by: abdul-hakeem ajijola - cyber secure...

22
Abdul-Hakeem Ajijola (.AhA) [email protected] by: Abdul-Hakeem Ajijola [email protected] @ the NAF Conference Centre, Abuja 6-7 April 2016 Presentation @ the

Upload: hoangkien

Post on 04-Jun-2018

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

by:

Abdul-Hakeem Ajijola [email protected]

@ the

NAF Conference Centre, Abuja

6-7 April 2016

Presentation @ the

Page 2: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

Cybersecurity Protection of assets against risks

within, and from, the electronic environment

CYBERSECURITY VS. CYBER-CRIME

Cyber-Crime Conduct prohibited by law, with

prescribed punishment, carried out using digital systems like computers, electronic, ancillary devices, processes and/ or procedures

Criminality is the state of being illegal

Cyber-criminals operate at the speed of light while law enforcement moves at the speed of law.

Page 3: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

CYBER TERRORISM FRAMEWORK AS DEFINED BY YUNOS & AHMAD

Source: Reference: R. Ahmad, Z. Yunos, S. Sahib, and M. Yusoff, “Perception on Cyber Terrorism: A Focus Group Discussion Approach,” Journal of Information Security, vol. 03, no. 03, pp. 231-237, 2012

Cyberspace (includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers)

• Borderless

ICT/cyber technology

Cyber media

Political Ideological Social Economic

Critical National Information Infrastructure computer system

Critical Infrastructure Civilian population`

Mass disruption or seriously interfere critical services operation

Cause fear, death or bodily injury

Severe economic loss

Unlawful means

Illegal acts

Cyber Terrorism

Target

Impact

Method of Action

Domain

Tools of Attack

Motivation

Page 4: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

CYBER TERRORISM FRAMEWORK AS DEFINED BY YUNOS & AHMAD

Source: Reference: “Computers at Risk,” National Research Council, 1991, Extracted from article entitled “Defending The Nation Against Cyber Attack: Information Assurance in the Global Environment”, by Lieutenant General Kenneth A. Miniham, Director, National Security Agency, USIA Electronic Journal, Vol 3, No 4, November 1998

“The modern thief can steal more with a computer than with a gun.

Tomorrow’s terrorist can do more damage with a keyboard

than with a bomb”

Page 5: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

“Seriously interfere with, seriously disrupt, or destroy, an electronic system including, but not limited to, an information system; a telecommunications system; a financial system; a system used for the delivery of essential government services; a system used for, or by, an essential public utility; or a system used for, or by, a transport system”

Australia’s Security Legislation Amendment (Terrorism) Act 2002

An act or threat of action within or beyond Malaysia, among others, “designed or intended to disrupt or seriously interfere with any computer systems or the provision of any services directly related to communications infrastructure, banking or financial services, utilities, transportation or other essential infrastructure”.

Malaysia's ACT 574 Penal Code (Revised - 2007)

Chapter VIA - Offences Relating To Terrorism. Section 130B

“Cyber terrorism is the convergence of terrorism and cyberspace 1. It is generally understood to mean unlawful attacks and threats of attack against computers, networks and the information stored therein 2 when done to intimidate a government or its people 3 in furtherance of political or social objectives 4. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property 5, or at least cause enough harm to generate fear 6. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economics loss 7 would be examples. Serious attacks against critical infrastructures could be acts of cyber terrorism 8, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. 9”

Reference: D. E. Denning, “Cyberterrorism,” Testimony given to the House Armed Services Committee Special Oversight Panel on Terrorism, 2000

"Cyber Terrorism” means any act of violence or threat thereof, or any targeting or use of the cyberspace as a tool or means to promote, spread or commit extreme, radical, or terrorist acts, and to carry out an individual or collective criminal plan, notwithstanding its motives or intentions perpetrated, with the aim of terrorizing people or threatening to harm them or imperilling their lives, honour, freedoms, security or rights or exposing the environment or any facility or public or private property to hazards or occupying or seizing them, or endangering major elements of the cyber space (e.g., critical infrastructures, commercial or Governmental networks), a national resource, or international facilities, or threatening the stability, territorial integrity, political unity or sovereignty of independent States.

Organisation of Islamic Cooperation

DEFINITION OF CYBERTERRORISM

Page 6: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

WHO ELSE IS USING CYBERSPACE?

– Daesh: Islamic State – Boko Haram: Jama’atu Ahlis-Sunnah

Lid Da’awati Wal Jihad [People involved in Call to Islam & Jihad]

– MEND: Movement for the Emancipation of the Niger Delta

– FARC–EP & FARC: Revolutionary Armed Forces of Colombia—People's Army

– Aum Shinrikyo Japanese doomsday cult

Values, Propaganda, Financing & Recruitment

Pentagon Manipulates Social Media for Propaganda Purposes Source http://www.globalresearch.ca/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes/25719

Cyberspace as Tool, Medium and Target of Terrorism

Page 7: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

CYBERSPACE IS A TOOL, MEDIUM & TARGET OF TERRORISM

Tool • To develop & promote extreme ideologies &

disseminate propaganda materials.

Medium

• For their illicit activities such as spreading terrorism propaganda, fundraising, financial transactions, recruitment & mobilization as well as activity planning & coordination.

Target

• Take down CNII such as telecoms masts & other Information & Communications; central clearing houses & online Banking & Finance systems; Government services; Supervisory Control & Data Acquisition (SCADA) in the Energy sector; Food & Agriculture value chains privacy of Health Services databases as well as National Defence & Security systems.

Cybercriminals operate at the speed of light, while law enforcement moves at the speed of law. Barry Raveendran Greene www.getit.org

Page 8: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

0.80% of Nigeria’s GDP is lost to cybercrime Equivalent to Cement sector

USA Center for Strategic and International Studies and information security firm McAfee, a subsidiary of Intel, titled “Net Losses: Estimating the Global Cost of Cybercrime; Economic impact of cybercrime II” http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf Nigeria’s GDP estimated by “TradingEconomics.com” to be $568.51 billion in 2014.

$450 million, equivalent to N89.55 billion annual direct losses to the Nigerian economy.

Trading Economics http://www.tradingeconomics.com/nigeria/gdp

97,984,736 used the internet on a daily basis in November, 2015

•Nigerian Communications Commission Internet Subscriber Data http://www.ncc.gov.ng/index.php?option=com_content&view=article&id=68&Itemid=70

45.3% of internet users in Nigeria suffered attack in the third quarter of 2015.

•Kaspersky Lab, 2015 survey, for Third quarter 2015 IT Threat Evolution report http://bizwatchnigeria.ng/nigerias-cyber-malware-attacks-reach-45-3-in-q3-2015/

09 Jan 2016, “Anonymous hacker collective has started a cyber-campaign against the government of Nigeria, accusing it of corruption, greed, and theft.”

•Catalin Cimpanu http://news.softpedia.com/news/anonymous-starts-cyberattacks-against-nigerian-government-498676.shtml

.NG STATISTICS

Page 9: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

19-Dec-15 Federal Court of Appeal www.courtofappeal.gov.ng Protest of to deaths of Shiite members in Zaria during clash with Nigerian

Army

11 Jul 2014 Independent National Electoral Commission by TeaM Nigerian Cyber Army,

https://www.facebook.com/naijacyberarmy Support of Kidnapped Chibok Girls

6 August 2015 Fed Poly Idah http://www.fepoda.edu.ng and

http://www.federalpolyidah.edu.ng by Hackinthunder. Someone aggrieved with the

institution

01-Oct-14 Nigeria's House of Representatives The warning, which has been on the page for much of the day, ends saying "No hard feelings though this

is just a security reminder.

23-Apr-15 Globacom www.gloworld.com by The Nigerian Cyber Hunters led by HYPER-DARK a.k.a

Brunolin The motive, and reason behind the hack is unknown.

28-Oct-11 Economic Financial Crimes Commission (EFCC) www.efccnigeria.org by Naija Cyber Hacktivist “Operation: Say No To Internet

Censorship”

EXAMPLES OF DEFACED NIGERIAN WEBSITES BETWEEN 13 APRIL 2015 AND 01 FEB 2016, ZONE-H RECEIVED NOTIFICATIONS OF 3,599

BREACHES OF NIGERIA (.NG) DOMAINS OF WHICH 2,518 WEBSITES WERE DEFACED. ZONE-H HTTP://WWW.ZONE-H.ORG/ARCHIVE/FILTER=1/FULLTEXT=1/DOMAIN=NIGERIA

Page 10: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

HACKED NIGERIAN GOVERNMENT ORGANISATIONS S/n Date Victim Victims Website News Source Alleged Perpetrator Apparent Reason

1 19-Dec-15 Federal Court of Appeal www.courtofappeal.gov.ng Federal Court of Appeal Not known Political: Protest of to deaths of Shiite members in Zaria during clash with Nigerian Army

2 19-Dec-15 Lagos State Government http://www.lagosstate.gov.ng ONSA Not known Not known

3 04-Dec-15 Akwa Ibom Government https://akwaibomstate.gov.ng

http://www.nigerianelitesforum.com/ng/politics-and-politikings/79920-akwa-ibom-government-website-hacked-print.html

Xvirus Not known

4 06-Aug-15 Fed Poly Idaho http://www.fepoda.edu.ng and http://www.federalpolyidah.edu.ng

http://universityng.com/federal-polytechnic-idah-websites-hacked/ Hackinthunder. Personal: Someone aggrieved with the institution

5 23-Apr-15 Globacom www.gloworld.com http://www.nigerianeye.com/2015/04/globacom-website-hacked-by-nigerian.html

The Nigerian Cyber Hunters led by HYPER-DARK a.k.a Brunolin The motive, and reason behind the hack is unknown.

6 23-Jan-15 Defence Headquarters http://defenceinfo.mil.ng

Source http://news2.onlinenigeria.com/headline/396879-nigerian-army-admits-military-defence-websites-hacked-isis.html and

@imamsadiq123 in a style replica of the dreaded Islamic terrorist group ISIS

Political: Targeted because of its role as a major channel for disseminating information on military and security activities in the nation’s counter-terrorism campaign

7 19-Dec-14 NotJuskOk music website www.NotJuskOk.com http://www.moroccoworldnews.com/2014/12/147441/moroccan-hacker-brings-down-nigerian-music-website/

Abdellah Elmaghribi a Moroccan hacker

Political: “Hacked By Abdellah Elmaghribi The Sahara is Moroccan Abdellah Elmaghribi ! Legend of Morocco!”

8 03-Nov-14 USA Indiana Department of Education's website http://www.doe.in.gov http://www.effecthacking.com/2014/1

1/indiana-doe-website-hacked.html Nigerian cyber army R3D-Spear and cY63r M4R$#$L Not known

9 01-Oct-14 Nigeria's House of Representatives http://www.nassnig.org

http://saharareporters.com/2014/10/01/nigerias-house-reps-website-hacked

Osaretin Michael Omoruyi, who goes by "Haxor Ositilife Leet"

Political: "Haxor Ositilife Leet was here. Patch your security or the next time we come [it's] gonna be rough." The warning, which has been on the page for much of the day, ends saying "No hard feelings though this is just a security reminder.

10 08-Aug-14 Ruth Kadiri’s, Producer, actress and story writer http://www.ruthkadiri.com http://www.gistmania.com/talk/topic,

215614.0.html and Not known Not known

11 11-Jul-14 Independent National Electoral Commission http://www.inecnigeria.org

http://www.vanguardngr.com/2015/03/inec-website-hacked/ http://pulse.ng/tech/exclusive-why-we-hacked-inec-website-the-nigerian-cyber-army-opens-up-id3610010.html

TeaM Nigerian Cyber Army, https://www.facebook.com/naijacyberarmy

Political: Initial reason given "Support of Kidnapped Chibok Girls." Subsequent reason "…. protect results from being manipulated by anyone, through any means."

12 12-Mar-14 Reddit entertainment, social networking and news website

https://www.reddit.com http://www.dailydot.com/news/reddit-hacked-nigerian-electronic-army/ Nigerian Electronic Army

Financial: Hackers claimed to discovered a zero day exploit (meaning a previously undiscovered hole in the site’s security system) and was attempting to sell information about it for a price. The going rate was apparently a single bitcoin—about $640 USD at the current market price.

13 27-Jan-14 Ministry of Police http://policeaffairs.gov.ng http://www.batblue.com/nigerian-ministry-of-police-affairs-website-hacked/

Nigerian Cyber Army

Political: Hackers blame police officials and the government for being corrupt and allowing corruption to continue in the country. The hackers write, “Every offense should have a fair punishment. People have committed greater offenses and nothing was done to them. Police officers collecting bribes only confirms how corrupt our society has become. It is also a sign of a failed government.”

14 14-Aug-13 Sahara Reporters www.SaharaReporters.com http://www.lailasblog.com/2013/08/saharareporters-website-hacked.html Not known

15 08-Jul-13 Federal Ministry of Information www.nigeria.gov.ng

http://www.cknnigeria.com/2013/07/gay-activist-to-attack-nigerian-websites.html

Paddyhack, Irish “Gay” Hacker Activist (Hacktivist) campaign themed #OpNigeria

Political: Protest an anti-gay bill that was passed by the Nigerian Senate.

Page 11: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

HACKED NIGERIAN GOVERNMENT ORGANISATIONS

16 15-Mar-13 Ministry of Foreign Affairs http://www.foreignaffairs.gov.ng/

http://techloy.com/2013/03/18/hackers-take-down-four-nigerian-government-websites/

PakCyberEaglez Not known

17 15-Mar-13 National Malaria Control Programme

http://www.nmcp.gov.ng/ http://techloy.com/2013/03/18/hackers-take-down-four-nigerian-government-websites/

PakCyberEaglez Not known

18 15-Mar-13 National Research Institute for Chemical Technology, Zaria

http://narict.gov.ng/ http://techloy.com/2013/03/18/hackers-take-down-four-nigerian-government-websites/

PakCyberEaglez Not known

19 12-Feb-13 Pakistan People's Party Official Website (of the late Benazir Bhutto)

http://ppp.org.pk/ http://www.voiceofgreyhat.com/2013/12/pakistan-peoples-party-website-hacked.html

Dr41DeY (Nigerian Cyber Army)

Not known

20 27-Jan-12 Nigeria Labour Congress http://www.nlcng.org/ http://techloy.com/2012/01/27/nlc-website-hacked/

NaijaCyberHactivists

Political: Protest of the action of the Nigeria Labour Congress (NLC) and the Trade Union Congress (TUC) in sabotaging the recent #OccupyNigeria mass protests.

21 16-Jan-12 Nigerian Army Education Corps (NAEC)

http://www.hqnaec.org/ http://thehackernews.com/2012/01/nigerian-army-education-site-hacked-by.html

NaijaCyberHactivists

Political: Seeking the Nigerian Army to leave the streets. Related Tweet: "Nigerian Army's Website Hacked & Defaced http://www.hqnaec.org/ || Go after Boko Haram NOT Innocent Protesters #OccupyNigeria cc @anonymousabu"

22 06-Jan-12 Federal Ministry of Transportation

http://fmt.gov.ng/ http://businessnews.com.ng/2012/01/06/federal-ministry-of-transportations-hackers-occupy-nigeria-website/

Naija Cyber Hacktivists

Political: Governments attempt cutting of the fuel subsidies

23 28-Oct-11 Economic Financial Crimes Commission (EFCC)

www.efccnigeria.org http://saharareporters.com/2011/10/28/efcc-website-hacked-nigerian-cyber-activist-group

Naija Cyber Hacktivist

Political: “Operation: Say No To Internet Censorship”

24 12-Sep-11 Federal Ministry of Information www.nigeria.gov.ng http://thehackernews.com/2011/09/federal-nigerian-government-websites.html

Brazilian Hacker, Elemento_pcx & s4r4d0

Not known

25 26-May-11 National Poverty Eradication Programme (NAPEP)

http://napep.gov.ng/ http://techloy.com/2011/05/26/nigerian-government-websites-hacked/

NaijaCyberHackers

Political: Hacked in protest of the Federal Government’s decision to spend N1 billion (over $6 million) for President Jonathan’s inauguration on 29 May 2011. Account currently suspended.

26 26-May-11 Niger Delta Development Commission (NDDC)

http://www.nddc.gov.ng/ http://techloy.com/2011/05/26/nigerian-government-websites-hacked/

NaijaCyberHackers [email protected]

Political: Hacked in protest of the Federal Government’s decision to spend N1 billion (over $6 million) for President Jonathan’s inauguration on 29 May 2011. Also 1.) If the FG decides to go on with the N1b budget 2.) If the killers of "Mr. Tochukwu Uzukwu" aint fished out 3.) All those detained with the arrest and detention of Prof. Steve Torkuma Ugbah are not released

27 08-Nov-10 Nigerian Society of Engineers http://www.nse.org.ng/ www.nairaland.com/547479/nigerian-society-engineers-website-hacked

MR.dem Personal: Because they could

28 15-Oct-09 Nigerian Population Commission (NPC)

http://www.population.gov.ng

https://whichlevel.wordpress.com/2009/09/16/npc-website-hacked/

Not known Not known

29 06-Feb-08

Central Securities Clearing System (CSCS) - The Clearing House of The Nigerian Stock Exchange

www.cscsnigerialtd.com http://www.stockmarketnigeria.com/forums/cscs/989-cscs-website-hacked.html

Pablin 77 Not known

30 07-May-03 Nigerian Scammer's Fake Bank Website Hacked

http://www.ndbankonline.com/

http://www.jehovahs-witness.com/topic/67762/nigerian-scammers-fake-bank-website-hacked?page=1&size=20

Not known Not known

Page 12: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

NIGERIAN GOVERNMENT ORGANISATIONS HACKED BY SYRIAN ANONYMOUS (HEXOR & SYRIAN DANGER @ SILENT INJECTOR & HATX HOMS) Victim • Victims Website

Ministry of Power • http://www.power.gov.ng/

Ministry of Communications Technology • http://www.commtech.gov.ng/ Office of the Head of the Civil Services of the

Federation • http://www.ohcsf.gov.ng/

Nigerian Christian Pilgrim Commission • http://www.ncpc.gov.ng/

National Emergency Management Agency • http://www.nema.gov.ng/

Ministry of Finance • http://www.finance.gov.ng/

National Centre for Agricultural Mechanisation • http://www.ncam.gov.ng/

University of Abuja Teaching Hospital • http://www.uath.gov.ng/

Bureau of Public Service Reforms (BPSR) • http://bpsr.gov.ng/

National Economic Reconstruction Fund • http://www.nerfund.gov.ng/

Office of the Auditor General for the Federation • http://www.oaugf.gov.ng/ Nigerian Educational Research and Development

Council (NERDC) • http://nerdc.gov.ng/wordpress/

National Board for Technology Incubation • http://www.nbti.gov.ng/ticyenagoa/

Nigeria Social Insurance Trust Fund • http://nsitf.gov.ng/

Federal Ministry of Ministry of Water Resources • http://waterresources.gov.ng/ Federal Ministry of Women Affairs and Social

Development • http://womenaffairs.gov.ng/

Federal Neuro Psychiatric Hospital • http://neuropsychiatrichospitalyaba.gov.ng/

Federal Fire Service • http://www.fedfire.gov.ng/

Federal Ministry of Education • http://education.gov.ng/

Federal School of Occupational Therapy Yaba • http://federalschoolofoccupationaltherapyyaba.

gov.ng/

Federal Capital Territory Administration • http://fcta.gov.ng/

Lake Chad Research Institute • http://lcrimaid.gov.ng/

Federal Ministry of Justice • http://justice.gov.ng/

Ministry of Mines and Steel Development • http://minesandsteel.gov.ng/

Citizenship and Leadership Training Centre (CLTC) • http://cltc.gov.ng/wordpress/

Page 13: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

CYBER THREATS ARE EVOLVING

The More We’re Interconnected to Cyber Space, The More We Are At Risk To Cyber Threats … Source: Dr. Zahri Yunos, http://zahriyunos.blogspot.my Chief Operating Officer, CyberSecurity Malaysia

Large scale, wide spreading incident (e.g. virus, worm

outbreak)

Specific targeted attack, powerful tool (e.g. Botnet,

Stuxnet)

Script kiddies, crackers Professionals, Criminals

Motivation: for fun, peer recognition, prestige

Specific Motivation: for economic gain, industrial

espionage, cyber terrorism

Page 14: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

UNDERNEATH OF A BRIDGE (“GADAR”) AT TAMBURAWA ALONG KADUNA-KANO

January 2016

Fiber Communications Ducts?

Page 15: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

Security Threats

Attack on Physical System

Lost Hardware

Unprotected Endpoint

Insecure Network points

Authentication & Privilege Attack

Password Disgruntled Employee

High Privileged Accounts

Denial of Service

Natural Disaster

Targeted DoS Single Point of

Failure

Hacktivist

Malicious Internet Content

Social Engineering

Malware

Downloads

Web Application Attacks

CYBER SECURITY THREAT MAP

Page 16: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

Que pouvons

nous faire

O que podemos

fazer

ماذا نستطيع ان نفعل

Page 17: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

Develop, nurture and patronize a home

grown ICT economic sector

Generate employment (job creation)

Increase incomes and Government revenue

Promote Knowledge Generation &

empowered Human Resources

Foster confidence in our economy and our Broadband as well as

related ICT infrastructure

Enable the Nation to meet it’s national

development agenda

Enhance human safety and national wellbeing

Foster broader adaptation of

knowledge “info-structure” for broader

and even socio-economic development

Reduce the cost of ICT services by ensuring that they carry only

what they are designated to carry

NATIONAL STRATEGIC INTEREST

Page 18: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

Goals:

Build an ecosystem to protect Critical National Information Infrastructure

Enforce extant Cyber Security & Cybercrime related Laws, Regulations & Rules

Objectives

Articulate cyber security related laws, regulations & best practices to be followed by other organizations

Build National readiness by fostering the development of sectorial Cyber Security Capacities

Provide “support” in responding to computer, network & related cyber security incidents

Engender a domestic Cyber Security Solutions industry

Critical Success Factors: Presidential approval

Establishment of a Cyber Security Commission as a focal point for enforcement & implementation of Cyber

related laws, policies & strategies Cyber Security Sector is Young & Growing Rapidly

Carve Out & Exploit Market Niches such as broadband, mobiles & algorithms. Africa Market Aggregation & Integration

Review of : . Cybercrime (Prohibition Prevention,

etc.,) Act 2015

. National Cyber Security Policy

. National Cyber Security Strategy

Barriers:

Ignorance of the threats across the spectrum of users & policy makers

Private ownership of Critical National Information Infrastructure

Asynchronous operating environment where high cost systems are vulnerable to low cost tools & players

Insufficient as well as misapplication of resources

Abuse of new media

Terrorists leveraging cyberspace Propaganda, Financing & Recruitment

Global “Hacktivism”

Initiatives:

Commissioning annual risk & vulnerability assessments

Develop & implement a national Cyber Security doctrine, with rules of engagement for key Cyber Security elements

Foster multi-stakeholder partnerships to address cyber threats in real-time

Enhanced inter-agency collaboration & information sharing

Broad-based capacity building including awareness, training & requisite activities to develop & preserve institutional memory

Priorities:

Build a network of credible Cyber Security entities & professionals

Assist various sectors to establish sectorial Computer Emergency Response Teams (CERTs) & strengthen relationships

Encourage experience & information sharing in ICT Security

Promote collaborative technology research, development, outreach & innovation in ICT security fields

Promote good practices &/ or recommendations to address legal & regulatory issues

Become the national & international focal point of contact to deal with counter parts & issues on international level

Proposed NIGERIA CYBER SECURITY COMMISSION [NCYSC] : Strategic Issues

Page 19: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

FEDERAL EXECUTIVE COUNCIL COMMITTEE ON

CRITICAL NATIONAL INFRASTRUCTURE

Technology

NITDA CERRT.ng

Service Providers

Country Domain & DNS

ICT Vendors

Other Technology National Security

ONSA NGCERT

Defence Space Agency

Intelligence

Military Law

Enforcement

Interior

Other Security

Cyber Forensics Laboratory

Financial Sector

Central Bank of Nigeria (CBN)

Banks

Clearing House Other financial

institutions

Academic

Higher Education Institutions

Cyber Institute: NITDA/

UniAbuja/

CS2

FUT Minna, Dept. of Cyber Security

NSUK, Centre for Cyberspace Studies

Research Institutes

Other Academic

Private Sector

Critical Information Infrastructure

providers

Innovators

Business Service Providers

CS2 Forensics Lab

Other Business

NGO CSEAN

Specialised

AG, Cybercrime Prosecution Unit Government

(GCERT)

Oil & Gas entities

Nuclear Aviation

Water

Other Specialised

SUGGESTED NATIONAL CYBER SECURITY ECOSYSTEM

Page 20: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

Like most of the World, Nigeria is building an electronic future upon capabilities, processes & infrastructure that we have not yet understood how to protect.

“I also wish to assure the wider international community of our readiness to cooperate & help to combat threats of ….. Cyber crime…..” - President Muhammadu

Buhari 29 May 2015 inauguration speech

On 16 May 2015, the President Jonathan signed the Cybercrime (Prohibition Prevention, etc.,) Act 2015 into law

05 February 2015, the President Jonathan launched:

National Cybersecurity Policy

National Cybersecurity Strategy

NIGERIA CYBER SECURITY: THE STATE OF PLAY

Page 21: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

• By the year 2020 an MSME based Cybersecurity Solutions economic sub-sector should be in place principally driven by suitably empowered knowledge workers below 35 years of age

•Highly skilled Cybersecurity knowledge workers will constitute a cyber-guard that the nation will leverage, in times of national cyber emergencies

•We can succeed by working together

Proposition for Adoption

Page 22: by: Abdul-Hakeem Ajijola - Cyber Secure Nigeriacybersecurenigeria.org/wp-content/uploads/2015/11/CSEAN-Emerging... · Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com by: Abdul-Hakeem

Abdul-Hakeem Ajijola (.AhA) [email protected]

for your

attention

O ṣeun, fun

akiyesi rẹ

Na gode, don

kulawa

Na-ekele gị, n'ihi na gị na anya

[email protected]