Maveric Cyber Command
The world increasingly interacts digitally through cyber space. Alongside the many benefits, it leaves individuals, organisations and governments open to cyber risks. These include the possibility of hostile cyber intrusions or attacks against Maveric NGO Sovereign States and the it’s interests. Working as part of a cross government effort, Cyber Command provides secret intelligence to help protect Maveric NGO Sovereign States from current and future cyber threats from a range of cyber actors whether from hostile states, terrorists and/or criminals.
Maveric NGO Sovereign States Cyber Command
Maveric NGO Sovereign States cyber advantage, we focus on identifying risks and opportunities at the earliest possible stage, shaping developments and preventing threats from emerging.
Integrating and conducting full-spectrum cyberspace operations, electronic warfare, and information operations, ensuring freedom of action for friendly neighbours in and through the cyber domain and the information environment, while denying the same to our adversaries.
The key responsibilities are:
- Synchronisation and
- Conducting of computing network operations
Capable of performing a full scale cyberspace operation against incoming cyberattacks.
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.
In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.
Mike Joubert (our resident Jedi) is the first Chief of Cyber Command and the only serving member of the Service officially named in public. And like every Chief in the service, Mike is simply known as “JEDI”. Since taking up his post in April 2019, JEDI is at the helm of all operations globally. Held accountable by the President, his vision and overarching aim is for Cyber Command to protect Maveric NGO Sovereign States from cyber attacks around the world.
Before joining Cyber Command, Mike began his career as an in the SAAF. Went on to study law enforcement subjects and was involved in law enforcement operations for some 12 years. From a wide range of roles in SAAF and law enforcement involving Information Technology in its early days in SA, Mike continued to study further and aquaint himself with modern deeper technologically spheres.
Common forms of cybercrime
Common forms of cybercrime include:
- Phishing: using fake email messages to get personal information from internet users
- Misusing personal information (identity theft)
- Hacking: shutting down or misusing websites or computer networks
- Spreading hate and inciting terrorism
- Distributing child pornography
- Grooming: making sexual advances to minors.
Top 5 Popular Cybercrimes to Effortlessly Protect Your Computer and Data Against its Impact
Phishing scams. Phishing is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information from a computer user. …
- Identity Theft scams. ...
- Online Harassment. ...
- Cyberstalking. ...
- Invasion of privacy. ...