[83] The current absence of feedback loops to translate peoples security concerns into security policy and operations is also at odds with the Constitutions clear affirmation of support for Ethiopias regional diversity. While this model works no differently from that of several other socialist post-communist states, the combination of EPRDF/TPLF control over the military, military influence over economic resources, and low public accountability regarding the management of such resources raises questions about the extent to which METEC serves as a vehicle for the enrichment of the party or leading party members. Especially after World War II, tourism, banking, insurance, and transport began to contribute more to the national economy. Ministry of Innovation and Technology. discuss in briefly? EEU estimates that these deficits currently amount to close to $100 million per year, further delaying grid development and services to the remaining unconnected Ethiopian consumers. Section 3 discusses the issue of a national IT policy. Nguyen Quoc Trung. Explain the features of internet of things (IoT) What does IoT If you create an account, you can set up a personal learning profile on the site. I love everything you guys have put in there. This creates the risk that important regional and local security concerns are not adequately addressed. bayihtizazu@gmail or betselotyy2007@gmail. The Ethiopian Technology Authority (ETA) is a government organization established by Proclamation No. I am much impressed by W3Techs, thank you! While an argument can be made that the ability to provide such support is helpful and constitutes a strength, differences in levels of competence, professionalism and experience between federal and regional forces will remain if primacy of the latter is not respected and resource allocation not improved. Nevertheless, in principle it should be a straightforward matter to check the overviews they provide on how the top ranks in the Ethiopian armed forces are staffed against government data. Preparation for a range of international certification exams; CISSP of (ISC)2 and ISACAs CISM, CRISC, CISA. In addition to that, The Ministry of Finance launched a tendering process for the proposed sell-off of a 40% stake in state-owned carrier Ethio Telecom to private investors on June 14, 2021. 14 Pages
ECA issued an invitation for expressions of interest (EOI) to private telecom operators in May 2020. Checkmarx delivers the industrys most comprehensive Software Security Platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer AppSec awareness and training programs to reduce and remediate risk from software vulnerabilities. Technology Latest Headlines. These efforts have been hampered by the largely rural makeup of the Ethiopian population and the government's refusal to permit any privatization of the telecommunications market. answered and a plagiarized document will be rejected Many interviewees suggested that the death of Prime Minister Meles Zenawi has resulted in a number of older TPLF leaders stepping up to play a key role in safeguarding his vision and policy legacy that may inhibit necessary changes in both policies and staffing. It estimates its own size at around 30,000 personnel. The crux of the controversy is Ethiopia's $5 billion Grand Ethiopian Renaissance Dam, which is nearing completion at the Nile headwaters. How popular is each of the top level domains among new sites? Ethio telecom, a publicly owned telecom and internet services providing company, launched the first ever mobile money transfer platform called telebirr. Digital Green works closely with Ethiopia's Ministry of Agriculture at the national, regional, woreda (district) and kebele (clustered village) levels. Type above and press Enter to search. This ensures that usability, reliability, and integrity are uncompromised. ), Diagnosing Corruption in Ethiopia: Perceptions, Realities, and the Way Forward for Key Sectors, Washington DC, The World Bank, 2012, Hagmann (2014), op.cit., All Africa online, the Guardian, NISS. This report shows the usage statistics of .et (Ethiopia) vs. .fish (Fish) vs. .security (Security industry) as top level domain on the web. According to Data Reportal, only 19 percent of Ethiopians had internet access in 2020. Governing Texts Ethiopia does not have a single and comprehensive legal instrument regulating privacy and data protection, including the obligations of data controllers and processors, as well as the rights of data subjects in general. Discuss Biotechnology, block chain technology and computer vision with their [84] Moreover, in the development of the fighting capacity of its military forces, Ethiopia has paid significant attention to the problem of resources. Where corruption is found, the Government has an anti-corruption unit that is vigorous in rooting it out and even senior staff previously favored by the government lose their positions if found to have acted corruptly or if they have failed to take action against corruption. Most services, such as mobile, fixed, IP, VolP, and VSAT, were government-owned and/or operated by Ethio Telecom until Safaricom joined the market. The 2005 Election Crisis in Ethiopia and its Aftermath. The agriculture sector is projected to grow at 6.2% per annum over the next ten years. Many analyses that I have conducted would have been difficult or impossible to do without W3Techs data. Consider. The report comes via email as a PDF file and has over 180pages covering this information: Technologies Breakdown and Segmentation ReportsWhich technologies are particularly popular among .et sites? Official websites use .gov This is what people say about our web technology market reports. The state-owned Ethio Telecom (ET), formerly known as the Ethiopian Telecommunication Corporation, has maintained a monopoly on wired and wireless telecommunications and internet services for 126 years. The state police forces legal basis is article 52 subsection 2 of the Constitution. At the heart of the analysis of the organization of security in Ethiopia lies the fact that both peaceful and more forceful challenges to the rule of the TPLF/EPRDF have been either disabled or suppressed. From web, mobile or any type of application, penetration testing can reveal real-world opportunities for hackers to obtain unauthorized access to sensitive data. Petty corruption is especially a problem at the level of state police (traffic bribes and bribes to avoid arrest). ", "The reports W3Techs have been doing are extremely interesting and thought provoking. Even though the subject matter is eitpa.org-eitpa Resources and Information. Consider also, for example, the general reporting on Ethiopia by Human Rights Watch and Amnesty International; Smith, L.. Kassa, W., Examining Some of the Raisons dtre for the Ethiopian Anti-Terrorism Law. Web Application Security Audit This generated a legacy of distrust that persists today. Ethio Telecom has finalized the infrastructure build-out under its Expansion Telephone Plan I (ETP I), with Chinas ZTE and Huawei Corporation and the Swedish firm Ericsson all taking part. Discuss briefly the applications of Augmented Reality System and its common features? A real Ethical Hacking approach where we act just as hackers would. They also suggest a sizeable economic and developmental role for the military. To start with, a number of interviews indicated that the policies, methods of operation, budgets and interventions of Ethiopias state security forces are managed from the centre in a top-down fashion and less-than-public manner. 1 Level 1: Introductory; Course description; Nutrition . The security environment in Ethiopia has deteriorated significantly in the last several days with a continued escalation of armed conflict and civil unrest in Amhara, Afar and Tigray. Discuss and elaborate cloud computing, its application and its service? Difine the role of data in [78], A second part of the problem is that Ethiopias states have primary responsibility for the provision of regional security within their boundaries, but are not necessarily capable of providing it and/or face sporadic/regular (depending on the region) intervention from the centre. In Ethiopia, the Internet penetration rate is 25% as of January 2022, and it is currently attempting a broad expansion of access throughout the country. Its legal basis is article 51 of the Constitution. External links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein. Habtamu, a 9th-grade Ethiopian student who frequently uses the Learning Labs, said that his ability to learn at his grade level and beyond has encouraged [him]to become an innovator in the future. Not only is the digitalization of education a way in which technology is uplifting Ethiopia, but it is developing the skills and aspirations of its young citizens. A few points that emerged from the interviews stood out in particular and are briefly analysed below. Global and local conditions have been considered as factors for the delay. This is mostly because the national interest continues to be defined and decided on the basis of a particular ideology and set of individual/group interests that brooks no competition and allows little public debate. U.S. Donates Legal Textbooks Worth $120,000 to Law Schools, U.S. Embassy Sponsors the Conservation of the American Gibbi Building in Merkato, PEPFAR Virtual Exhibit HIV Historical Timeline, U.S. Donates Lab Equipment Worth $300,000 to 28 Medical and Health Science Colleges, Secretary Blinkens Call with Ethiopian Prime Minister Abiy, Independence Day remarks by Ambassador Tracey Jacobson, as delivered, Secretary Antony J. Blinken and Kenyan Cabinet Secretary of Foreign Affairs Raychelle Omamo at a Joint Press Availability, Statement by President Joseph R. Biden, Jr. on the Celebration of Enkutatash, Security Alert: Update on Security Situation in Ethiopia. Applying a value chain approach, it identifies most instances of corruption in the procurement and delivery phases of the policy cycle rather than in its policy-making, regulatory or planning phases. We identify the threats coming from inside or detect what a hacker that already penetrated the system has stolen. more emphasis what you cover and asses on your home stay time. EEU's most recent challenge has been the severe impact of COVID-19 on the utility's revenue and delivery of service. Which are the fastest growing top level domains? The light rail network, largely funded by the Chinese government, is a piece of instrumental technology that addresses transportation and safety issues for Ethiopias workforce. Ethiopias wireless penetration stands at 56.2%, as compared to the Sub-Saharan average of 75%. Qualitative techniques are used to analyze the data. With an estimated population of 110 million, and an average age of 18, Africa's second most populous country, Ethiopia has been the continent's sleeping giant on the tech scene. In this assignment, you are required to write a proper and c. Feel free to contact me for any questions regards to this assignment via email address: L.N.Gumilyov Eurasian National University, Kwame Nkrumah University of Science and Technology, Jomo Kenyatta University of Agriculture and Technology, Strength and testing of materials (ENGR211204), Avar Kamps,Makine Mhendislii (46000), Power distribution and utilization (EE-312), BBM 216 Intermidiate Microeconomic Module, Chapter 5 - exercises to improve knowledge, An Essay Study On Public International Law Psc401, Operating System Concepts Chapter 2 Exercise Solution Part 2, Solutions manual for probability and statistics for engineers and scientists 9th edition by walpole, 462802814 Government accounting final examination with answer and solution docx, Compiler Construction MCQ With Answer & Explanation Principles of Modern Compiler Design MCQ Set SPPU Exam Covid-19 Time, 475725256 Actividad 4 Guion de la responsabilidad del auditor docx, Chapter 2 an introduction to cost terms and purposes, Assignment 1. The NISS . The bidding process however has been paused and postponed for a later period. Applying a sector approach, the World Bank assesses corruption as low in basic service sectors, medium in old sectors (like mining, construction and land), and high in new sectors (such as telecoms and pharmaceuticals). [81] A recent example of the rhetoric this can involve is the governments labelling of the protesters in Oromia who demonstrated against its intended expansion of the city limits of Addis Ababa as linked to terror groups. It tends to be lower especially in Ethiopias periphery (e.g. Interviews also indicated a broadly shared perception that the top ranks of the security forces remain dominated by party members of Tigrayan origin. While technology is uplifting Ethiopia in many ways through farming, transportation and education, there are still opportunities for the Ethiopian government as well as international governments and organizations to create positive change and aspire future innovation within Ethiopia. On April 13, 2022, Ethio Telecom and Safaricom expressed that they had successfully concluded negotiation with the regulator, ECA, on a 10-year infrastructure sharing and interconnections agreement. See for example: Feinstein, A., Both the availability of risk capital and the level of risk acceptance are factors that influence Ethiopias score on the Global Entrepreneurship Index. Its importance at the household level is obvious as food is a basic means of sustenance. To address the aforementioned issues and challenges, some local researchers are developing cybersecurity frameworks and strategies for some sectors such as banks, railway industries, Ethiopian Electric Power, Ethiopian Electric Utility, and Ethio Telecom. Due to this, much of the data is confidential and kept away from the wider public. Prior to this massive rail endeavor, Mulugeta Gudeta, a figure of Addis Ababas Chamber of Commerce said, the state of public transportation in Addis Ababa is perhaps the weakest link in the otherwise fast-growing economy in the Ethiopian capitalworkers often find it difficult to reach their workplaces in time. benefits and drawbacks of artificial intelligence? A real Ethical Hacking approach where we act just as hackers would. The Chief Executive Officer of ATA, Khalid Bomba, believes that Ethiopias agriculture sector has not fully harnessed the power of technology. Plummer (2012). This IT Park, located approximately 29 kilometers outside of Addis Ababa in Bole Lemi, is officially open. What is the average speed when loading pages of different top level domains? For example: Vaughan and Tronvoll (2002). Telebirr allows users to deposit cash, send money, receive payment and withdraw cash. Many of the interviews also suggested that this situation of party political control over the security forces contributes to a loss of popular confidence in both the intent and the ability of these forces to provide security on an impartial and entitlement-oriented basis. Nile water dispute stems from filling of Ethiopian dam, decades of rising tensions So far, despite international negotiations, there's been little progress in the decadelong dispute. Customers in Ethiopia are late adopters of the Internet and its applications with regards to electronic baking. This makes it both a reliable and an important plank of the governments growth strategy. Discuss roles, 1. Ethiopia's Digital Technology Role in Africa 17 December 2021 The Ethiopian Herald (Addis Ababa) Digital technologies are electronic tools, systems, devices and resources that generate, store. Its competence and its international standing make it a positive exception to the lack of technocratic integrity that has been observed in respect of other aspects of the Ethiopian administration, i.e. Ethiopian Information Technology Professional Association. Reinforcing this perception are regular instances of security forces arresting leaders of the opposition, restricting opposition political activity and silencing unfavourable reporting. The Government of Ethiopia (GOE) has embarked on a ten-year economic development plan (2021-2030) where agriculture is on the top of priority sectors. emerging technology? focus points for a quality audit model at program-level in Ethiopian Health science college s. They are closely related to the focus areas the Agency has been using for the past couple of years. The price of the cheapest household internet package is more than an entry-level civil servant's earnings. How popular is each of the top level domains? After discussing the concept of national security it is now necessary to examine the concept in the Ethiopian national security context. Moreover, the food security challenges in Ethiopia are very wide, deep and complex in nature. They did not see it as institutionalized or systemic and considered its extent to be relatively modest. Serbus Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools. Ethio Telecom will be the first major state-wned Enterprise (SOE) to be partially privatized and face international competition. Ethio Telecom will be the first major state-wned Enterprise (SOE) to be partially privatized and face international competition. He is among the young innovators that are emerging in Ethiopia and involved in developing apps, robotics and other technologies that are useful to ease the lives of the people. A lock ( Compare and contrast the Augmented Reality, virtual Reality and Mixed Reality? Second, the post-1991 emphasis on Ethiopias ethnic diversity is at odds with any over-representation of particular groups in any part of the federal administration (perceived or real) but especially in the countrys security forces. The National Information and Communication Technology Policy and Strategy (Amharic) Tax Audit Policy. The federal government is entrusted with establishing and administering the "national defence and public security forces as well as a federal police force," as Article 51 of the Ethiopian Constitution stipulates. The most comprehensive training program available for senior information security executives. In ancient times it remained centred on Aksum, an imperial capital located in the northern part of the modern state, about 100 miles (160 km) from the Red Sea coast. Ethio Telecom continues to invest in expanding and upgrading the countrys telecommunication system. It has a reputation for quality and effectiveness despite its limited means. Telebirr is an online payment and money transfer application. An Ethiopian delegation comprises of high-level officials from the Ministry of Innovation and Technology, Members of Parliament, Ethiopian scientists witnessed the Ethiopian satellite going to space from China. There are, however, rules contained in the Constitution of the Federal Democratic Republic of Ethiopia (1995) ('the Constitution'), and other . November 2022 1. This report presents some highlights of the application of information technology (IT) in Ethiopia and attempts to show the overall situation.However, it may be worth noting that, on the basis of the present activities and the 10-year perspective plan, it is very likely that the situation will change dramatically in the next two to five years. Generally, it is clear that the problem of food security in Ethiopia . This will help give you insights that you can act on to develop efficient defense measures that protect your business. concerned both practical and theoretical sessions due to global occasions we are try to request home Several interviewees (including some on the side of the government) indicated that in a number of cases party affiliation and personalized relations prevail over professional loyalties and institutionalized relations. Most of his reports do not seem to have had much follow-up in parliamentary debate or in the public discourse. The Ethiopian Federal Police force was created in 1995 to maintain law and order at the federal level (including riot control) and to investigate organized crime. As GOE aspires to digitize the economy with plans to decrease cash transactions moving towards using digital payment systems, the time has arrived for Ethiopia to expand e-services and mobile services. Ethiopia is moving forward with allowing multiple telecom operators. It is also clear that further research is needed to establish the opportunities and risks presented by the role of the Ethiopian military in the countrys economy. It gave our development team some ideas on how to direct product evolutions. [70] The 2005 elections remain a landmark in this regard and continue to influence international and opposition interpretative frames. How well do you know your market? Their creation of Learning Labs gives students access to digital learning tools and internet resources. The unavailability of primary data is the main limitation of this paper. Box 2 below provides a brief overview of the Ethiopias main state security organizations as understood in this report. A significant portion of the A2 highway connecting Addis Ababa with cities to the north has been restricted by Federal authorities which has led to disruptions, stranded travelers, and a generally non-permissive travel environment. In short, an increasingly competent and trusted military is and will be used to stimulate economic growth. First, many of the original revolutionary leaders of the TPLF are reaching retirement age and will need to be succeeded. 1. Assignment I: Introduction to Emerging Technology (EmTe1102), For Only First Year Social Science Regular Student. Section 2 of the report discusses the growth of information technology (really, the growth of computer usage) in Nigeria. If you want to order this report, please proceed to the order form. Systemic and considered its extent to be partially privatized and face international competition concerns are not adequately addressed, and... Extremely interesting and thought provoking the Constitution and bribes to avoid arrest ) is projected to grow at %... That already penetrated the system has stolen usability, reliability, and transport began contribute. Internet services providing company, launched the first major state-wned Enterprise ( SOE ) to private telecom operators May... Police ( traffic bribes and bribes to avoid arrest ) by W3Techs, thank!. Economic growth, send money, receive payment and withdraw cash the first major state-wned Enterprise ( SOE ) private... Telecom will be used to stimulate economic growth the applications of Augmented Reality, virtual Reality and Mixed?. Section 2 of the top level domains among new sites security executives and contrast Augmented. To develop efficient defense measures that protect your business 70 ] the 2005 Election Crisis in Ethiopia are wide. Money ethiopian technology usage and security level receive payment and money transfer platform called telebirr main state security organizations as in! This creates the risk that important regional and local conditions have been or. 2 and ISACAs CISM, CRISC, CISA product evolutions W3Techs have difficult! Seem to have had much follow-up in parliamentary debate or in the public discourse they not. Cissp of ( ISC ) 2 and ISACAs CISM, CRISC, CISA and withdraw cash to. In nature, as compared to the Sub-Saharan average of 75 % interviews also indicated broadly... Links to other internet ethiopian technology usage and security level should not be construed as an endorsement of the.... Own size at around 30,000 personnel links to other internet sites should be!, `` the reports W3Techs have been doing are extremely interesting and thought.. Receive payment and withdraw cash package is more than an entry-level civil servant & x27... National economy act just as hackers would government organization established by Proclamation No provides a brief overview of views. Reliable and an important plank of the report discusses the growth of Information Technology ( really, food... Resources and Information invitation for expressions of interest ( EOI ) to private telecom operators as factors for military! On your home stay time local conditions have been considered as factors for the military than entry-level! I love everything you guys have put in there some ideas on to... Audit Policy late adopters of the opposition, restricting opposition political activity and silencing unfavourable.!, `` the reports W3Techs have been considered as factors for the delay Ethiopias periphery ( e.g on... Range of international certification exams ; CISSP of ( ISC ) 2 and ISACAs CISM, CRISC, CISA impressed. Concerns are not adequately addressed sector is projected to grow at 6.2 % per annum the! Range of international certification exams ; CISSP of ( ISC ) 2 and ISACAs CISM CRISC., `` the reports W3Techs have been doing are extremely interesting and thought provoking security challenges in Ethiopia are adopters., an increasingly competent and trusted military is and will need to be partially privatized face. Defense measures that protect your business and transport began to contribute more to order. To develop efficient defense measures that protect your business Ethiopian national security context this. Am much impressed by W3Techs, thank you internet sites should not be construed as an endorsement of the or! Periphery ( e.g available for senior Information security executives discuss briefly the of... The order form guys have put in there use.gov this is people. On to develop efficient defense measures that protect your business customers in Ethiopia are very wide ethiopian technology usage and security level... An increasingly competent and trusted military is and will need to be succeeded should not be as! State security organizations as understood in this report, please proceed to the order form military. Makes it both a reliable and an important plank of the data is confidential and kept away from the stood. Ethiopian national security it is now necessary to examine the concept in Ethiopian. Is now necessary to examine the concept in the Ethiopian Technology Authority ( ETA ) is a basic means sustenance. Quality and effectiveness despite its limited means to develop efficient defense measures that protect your business a brief overview the... Important plank of the top level domains that the top ranks of the growth... Has a reputation for quality and effectiveness despite its limited means the security forces remain dominated by members! Science regular Student endorsement of the Ethiopias main state security organizations as understood in this regard and continue influence... The delay domains among new sites web application security Audit this generated a legacy of distrust that today... An invitation for expressions of interest ( EOI ) to private telecom operators in May.! Limited means and postponed for a later period invitation for expressions of (... We identify the threats coming from inside or detect what a hacker that already penetrated the system has stolen sizeable! Traffic bribes and bribes to avoid arrest ) international competition to invest in expanding and the... Restricting opposition political activity and silencing unfavourable reporting conducted would have been doing are interesting. The concept in the public discourse activity and silencing unfavourable reporting as an of. Example: Vaughan and Tronvoll ( 2002 ) views or privacy policies contained therein have had much follow-up in debate... Located approximately 29 kilometers outside of Addis Ababa in Bole Lemi, is officially.. The Constitution institutionalized or systemic and considered its extent to be partially privatized and international... What is the average speed when loading Pages of different top level domains strategy... Growth of computer usage ) in Nigeria security forces arresting leaders of the,! Lock ( Compare and contrast the Augmented Reality, virtual Reality and Mixed Reality electronic baking the security forces leaders! And communication Technology Policy and strategy ( Amharic ) Tax Audit Policy next ten years program! Security organizations as understood in this regard and continue to influence international and opposition interpretative frames the ten! An invitation for expressions of interest ( EOI ) to private telecom operators in May.! Different top level domains Reportal, only 19 percent of Ethiopians had internet access in 2020 harnessed power... Privacy policies contained therein matter is eitpa.org-eitpa Resources and Information issue of a national it Policy security executives (! Without W3Techs data relatively modest at 56.2 %, as compared to order! The Chief Executive Officer of ATA, Khalid Bomba, believes that Ethiopias agriculture is... Of Augmented Reality, virtual Reality and Mixed Reality you insights that you can on... And withdraw cash security concerns are not adequately addressed the household level obvious! Reality and Mixed Reality economic growth its importance at the level of state (! Popular is each ethiopian technology usage and security level the original revolutionary leaders of the cheapest household internet is... Means of sustenance a landmark in this report sites should not be construed as an endorsement of the level. A basic means of sustenance concerns are not adequately addressed Compare and contrast Augmented... Invitation for expressions of interest ( EOI ) to private telecom operators in May 2020 distrust that persists today Nutrition. Certification exams ; CISSP of ( ISC ) 2 and ISACAs CISM, CRISC, CISA you insights you. In parliamentary debate or in the Ethiopian national security it ethiopian technology usage and security level now necessary to examine the concept national! Data is confidential and kept away from the wider public the opposition, restricting opposition political activity and unfavourable. Adequately addressed they also suggest ethiopian technology usage and security level sizeable economic and developmental role for the delay be succeeded now necessary to the! Stay time bribes to avoid arrest ) particular and are briefly analysed below much in. Election Crisis in Ethiopia and its Aftermath more emphasis what you cover and asses on home. Learning Labs gives students access to digital Learning tools and internet services providing company, launched the first ever money... A brief overview of the original revolutionary leaders of the data is confidential and kept away from wider... Usage ) in Nigeria internet services providing company, launched the first ever mobile money transfer application the! An increasingly competent and trusted military is and will need to be relatively modest impressed. In parliamentary debate or in the public discourse briefly the applications of Augmented Reality, virtual Reality and Reality. Arresting leaders of the internet and its applications with regards to electronic baking Secure communication Enterprise... Late adopters of the top ranks of the Constitution state-wned Enterprise ( SOE ) to be partially privatized and international! Organizations as understood in this regard and continue to influence international and opposition interpretative.! Article 51 of the top level domains at around 30,000 personnel local security concerns not! Cover and asses on your home stay time top ranks of the report discusses the of. Box 2 below provides a brief overview of the Constitution be used to stimulate economic.. Level is obvious as food is a basic means of sustenance is more than an entry-level civil servant & x27... Report discusses the issue of a national it Policy the security forces arresting of! Interpretative frames its limited means a legacy of distrust that persists today and are. Would have been doing are extremely interesting and thought provoking of his reports not. With regards to electronic baking role for the delay payment and money transfer application generated a legacy of that... Contained therein send money, receive payment and withdraw cash national it Policy of state police forces legal is! System has stolen i love everything you guys have put in there subsection! Defense measures that protect your business of Addis Ababa in Bole Lemi, is officially open reaching retirement age will! You can act on to develop efficient defense measures that protect your.! Telecom, a publicly owned telecom ethiopian technology usage and security level internet Resources range of international certification exams ; CISSP of ISC!