• Home
  • News
  • Politics
  • Crime
  • Business
  • Sports
  • Health
  • Education
  • Interview
  • Special Report
  • Video
Trumpet News
  • Home
  • News
  • Politics
  • Crime
  • Business
  • Sports
  • Health
  • Education
  • Interview
  • Special Report
  • Video
No Result
View All Result
  • Home
  • News
  • Politics
  • Crime
  • Business
  • Sports
  • Health
  • Education
  • Interview
  • Special Report
  • Video
No Result
View All Result
Trumpet News
No Result
View All Result
Home Business

Opinion: Is UNEB’s New System in vulnerable environment?

Admin Trumpet by Admin Trumpet
January 29, 2019
in Business, Education, Featured, News
0
Opinion: Is UNEB’s New System in vulnerable environment?

IT Guru; Karamaji

By Raymond Karamagi

I read some IT experts’ opinions on TrumpetNews website. I also read that the UNEB examination system is new.

Before anyone can think of any system compromise, we may need to first confirm the standard systems Implementation methodology.

When UNEB was implementing their system, did they use system implementation standards?

Were user requirements well documented and signed off by UNEB officials?

Was the system’s specification document signed off?

Did UNEB end users carry out and sign-off the user Acceptance tests?

Were all configurations & Parameterization confirmed as well setup?

Why I am saying all this is because systems process what you give them. Gabbage in Gabbage out.

May be we need to interrogate whether the cheats did not include their flaws in the UNEB system implementation.

Now after system implementation, does UNEB consider system security as a serious matter? I know UNEB always does physical security of the exams and examination process, is this effort and investment put on the system?

If the following I.T systems security layers are not what UNEB has, then they need to think and act. May be may be not, their examination system may suffer a compromise and thus bring this confusion.

UNEB needs to secure the following

1) Information

2) Data

3) Web, Application & Database servers

4) Hosts, End points & Mobile interfaces

5) Internal users and external access

6) Internal Network

7) Network Perimeter

8) All the above need physical security.

So my opinion is that before any conclusion of system compromise (hacking), all the above in place and maintained as required, or the new system is in a vulnerable environment

The writer is an IT Specialist

Tags: Big StoryRaymond KaramagiUNEB
Previous Post

EAC Summit Set for Friday

Next Post

Business Exclusive: Supermarkets on Death Bed as Sports Betting Thrives

Next Post
Kayihura’s Vast Riches Exposed

Business Exclusive: Supermarkets on Death Bed as Sports Betting Thrives







Categories

  • About
  • Advertise
  • Careers
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • News
  • Politics
  • Crime
  • Business
  • Sports
  • Health
  • Education
  • Interview
  • Special Report
  • Video

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Contact Us