{"version":"1.0","provider_name":"OOC Advocates","provider_url":"https:\/\/oocadvocates.africa","author_name":"OOC","author_url":"https:\/\/oocadvocates.africa\/index.php\/author\/ooc-editor\/","title":"Mapping Cyberthreats and crimes in Kenya - OOC Advocates","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NfPuUXaTeW\"><a href=\"https:\/\/oocadvocates.africa\/index.php\/2023\/09\/04\/mapping-cyberthreats-and-crimes-in-kenya\/\">Mapping Cyberthreats and crimes in Kenya<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/oocadvocates.africa\/index.php\/2023\/09\/04\/mapping-cyberthreats-and-crimes-in-kenya\/embed\/#?secret=NfPuUXaTeW\" width=\"600\" height=\"338\" title=\"&#8220;Mapping Cyberthreats and crimes in Kenya&#8221; &#8212; OOC Advocates\" data-secret=\"NfPuUXaTeW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/oocadvocates.africa\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"By Allan Ong&#8217;ato, Advocate Cyber security refers to means of collecting the tools, policies, security concepts, guidelines, security safeguards, risk management approaches, actions, best practices, assurance and technologies that can be used to protect cyber technologies.[1]&nbsp; Kenya had for a long time lacked proper mechanisms to counter cybercrime. A cybercrime countermeasure is defined as an [&hellip;]"}