CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL
Download
Report
Transcript CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL
RESTRICTED
CYBER THREATS: IMPLICATIONS FOR
NIGERIA’S NATIONAL INTEREST
BY
MAJOR GENERAL GG UMO OON GSS
psc(+) fwc CMH MIMC MNIM
RESTRICTED
RESTRICTED
INTRODUCTION
RESTRICTED
RESTRICTED
CYBERWARFARE AND CYBERCRIME ARE INTERTWINED
CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN
INSTRUMENT OF STATE POWER
CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT
COMMUNICATIONS AND THE FLOW OF INFORMATION
“WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE
CANNOT FIND OUT ANYTHING, INTELLIGENCE
CANNOT FORM A STRATEGY” – SUN TZU
IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER
ARMY IN THE WORLD
RESTRICTED
RESTRICTED
AIM
THE AIM OF THIS PAPER IS TO HIGHLIGHT
THE SECURITY IMPLICATIONS OF CYBER
THREATS TO NIGERIA’S NATIONAL INTEREST
RESTRICTED
RESTRICTED
SCOPE
CONCEPTUAL DISCOURSE
NATIONAL SECURITY SPECTRUM
CRITICAL CYBER THREATS INIMICAL TO
NATIONAL INTERESTS AND THEIR EFFECTS
CYBER STRATEGIES TO STEM THREATS
RESTRICTED
RESTRICTED
CONCEPTUAL DISCOURSE
CYBERCRIME
CYBER TERRORISM
CYBER WARFARE
CYBER SECURITY
NATIONAL INTEREST
RESTRICTED
RESTRICTED
CRITICAL CYBER THREATS INIMICAL
TO NATIONAL INTEREST
SOCIO-ECONOMIC SPHERE
ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES
CHILD PREDATION
CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG
TRAFFICKING
ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM
JAN – DEC 2009. FIGURE UP BY 50% COMPARED TO 2008
GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA
UNDERSCORES THE FACT THAT A HOSTILE NATION WITH
CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS
THREAT
RESTRICTED
POLITICO-MILITARY SPHERE
MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES
ARE PRONE TO EQUIPMENT DISRUPTION; SO,
STRATEGISTS MUST BE AWARE THAT PART OF POILITICOMILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNETKenneth Geers
DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL
ASSETS- President Barak Obama
HACKING IN USA MILITARY FACILITY IN THE MIDDLE
EAST 2008
OPERATION ORCHARD
CYBER-SABOTAGE
RESTRICTED
RESTRICTED
CYBER STRATEGIES TO STEM CYBER
THREATS
NATIONAL POLICY FRAMEWORK TO ALSO
CAPTURE LEGAL REQUIREMENTS
PUBLIC ENLIGHTENMENT
CAPACITY BUILDING
GOVERNMENT- PRIVATE PARTNERSHIP
SYNERGY
RESHAPING THE INTERNET ARCHITECTURE
CYBER COUNTER-THREAT AGENCY
RESTRICTED
RESTRICTED
CONCLUSION
CYBER THREATS ARE GETTING WORSE DAILY
THE NATION DOES NOT HAVE TO WAIT FOR A CYBER
TSUNAMI TO OCCUR BEFORE IT ACTS
A HOLISTIC APPROACH USING BDT ROADMAP
NATIONAL POLICY FRAMEWORK
PUBLIC ENLIGHTENMENT
CAPACITY BUILDING
GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY
ESTABLISHMENT OF C2TA
RESTRICTED
RESTRICTED
FOOD-FOR-THOUGHT
‘‘THE MODERN THIEF CAN STEAL MORE WITH
A COMPUTER THAN WITH A GUN; TOMORROW’S
TERRORIST MAY BE ABLE TO DO MORE DAMAGE
WITH A KEYBOARD THAN WITH A BOMB’’
-DANIEL A. MORRIS
…‘SO, THE TIME TO STEM CYBER THREATS IS NOT
TODAY BUT NOW’
RESTRICTED
RESTRICTED
THANK YOU
RESTRICTED