CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL

Download Report

Transcript CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL

RESTRICTED
CYBER THREATS: IMPLICATIONS FOR
NIGERIA’S NATIONAL INTEREST
BY
MAJOR GENERAL GG UMO OON GSS
psc(+) fwc CMH MIMC MNIM
RESTRICTED
RESTRICTED
INTRODUCTION
RESTRICTED
RESTRICTED
 CYBERWARFARE AND CYBERCRIME ARE INTERTWINED
 CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN
INSTRUMENT OF STATE POWER
 CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT
COMMUNICATIONS AND THE FLOW OF INFORMATION
 “WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE
CANNOT FIND OUT ANYTHING, INTELLIGENCE
CANNOT FORM A STRATEGY” – SUN TZU
 IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER
ARMY IN THE WORLD
RESTRICTED
RESTRICTED
AIM
THE AIM OF THIS PAPER IS TO HIGHLIGHT
THE SECURITY IMPLICATIONS OF CYBER
THREATS TO NIGERIA’S NATIONAL INTEREST
RESTRICTED
RESTRICTED
SCOPE
CONCEPTUAL DISCOURSE
NATIONAL SECURITY SPECTRUM
CRITICAL CYBER THREATS INIMICAL TO
NATIONAL INTERESTS AND THEIR EFFECTS
CYBER STRATEGIES TO STEM THREATS
RESTRICTED
RESTRICTED
CONCEPTUAL DISCOURSE
CYBERCRIME
CYBER TERRORISM
CYBER WARFARE
CYBER SECURITY
NATIONAL INTEREST
RESTRICTED
RESTRICTED
CRITICAL CYBER THREATS INIMICAL
TO NATIONAL INTEREST
SOCIO-ECONOMIC SPHERE
 ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES
 CHILD PREDATION
 CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG
TRAFFICKING
 ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM
JAN – DEC 2009. FIGURE UP BY 50% COMPARED TO 2008
 GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA
UNDERSCORES THE FACT THAT A HOSTILE NATION WITH
CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS
THREAT
RESTRICTED
POLITICO-MILITARY SPHERE
 MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES
ARE PRONE TO EQUIPMENT DISRUPTION; SO,
STRATEGISTS MUST BE AWARE THAT PART OF POILITICOMILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNETKenneth Geers
 DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL
ASSETS- President Barak Obama
 HACKING IN USA MILITARY FACILITY IN THE MIDDLE
EAST 2008
 OPERATION ORCHARD
 CYBER-SABOTAGE
RESTRICTED
RESTRICTED
CYBER STRATEGIES TO STEM CYBER
THREATS
NATIONAL POLICY FRAMEWORK TO ALSO
CAPTURE LEGAL REQUIREMENTS
PUBLIC ENLIGHTENMENT
CAPACITY BUILDING
GOVERNMENT- PRIVATE PARTNERSHIP
SYNERGY
RESHAPING THE INTERNET ARCHITECTURE
CYBER COUNTER-THREAT AGENCY
RESTRICTED
RESTRICTED
CONCLUSION
 CYBER THREATS ARE GETTING WORSE DAILY
 THE NATION DOES NOT HAVE TO WAIT FOR A CYBER
TSUNAMI TO OCCUR BEFORE IT ACTS
 A HOLISTIC APPROACH USING BDT ROADMAP
 NATIONAL POLICY FRAMEWORK
 PUBLIC ENLIGHTENMENT
 CAPACITY BUILDING
 GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY
 ESTABLISHMENT OF C2TA
RESTRICTED
RESTRICTED
FOOD-FOR-THOUGHT
‘‘THE MODERN THIEF CAN STEAL MORE WITH
A COMPUTER THAN WITH A GUN; TOMORROW’S
TERRORIST MAY BE ABLE TO DO MORE DAMAGE
WITH A KEYBOARD THAN WITH A BOMB’’
-DANIEL A. MORRIS
…‘SO, THE TIME TO STEM CYBER THREATS IS NOT
TODAY BUT NOW’
RESTRICTED
RESTRICTED
THANK YOU
RESTRICTED