How my Kid’s tablet turned me into a Cybersecurity Analyst

How My Kid’s Tablet Turned Me Into a Cybersecurity Analyst
As a parent, I want my child to explore technology safely. But as someone stepping into the world of cybersecurity, I can’t help but instinctively assess risks even with something as mundane as…


This content originally appeared on DEV Community and was authored by DAPHNE Chiedu

How My Kid’s Tablet Turned Me Into a Cybersecurity Analyst
As a parent, I want my child to explore technology safely. But as someone stepping into the world of cybersecurity, I can’t help but instinctively assess risks even with something as mundane as my kid’s Lenovo Yoga Tab (Android).
Today, what started as a simple parental check-in quickly turned into an exercise in risk assessment, threat modeling, and log analysis and it's quite hilarious.
Before handing over the tablet, I did what any cybersecurity professional would do assess its attack surface. I know that outdated systems are a playground for exploits, so I checked if the tablet had the latest Android security patches and updated apps. I also disabled unnecessary permissions, and turned off developer mode to minimize potential risks. Keeping everything updated is the first line of defense.
Downloading a “harmless” kids' app should be simple, right? Not necessarily. Before installing, I would always check what data it collects and where that data goes. I also reviewed permissions: does a drawing app really need access to the microphone, location, and contact list? If so, why? Threat modeling isn’t just for businesses, it’s a mindset. Before trusting an app, I ask: What’s its purpose? What does it access? Where does my data go?
I make it a habit to review app permissions weekly. Checking which apps have gained new permissions since the last review, removing apps that are no longer in use, and I realized what i was doing was what any Security Operations Center (SOC) team would do to monitor logs for anomalies. Continuous monitoring is key.
Securing my kid’s tablet wasn’t just about protecting a single device—it was a hands-on exercise in real-world cybersecurity thinking. The same principles apply whether you’re securing a personal device or a large enterprise network: assess vulnerabilities, model threats before trusting applications, and continuously monitor and review permissions. I believe cybersecurity isn’t just for IT professionals it’s for everyone. And sometimes, it starts with a kid’s tablet.


This content originally appeared on DEV Community and was authored by DAPHNE Chiedu


Print Share Comment Cite Upload Translate Updates
APA

DAPHNE Chiedu | Sciencx (2025-03-26T01:36:49+00:00) How my Kid’s tablet turned me into a Cybersecurity Analyst. Retrieved from https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/

MLA
" » How my Kid’s tablet turned me into a Cybersecurity Analyst." DAPHNE Chiedu | Sciencx - Wednesday March 26, 2025, https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/
HARVARD
DAPHNE Chiedu | Sciencx Wednesday March 26, 2025 » How my Kid’s tablet turned me into a Cybersecurity Analyst., viewed ,<https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/>
VANCOUVER
DAPHNE Chiedu | Sciencx - » How my Kid’s tablet turned me into a Cybersecurity Analyst. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/
CHICAGO
" » How my Kid’s tablet turned me into a Cybersecurity Analyst." DAPHNE Chiedu | Sciencx - Accessed . https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/
IEEE
" » How my Kid’s tablet turned me into a Cybersecurity Analyst." DAPHNE Chiedu | Sciencx [Online]. Available: https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/. [Accessed: ]
rf:citation
» How my Kid’s tablet turned me into a Cybersecurity Analyst | DAPHNE Chiedu | Sciencx | https://www.scien.cx/2025/03/26/how-my-kids-tablet-turned-me-into-a-cybersecurity-analyst/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.