt;How To Create A Secure Password&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use different passwords for different sites and apps.&lt;/li&gt;
&lt;li&gt;Use longer passwords. Starting from 8 to 20 letters or more.&lt;/li&gt;
&lt;li&gt;Use difficult passwords. e.g. “&lt;em&gt;Y5gswP06:@97&lt;/em&gt;”, “&lt;em&gt;X4&amp;amp;@UqKp06*+21Cmz£Gv&lt;/em&gt;”. Using passwords that combine letters, symbols and numbers will be difficult to crack through.
It will take a long time to hack passwords that look like the above. 
Note: The above password used is not my password. Please do not use the sample as your password because it has been exposed. The sample used is for educational purposes.&lt;/li&gt;
&lt;li&gt;If you use passwords that are hard to remember, please write them in places that unauthorized people will not easily access. It can be in your journal or personal jotter you do not carry around.&lt;/li&gt;
&lt;li&gt;Use a password manager. Some people would not want to think of how to compose hard passwords, and neither do they want to type them out every time they want to log in, so in situations like this, use a password manager.
This brings us to our next sub-topic.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;strong&gt;What Is A Password Manager?&lt;/strong&gt;&lt;br&gt;
A Password Manager is a software application that helps you generate, store and manage your password.&lt;br&gt;
Below are different great 1 managers you can try out. They have free and premium versions. The free versions are good, however, if you can afford the premium, use the premium because it gives you more features that can help keep your data safer.&lt;br&gt;
Some of the password managers are Keeper Security, LastPass, 1Password, Dashlane, NordPass, and other good ones. Go to their websites, read their features, pros, and cons, then decide on which one you would love.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://unsplash.com/photos/mgYAR7BzBk4"&gt;Cover Photo Credit&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Cheers&lt;/strong&gt;✌🏾&lt;/p&gt;

</description>
      <category>password</category>
      <category>passphrase</category>
      <category>pin</category>
    </item>
    <item>
      <title>Introduction To Cyber Security</title>
      <dc:creator>Chineme</dc:creator>
      <pubDate>Thu, 01 Sep 2022 19:31:15 +0000</pubDate>
      <link>https://dev.to/ms_chineme/what-is-cyber-security-4i9h</link>
      <guid>https://dev.to/ms_chineme/what-is-cyber-security-4i9h</guid>
      <description>&lt;p&gt;&lt;a href="https://unsplash.com/photos/C5pXRFEjq3w"&gt;Image&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cyber security is the protection of systems, networks, and data from digital attacks.&lt;/p&gt;

&lt;p&gt;The information I will share here will be on basic measures to protect yourself in the digital space. I will make this post basic, so those who know nothing about this topic will grasp it. This post is an introductory post.&lt;/p&gt;

&lt;p&gt;A good number of people know the simplified meaning of cybersecurity but do not know any other thing about it. It is a broad subject so this post is more like an introduction. Let us hop right in.&lt;/p&gt;

&lt;p&gt;Cyber security helps protect against cyber attacks. It has different layers used to fight cyber attacks and protect people and organizations in cyber space. They are network security, cloud security, application security, information/data security, end-user education, and more.&lt;/p&gt;

&lt;p&gt;A few days ago, someone shared a phishing (fraudulent) link on a WhatsApp group I belonged to; I informed the group members that it was fraudulent, to prevent them from clicking it.&lt;/p&gt;

&lt;p&gt;There are different methods by which attackers can infiltrate your network, data, or machine in cyberspace.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Here Are Some Methods By Which Cyber Attackers Can Infiltrate Your Device And Network:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Phishing&lt;/em&gt;&lt;/strong&gt; is a method cyber criminals use to steal your personal information through a link or attachment. When a potential victim clicks the link or downloads the attachment, malware gets installed in the devices and steals your information like credit card details, login details, and other personal information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Social engineering&lt;/em&gt;&lt;/strong&gt; is an act whereby the attacker manipulates you into divulging personal information for fraud.&lt;br&gt;
Malware: is a collective name for a file, code, or software created to cause damage to your site. It comes in different forms; viruses, adware, ransomware, spyware, worms, Trojan horse, and many more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Denial of Service (DOS)&lt;/em&gt;&lt;/strong&gt;: This is when an attacker disrupts a network service or/and shuts down your machine. The attacker does this by overloading your device with data, causing a disruption.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Distributed Denial of Service (DDOS)&lt;/em&gt;&lt;/strong&gt;: This is the method by which an attacker overloads a victim’s machine with data from multiple places at a time to disrupt the network or/and crash it. Just like DOS, this leads to network unavailability and machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;SEO poisoning:&lt;/em&gt;&lt;/strong&gt; It has to do with making sites that contain malware appear during a Google search. Cybercriminals infuse such sites with trending words so that these sites appear on top, leading potential victims to click on them. This will enable attackers to steal sensitive information from the victims or store malware in their devices for fraudulent purposes.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Should Cyber Security Be Your Concern?&lt;/strong&gt;&lt;br&gt;
Yes. People, Organisations, and the Government should be concerned about cybersecurity.&lt;br&gt;
Many people think that being inactive on social media or not using the internet often means they do not have an online presence. Let me inform you that if you use the internet, even for the littlest thing, you got an online identity.&lt;br&gt;
A cyber attack can affect your gadgets, networks, internet, and data. In this era, it is hard to see anyone, including children who do not use a device that connects online or whose information is not somewhere on the internet.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;How Do You Protect Yourself In Cyberspace?&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Be careful of the information you share with strangers online. Attackers can use certain information about you to defraud you.&lt;/li&gt;
&lt;li&gt;Turn off Bluetooth and Wi-Fi when not in use.&lt;/li&gt;
&lt;li&gt;Download apps and software from trusted sources. Do not download any of these from unreliable sources.&lt;/li&gt;
&lt;li&gt;Do not click on random links or suspicious links.&lt;/li&gt;
&lt;li&gt;Do not download attachments or files from unknown sources.&lt;/li&gt;
&lt;li&gt;Use passwords to protect sensitive data on your gadgets so that you do not have anyone snooping in.&lt;/li&gt;
&lt;li&gt;Use strong passwords on your gadgets. Do not use passwords that are so easy and weak.&lt;/li&gt;
&lt;li&gt;Use good password managers.&lt;/li&gt;
&lt;li&gt;Ensure you use two-factor or multi-factor authentication for apps and sites that have it.&lt;/li&gt;
&lt;li&gt;Back up your sensitive and relevant data on drives and clouds.&lt;/li&gt;
&lt;li&gt;Update your phone or laptop when there is a new update because sometimes upgraded security patches come with the updates. Also, update your software and apps.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;strong&gt;Can You Still Get Cyber-attacked After Taking Precautionary Measures?&lt;/strong&gt;&lt;br&gt;
Yes. Anyone can get attacked in cyberspace even after taking precautions while using the internet because cyber criminals are always looking for new ways to cause harm, so enlightening yourself on at least the basics of cybersecurity will reduce the chances of such happening to you.&lt;/p&gt;

&lt;p&gt;As time goes by, I will make several posts to break down different aspects of cybersecurity for you to understand so you can protect yourselves while using the internet.&lt;/p&gt;

&lt;p&gt;Cheers✌🏾&lt;/p&gt;

&lt;p&gt;...&lt;/p&gt;

&lt;p&gt;P.S: This is a slightly modified version of a post I made months ago on my former blog (mschineme.com). I no longer have access to the site.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>introduction</category>
      <category>phishing</category>
      <category>awareness</category>
    </item>
    <item>
      <title>How To Pass Your AWS Cloud Practitioner Exam In 2022 (+ Free Exam Voucher)</title>
      <dc:creator>Chineme</dc:creator>
      <pubDate>Mon, 22 Aug 2022 20:53:00 +0000</pubDate>
      <link>https://dev.to/ms_chineme/how-to-pass-aws-cloud-practitioner-exam-in-2022-free-exam-voucher-4190</link>
      <guid>https://dev.to/ms_chineme/how-to-pass-aws-cloud-practitioner-exam-in-2022-free-exam-voucher-4190</guid>
      <description>&lt;p&gt;Making a decision to start a career in tech might not be much of an issue, but figuring things out and trying to find a path? That's one thing that sounds easy but isn't.&lt;/p&gt;

&lt;p&gt;My cloud learning journey started towards the end of September 2021 when I came across Viktoria Semaan's (who leads global initiatives at AWS) &lt;strong&gt;&lt;a href="https://www.linkedin.com/feed/update/urn:li:activity:6841352185343721472?updateEntityUrn=urn%3Ali%3Afs_feedUpdate%3A%28V2%2Curn%3Ali%3Aactivity%3A6841352185343721472%29"&gt;post&lt;/a&gt;&lt;/strong&gt; about an AWS cloud training program for women that offered a free AWS CCP voucher. Before that time, I tried different tech fields to see where I would like or fit in. Story for another day.&lt;/p&gt;




&lt;p&gt;Back to the present, I've heard of cloud computing and been advised to try it by a few, but never thought of it as a career path until I saw that post. A program that would share resources, offer training, and still give me a voucher? I became curious about cloud computing and jumped right on the opportunity. It wouldn't be bad giving it a try, you know😌.&lt;/p&gt;




&lt;p&gt;I registered and joined the program. I could not follow up on the training because of my schedule. However, I gathered resources that were shared, met the requirements to get a free exam voucher, and was able to get it.&lt;br&gt;
Due to my busy schedule, I could not write the exam as early as I wanted, so I wrote it in December and passed 🎉.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here are the materials I used to pass the exam.&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://www.google.com/url?sa=t&amp;amp;source=web&amp;amp;rct=j&amp;amp;url=https://docs.aws.amazon.com/whitepapers/latest/aws-overview/aws-overview.pdf&amp;amp;ved=2ahUKEwjS0a-D1_r4AhVxgs4BHUYqC5sQFnoECBkQAQ&amp;amp;usg=AOvVaw1URnhBefTnpjddyw5sqFVp%0AAws%20registration%20link"&gt;Overview of AWS white paper.&lt;/a&gt; I couldn't finish reading it before my exam, though, it was helpful. If you read this, it covers the concepts you need to know to pass AWS CCP.&lt;/li&gt;
&lt;li&gt;A practice test on Udemy by Nadia Achlouje. It is currently unavailable in udemy for unknown reasons.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;👇🏾Here are other resources I didn't use but you may need to complement what you have for your preparation.&lt;br&gt;
Stephane Mareek - &lt;a href="https://www.udemy.com/share/103aFZ3@yL-jWNwWnRAdGi358QjDfhfXBiubRUnZvnUvkHXp8qpOhlI6v9DyLMif41weoob-/"&gt;AWS CCP practice exam on udemy&lt;/a&gt;&lt;br&gt;
Andrew Brown ExamPro Cloud Instructor - &lt;a href="https://youtu.be/SOTamWNgDKc"&gt;YouTube AWS CCP practice preparation&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Most times, I learn better with written articles when learning something than with videos. As a person, find which works for you.&lt;/p&gt;




&lt;p&gt;Why AWS Certified Cloud Practitioner?&lt;br&gt;
It contains the foundational aspect of AWS cloud computing that explains cloud fundamentals, AWS concepts, and services that can build your cloud knowledge. Having the certificate may also help boost your pay at your workplace and transition to a career in the cloud. &lt;a href="https://aws.amazon.com/certification/certified-cloud-practitioner/"&gt;Learn More&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;If you are a woman interested in starting a career in the cloud or learning about the cloud, will love to get free training, resources, and a voucher. You can join the AWS She Builds CloudU program, sponsored by AWS and Accenture. The program is a virtual program that spans 8weeks. It prepares you for AWS CPE, and after the program, you may get a free $100 exam voucher to take the exam. Register here for the next cohort, as the window opens occasionally.&lt;/p&gt;

&lt;p&gt;Here is a link to join &amp;gt; &lt;a href="https://awsshebuildscloudupcpe.splashthat.com/"&gt;REGISTER HERE&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Success!&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>aws</category>
      <category>exam</category>
      <category>cloudskills</category>
    </item>
  </channel>
</rss>
