1 / 12

RESTRICTED

RESTRICTED. CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc (+) fwc CMH MIMC MNIM. RESTRICTED. RESTRICTED. INTRODUCTION. RESTRICTED. RESTRICTED. CYBERWARFARE AND CYBERCRIME ARE INTERTWINED

ulfah
Download Presentation

RESTRICTED

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RESTRICTED CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTERESTBYMAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED

  2. RESTRICTED INTRODUCTION RESTRICTED

  3. RESTRICTED • CYBERWARFARE AND CYBERCRIME ARE INTERTWINED • CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN INSTRUMENT OF STATE POWER • CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT COMMUNICATIONS AND THE FLOW OF INFORMATION • “WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE CANNOT FIND OUT ANYTHING, INTELLIGENCE CANNOT FORM A STRATEGY” – SUN TZU • IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER ARMY IN THE WORLD RESTRICTED

  4. RESTRICTED AIM THE AIM OF THIS PAPER IS TO HIGHLIGHT THE SECURITY IMPLICATIONS OF CYBER THREATS TO NIGERIA’S NATIONAL INTEREST RESTRICTED

  5. RESTRICTED SCOPE • CONCEPTUAL DISCOURSE • NATIONAL SECURITY SPECTRUM • CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTERESTS AND THEIR EFFECTS • CYBER STRATEGIES TO STEM THREATS RESTRICTED

  6. RESTRICTED CONCEPTUAL DISCOURSE • CYBERCRIME • CYBER TERRORISM • CYBER WARFARE • CYBER SECURITY • NATIONAL INTEREST RESTRICTED

  7. RESTRICTED CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTEREST SOCIO-ECONOMIC SPHERE • ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES • CHILD PREDATION • CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG TRAFFICKING • ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM JAN – DEC 2009. FIGURE UP BY 50% COMPARED TO 2008 • GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA UNDERSCORES THE FACT THAT A HOSTILE NATION WITH CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS THREAT RESTRICTED

  8. RESTRICTED POLITICO-MILITARY SPHERE • MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES ARE PRONE TO EQUIPMENT DISRUPTION; SO, STRATEGISTS MUST BE AWARE THAT PART OF POILITICO-MILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNET-Kenneth Geers • DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL ASSETS- President Barak Obama • HACKING IN USA MILITARY FACILITY IN THE MIDDLE EAST 2008 • OPERATION ORCHARD • CYBER-SABOTAGE RESTRICTED

  9. RESTRICTED CYBER STRATEGIES TO STEM CYBER THREATS • NATIONAL POLICY FRAMEWORK TO ALSO CAPTURE LEGAL REQUIREMENTS • PUBLIC ENLIGHTENMENT • CAPACITY BUILDING • GOVERNMENT- PRIVATE PARTNERSHIP SYNERGY • RESHAPING THE INTERNET ARCHITECTURE • CYBER COUNTER-THREAT AGENCY RESTRICTED

  10. RESTRICTED CONCLUSION • CYBER THREATS ARE GETTING WORSE DAILY • THE NATION DOES NOT HAVE TO WAIT FOR A CYBER TSUNAMI TO OCCUR BEFORE IT ACTS • A HOLISTIC APPROACH USING BDT ROADMAP • NATIONAL POLICY FRAMEWORK • PUBLIC ENLIGHTENMENT • CAPACITY BUILDING • GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY • ESTABLISHMENT OF C2TA RESTRICTED

  11. RESTRICTED FOOD-FOR-THOUGHT ‘‘THE MODERN THIEF CAN STEAL MORE WITH ACOMPUTER THAN WITH A GUN; TOMORROW’S TERRORIST MAY BE ABLE TO DO MORE DAMAGE WITH A KEYBOARD THAN WITH A BOMB’’ -DANIEL A. MORRIS …‘SO, THE TIME TO STEM CYBER THREATS IS NOT TODAY BUT NOW’ RESTRICTED

  12. RESTRICTED THANK YOU RESTRICTED

More Related