1 / 16

by: Abdul-Hakeem Ajijola Consultancy Support Services (CS2) Limited info@consultancyss

West Africa Convergence Conference (WACC) 2016 Theme: Engage, Regulate, Leverage, Live Convergence Topic: Data Fidelity And The Rising Challenges In Cybersecurity. by: Abdul-Hakeem Ajijola Consultancy Support Services (CS2) Limited info@consultancyss.com

morvant
Download Presentation

by: Abdul-Hakeem Ajijola Consultancy Support Services (CS2) Limited info@consultancyss

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. West Africa Convergence Conference (WACC) 2016Theme: Engage, Regulate, Leverage, Live ConvergenceTopic:Data Fidelity And The Rising Challenges In Cybersecurity by: Abdul-Hakeem Ajijola Consultancy Support Services (CS2) Limited info@consultancyss.com The Sheraton Hotel & Towers, Ikeja, Lagos, Nigeria. 30 November 2016

  2. Cybersecurity vs. Cyber-Crime • Cybersecurity • Protection of assets against risks within, & from, the electronic environment • Cyber-Crime • Conduct prohibited by law, with prescribed punishment, carried out using digital systems like computers, electronic, ancillary devices, processes and/ or procedures • Criminality is the state of being illegal Cyber-criminals operate at the speed of light while law enforcement moves at the speed of law. Barry Raveendran Greene www.getit.org

  3. Cyberspace

  4. Cybersecurity vs. Cyber-Crime • Cybersecurity • Protection of assets against risks within, & from, the electronic environment • Cyber-Crime • Conduct prohibited by law, with prescribed punishment, carried out using digital systems like computers, electronic, ancillary devices, processes and/ or procedures • Criminality is the state of being illegal Cyber-criminals operate at the speed of light while law enforcement moves at the speed of law. Barry Raveendran Greene www.getit.org

  5. Cyber “Threat” space

  6. .ng Statistics

  7. Examples of Defaced Nigerian Websites Between 13 April 2015 & 01 Feb 2016, Zone-H received notifications of 3,599 breaches of Nigeria (.ng) domains of which 2,518 websites were defaced. Zone-H http://www.zone-h.org/archive/filter=1/fulltext=1/domain=Nigeria

  8. Who Else Is Using Cyberspace? • Daesh: Islamic State • Boko Haram: Jama’atu Ahlis-Sunnah Lid Da’awati Wal Jihad [People involved in Call to Islam & Jihad] • MEND: Movement for the Emancipation of the Niger Delta • FARC–EP & FARC: Revolutionary Armed Forces of Colombia—People's Army • Aum Shinrikyo Japanese doomsday cult Values, Propaganda, Financing & Recruitment • Pentagon Manipulates Social Media for Propaganda Purposes • Sourcehttp://www.globalresearch.ca/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes/25719 Not all cyber-crimes are acts of cyber-terrorism

  9. National Strategic interest

  10. AFRICA CYBER SECURITY MARKET WORTH $0.92 BILLION IN 2015 & $2.32 BILLION BY 2020 •"Malware are malevolent software such as viruses, worms, spyware, & others that are designed to cause harm to computer based systems including stealinginformation •Antivirus is a software that detects & destroys computerviruses" Antimalware: •A strategy to ensure that users do not send unauthorised information outside a givennetwork Data lossprevention (DLP): •A set of practices for countering distributed denial-of-service (DDoS) attacks on Internet facing networks by protecting the target & intermediarynetworks. DDOSMitigation: Disaster Recovery & BusinessContinuity: Encryption: •Processes that help organizations prepare for disruptive events including backing up data & having alternate platforms & operationalsites. •A process of encoding messages or information so that only those authorized can readit •Like the wall around a building/ compound a Computer/ Network Firewall blocks unauthorized access while permitting legitimatecommunication Firewall: IdentityManagement Access(IAM): Intrusionprevention systems(IPS): Risk & Compliance Management: Security/Vulnerability Management: UnifiedThreatManagement (UTM)/UnifiedSecurity Management(USM): WebFiltering: •Framework for the management of electronicidentities •Monitor network and/or system activities for maliciousactivity •Ways to approach IT Governance, risk management, & compliance with standards •The cycle of identifying, classifying, prioritising, reporting, remediating, & mitigating computer/ networkvulnerabilities •Comprehensive & often cost-effective set of network gateway protection solutions •A filtering tool that screens incoming web pages to determine if all orpart of it should bedisplayed Source:http://www.marketsandmarkets.com/PressReleases/africa-cyber-security.asp

  11. Microsoft predicts huge tech skills shortage by 2025 •"Malware are malevolent software such as viruses, worms, spyware, & others that are designed to cause harm to computer based systems including stealinginformation •Antivirus is a software that detects & destroys computerviruses" Source: http://www.v3.co.uk/v3-uk/news/2347936/microsoft-predicts-huge-tech-skills-shortage-by-2025

  12. Focus Beyond the Obvious “THE Stone Age did not end for lack of stone, & the Oil Age will end long before the world runs out of oil. ” Sheikh Zaki Yamani, former Saudi Arabian Oil Minister

  13. Packaging: What is money? “Trusted” INTERMEDIARY of value Is what the Mint produces? • Electronic and virtual currencies are replacing paper currency • Secure “e” Documents • What will the Mint produce in 21st Century? ngPKI • Authentication is core to Data Fidelity • Critical Cybersecurity Challenge

  14. Creativity: Engage, Regulate, Leverage, Live Convergence:

  15. info@consultancyss.com

More Related