DATA - CYBER SECURITY
The City of Johannesburg’s controversial by-law on CCTV cameras could require the registration of smartphones, dashcams, and drone cameras if they are ever used to record public spaces.
Question: If mobile data is "Smartphones," who will collect, store, and register these devices? If there are already 65 million smartphones across all mobile networks. This would not include dash cams, CCTV cameras and or Digital cameras, which should also be on there as they are cameras and have the same capability as the rest.
How much data, manpower, and cost will it take to manage this operation? Zettabyte (1,000 exabytes), I would presume.
Who or what bright spark thought of this idea, and will POPI apply to this operation? I have already been chatting about Cyber Attacks in South Africa, Particularly and recently, .co.za, the Government has been attacked. Not to mention Banking institutions.
My question remains how is POPI managing this if they are also been attacked? Most recently posted a document to assist with online security. I have added a link to my Free Resources Folder 2025 If you wish to download the magazine for free. Other IT magazines are also there so please feel free to download them. (https://drive.google.com/drive/folders/1l7Vb8KaPsRNT8JrzEXCDxhcYDBFoG4Yo?usp=share_link for those with Apple devices can join my group. Apple Support: https://www.dhirubhai.net/groups/4539811/
On the subject of Cyber security, I have found that ????????? does not have enough properly qualified Cyber security people with the correct skill set. Top skills: Network Security ? Linux ? Wireless Penetration Testing ? Host & Networking Penetration Testing ? Security Operations.
Relevant knowledge: Cyberattacks and Defences, Computer Forensics, Cryptography, Risk Management, Web Architecture, Access Control and Intrusion Detection Technology, Security Defence Countermeasures, Malware analysis, Encryption, Web/Security analysis, Wi-Fi traffic analysis, Steganography, Cyber Crime/Investigation, and PENETRATION Testing.
Relevant Qualifications: eCertified Professional Penetration Tester (eCPPT); Certified Junior Penetration Tester (eJPT); IBM Cybersecurity Analyst; Certificate in Cybersecurity (Cape Peninsula University of Technology); CompTIA N+ certified; CompTIA S+ certified; Certificate in IT Technical Support (CTU), Currently pursuing CBBH (Certified Bug Bounty Hunter); Certified Web application Penetration Tester eXtreme (eWPTXv2).