Stephine Achunonu Profile
Stephine Achunonu

@SAchunonu

Followers
28
Following
1K
Media
17
Statuses
585

cyber security Engineer intern|| Certified Biochemist|| Ethical hacker in view||$BUBBLE

Joined August 2022
Don't wanna be here? Send us removal request.
@nathanielblow
Nathaniel Bassey
11 days
#HallelujahChallenge Let’s retweet until retweet is tired 😂
0
16K
18K
@hamster_kombat
Hamster Kombat
17 days
⚡️Hamster News | February 3⚡️ • Binance starts $1B SAFU shift with $101M Bitcoin buy • NY prosecutors raise alarm over GENIUS Act on fraud • Elon Musk merges SpaceX with his AI start-up xAI and more! 🚀 Watch every video closely to get clues that you can use later
53
8
124
@daa_lington
𝐳𝐢𝐥𝐥𝐲
5 months
that night before you japa >>
387
2K
17K
@nathanielblow
Nathaniel Bassey
11 months
My Bro/Sis, you see that thing you’ve been waiting on God for and almost thinking it would never happen, eh? very soon, much sooner than you think, It will happen. And you will come back to this particular tweet, to say “IT HAS HAPPENED.” IN JESUS’ NAME. You are blessed !
17K
24K
88K
@nathanielblow
Nathaniel Bassey
1 year
HALLELUJAH CHALLENGE OOOOOOOOO……. Are you ready !
1K
5K
22K
@SAchunonu
Stephine Achunonu
1 year
This exercise deepened my understanding of cybersecurity audits and industry standards. #mytechstory #tefemafricafellowshipchallenge
0
0
1
@SAchunonu
Stephine Achunonu
1 year
Goal: Protect customer sensitive info and align IT asset management with NIST Cybersecurity Framework. Using a provided template, I assessed Botium Toys' cybersecurity posture, identifying areas of compliance and non-compliance and security risks.
1
0
1
@SAchunonu
Stephine Achunonu
1 year
Week 2 Update: Cybersecurity Audit for Botium Toys I conducted a cybersecurity audit for Botium Toys, a US-based toy retailer expanding online. Objective: Identify vulnerabilities and ensure industry standard compliance.
1
0
2
@SAchunonu
Stephine Achunonu
1 year
Exploited expert: Examining vulnerability exploitation Preventive measures: Outlining steps for future protection #mytechstory #tefemafricafellowshipchallenge
0
0
1
@SAchunonu
Stephine Achunonu
1 year
Update on my TEFEM journey! As part of accessing cybersecurity breaches, I've made progress by examining: Key incident date: Analyzing when the breach occurred Affected organization: Understanding who was impacted What was taken: Identifying compromised data
1
0
1
@_okime
Okime🎀
1 year
I was swimming in scriptures sometime last year, and the Lord showed me something I'd never noticed in the story of Peter walking on water. If you read the passage well, you'd realize that Peter started sinking when he stopped looking at Jesus and started focusing on how scary...
145
3K
27K
@SAchunonu
Stephine Achunonu
1 year
Thank you so much ma Dr. @ireteeh for the data I really appreciate ma… God bless you and all those that have towards making this a success
0
1
1
@wilson_
WILSON
1 year
5 @absCat_AI NFT WL up for grab✳️ To win; ✳️Follow @wilson_ & @absCat_AI ✳️Like and Retweet ✳️Join tg https://t.co/xRJbS0OdI3 24 hours⏳
233
228
358
@cyber_razz
Abdulkadir | Cybersecurity
1 year
Objective Study Questions: Q1: What is the main difference between symmetric and asymmetric encryption? A. Symmetric uses one key; asymmetric uses two. B. Symmetric uses two keys; asymmetric uses one. C. Symmetric is slower than asymmetric. D. Asymmetric is only used for file
@cyber_razz
Abdulkadir | Cybersecurity
1 year
🚀 Cryptography 101: Symmetric vs. Asymmetric Encryption 🛡️ 🔑 Symmetric Encryption: •Uses one key for both encryption and decryption. •Fast and efficient but less secure for large-scale communication. •Example: AES, DES 🔑 Asymmetric Encryption: •Uses a pair of keys:
11
1
11
@cyber_razz
Abdulkadir | Cybersecurity
1 year
🚀 Cryptography 101: Symmetric vs. Asymmetric Encryption 🛡️ 🔑 Symmetric Encryption: •Uses one key for both encryption and decryption. •Fast and efficient but less secure for large-scale communication. •Example: AES, DES 🔑 Asymmetric Encryption: •Uses a pair of keys:
@cyber_razz
Abdulkadir | Cybersecurity
1 year
WHAT IS CRYPTOGRAPHY? in the simplest of definition Cryptography is the practice of securing information by converting it into unreadable formats (encryption) to protect it from unauthorized access, ensuring confidentiality, integrity, and authenticity.
2
4
11
@cyber_razz
Abdulkadir | Cybersecurity
1 year
CYBERSECURITY JOURNEY UPDATE: Just wrapped up Module 3 of my @BowTiedCyber Cybersecurity Bootcamp Networking+ section , and it was pretty exciting I dove into: •Bridges: Key players in keeping networks connected and efficient. •Ethernet Challenges: Learned how to identify
2
9
91
@alusi_aku
Alusi
1 year
to the people who truly needs it, drop your account details. i don’t need your reason(s) or plea. do not seclude yourself from others by deciding to privately texting me. i will block you. @aresofweb3 , help me select and send #5,000 to 30 people.
789
96
689
@im_tolumichael
Tolulope Michael
1 year
Hello, everyone It's 7:30pm 30k each for 34 persons Drop your account details in the comment section, my team will go around and randomly select the winners for today's Christmas giveaway. Good luck.
2K
753
2K
@AramideOyekunle
Jobs with Aramide
1 year
To getting a new job in 2025 🥂
25
184
1K
@im_tolumichael
Tolulope Michael
1 year
Are you confident or arrogant? Confidence isn’t about thinking you’re better than others, it’s about believing in yourself. It comes from knowing your strengths, accepting your flaws, and always trying to grow. Real confidence doesn’t need to be loud or show off, it speaks for
153
504
1K