by: abdul-hakeem ajijola - cyber secure...
TRANSCRIPT
Abdul-Hakeem Ajijola (.AhA) [email protected]
by:
Abdul-Hakeem Ajijola [email protected]
@ the
NAF Conference Centre, Abuja
6-7 April 2016
Presentation @ the
Abdul-Hakeem Ajijola (.AhA) [email protected]
Cybersecurity Protection of assets against risks
within, and from, the electronic environment
CYBERSECURITY VS. CYBER-CRIME
Cyber-Crime Conduct prohibited by law, with
prescribed punishment, carried out using digital systems like computers, electronic, ancillary devices, processes and/ or procedures
Criminality is the state of being illegal
Cyber-criminals operate at the speed of light while law enforcement moves at the speed of law.
Abdul-Hakeem Ajijola (.AhA) [email protected]
CYBER TERRORISM FRAMEWORK AS DEFINED BY YUNOS & AHMAD
Source: Reference: R. Ahmad, Z. Yunos, S. Sahib, and M. Yusoff, “Perception on Cyber Terrorism: A Focus Group Discussion Approach,” Journal of Information Security, vol. 03, no. 03, pp. 231-237, 2012
Cyberspace (includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers)
• Borderless
ICT/cyber technology
Cyber media
Political Ideological Social Economic
Critical National Information Infrastructure computer system
Critical Infrastructure Civilian population`
Mass disruption or seriously interfere critical services operation
Cause fear, death or bodily injury
Severe economic loss
Unlawful means
Illegal acts
Cyber Terrorism
Target
Impact
Method of Action
Domain
Tools of Attack
Motivation
Abdul-Hakeem Ajijola (.AhA) [email protected]
CYBER TERRORISM FRAMEWORK AS DEFINED BY YUNOS & AHMAD
Source: Reference: “Computers at Risk,” National Research Council, 1991, Extracted from article entitled “Defending The Nation Against Cyber Attack: Information Assurance in the Global Environment”, by Lieutenant General Kenneth A. Miniham, Director, National Security Agency, USIA Electronic Journal, Vol 3, No 4, November 1998
“The modern thief can steal more with a computer than with a gun.
Tomorrow’s terrorist can do more damage with a keyboard
than with a bomb”
Abdul-Hakeem Ajijola (.AhA) [email protected]
“Seriously interfere with, seriously disrupt, or destroy, an electronic system including, but not limited to, an information system; a telecommunications system; a financial system; a system used for the delivery of essential government services; a system used for, or by, an essential public utility; or a system used for, or by, a transport system”
Australia’s Security Legislation Amendment (Terrorism) Act 2002
An act or threat of action within or beyond Malaysia, among others, “designed or intended to disrupt or seriously interfere with any computer systems or the provision of any services directly related to communications infrastructure, banking or financial services, utilities, transportation or other essential infrastructure”.
Malaysia's ACT 574 Penal Code (Revised - 2007)
Chapter VIA - Offences Relating To Terrorism. Section 130B
“Cyber terrorism is the convergence of terrorism and cyberspace 1. It is generally understood to mean unlawful attacks and threats of attack against computers, networks and the information stored therein 2 when done to intimidate a government or its people 3 in furtherance of political or social objectives 4. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property 5, or at least cause enough harm to generate fear 6. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economics loss 7 would be examples. Serious attacks against critical infrastructures could be acts of cyber terrorism 8, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. 9”
Reference: D. E. Denning, “Cyberterrorism,” Testimony given to the House Armed Services Committee Special Oversight Panel on Terrorism, 2000
"Cyber Terrorism” means any act of violence or threat thereof, or any targeting or use of the cyberspace as a tool or means to promote, spread or commit extreme, radical, or terrorist acts, and to carry out an individual or collective criminal plan, notwithstanding its motives or intentions perpetrated, with the aim of terrorizing people or threatening to harm them or imperilling their lives, honour, freedoms, security or rights or exposing the environment or any facility or public or private property to hazards or occupying or seizing them, or endangering major elements of the cyber space (e.g., critical infrastructures, commercial or Governmental networks), a national resource, or international facilities, or threatening the stability, territorial integrity, political unity or sovereignty of independent States.
Organisation of Islamic Cooperation
DEFINITION OF CYBERTERRORISM
Abdul-Hakeem Ajijola (.AhA) [email protected]
WHO ELSE IS USING CYBERSPACE?
– Daesh: Islamic State – Boko Haram: Jama’atu Ahlis-Sunnah
Lid Da’awati Wal Jihad [People involved in Call to Islam & Jihad]
– MEND: Movement for the Emancipation of the Niger Delta
– FARC–EP & FARC: Revolutionary Armed Forces of Colombia—People's Army
– Aum Shinrikyo Japanese doomsday cult
Values, Propaganda, Financing & Recruitment
Pentagon Manipulates Social Media for Propaganda Purposes Source http://www.globalresearch.ca/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes/25719
Cyberspace as Tool, Medium and Target of Terrorism
Abdul-Hakeem Ajijola (.AhA) [email protected]
CYBERSPACE IS A TOOL, MEDIUM & TARGET OF TERRORISM
Tool • To develop & promote extreme ideologies &
disseminate propaganda materials.
Medium
• For their illicit activities such as spreading terrorism propaganda, fundraising, financial transactions, recruitment & mobilization as well as activity planning & coordination.
Target
• Take down CNII such as telecoms masts & other Information & Communications; central clearing houses & online Banking & Finance systems; Government services; Supervisory Control & Data Acquisition (SCADA) in the Energy sector; Food & Agriculture value chains privacy of Health Services databases as well as National Defence & Security systems.
Cybercriminals operate at the speed of light, while law enforcement moves at the speed of law. Barry Raveendran Greene www.getit.org
Abdul-Hakeem Ajijola (.AhA) [email protected]
0.80% of Nigeria’s GDP is lost to cybercrime Equivalent to Cement sector
USA Center for Strategic and International Studies and information security firm McAfee, a subsidiary of Intel, titled “Net Losses: Estimating the Global Cost of Cybercrime; Economic impact of cybercrime II” http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf Nigeria’s GDP estimated by “TradingEconomics.com” to be $568.51 billion in 2014.
$450 million, equivalent to N89.55 billion annual direct losses to the Nigerian economy.
Trading Economics http://www.tradingeconomics.com/nigeria/gdp
97,984,736 used the internet on a daily basis in November, 2015
•Nigerian Communications Commission Internet Subscriber Data http://www.ncc.gov.ng/index.php?option=com_content&view=article&id=68&Itemid=70
45.3% of internet users in Nigeria suffered attack in the third quarter of 2015.
•Kaspersky Lab, 2015 survey, for Third quarter 2015 IT Threat Evolution report http://bizwatchnigeria.ng/nigerias-cyber-malware-attacks-reach-45-3-in-q3-2015/
09 Jan 2016, “Anonymous hacker collective has started a cyber-campaign against the government of Nigeria, accusing it of corruption, greed, and theft.”
•Catalin Cimpanu http://news.softpedia.com/news/anonymous-starts-cyberattacks-against-nigerian-government-498676.shtml
.NG STATISTICS
Abdul-Hakeem Ajijola (.AhA) [email protected]
19-Dec-15 Federal Court of Appeal www.courtofappeal.gov.ng Protest of to deaths of Shiite members in Zaria during clash with Nigerian
Army
11 Jul 2014 Independent National Electoral Commission by TeaM Nigerian Cyber Army,
https://www.facebook.com/naijacyberarmy Support of Kidnapped Chibok Girls
6 August 2015 Fed Poly Idah http://www.fepoda.edu.ng and
http://www.federalpolyidah.edu.ng by Hackinthunder. Someone aggrieved with the
institution
01-Oct-14 Nigeria's House of Representatives The warning, which has been on the page for much of the day, ends saying "No hard feelings though this
is just a security reminder.
23-Apr-15 Globacom www.gloworld.com by The Nigerian Cyber Hunters led by HYPER-DARK a.k.a
Brunolin The motive, and reason behind the hack is unknown.
28-Oct-11 Economic Financial Crimes Commission (EFCC) www.efccnigeria.org by Naija Cyber Hacktivist “Operation: Say No To Internet
Censorship”
EXAMPLES OF DEFACED NIGERIAN WEBSITES BETWEEN 13 APRIL 2015 AND 01 FEB 2016, ZONE-H RECEIVED NOTIFICATIONS OF 3,599
BREACHES OF NIGERIA (.NG) DOMAINS OF WHICH 2,518 WEBSITES WERE DEFACED. ZONE-H HTTP://WWW.ZONE-H.ORG/ARCHIVE/FILTER=1/FULLTEXT=1/DOMAIN=NIGERIA
Abdul-Hakeem Ajijola (.AhA) [email protected]
HACKED NIGERIAN GOVERNMENT ORGANISATIONS S/n Date Victim Victims Website News Source Alleged Perpetrator Apparent Reason
1 19-Dec-15 Federal Court of Appeal www.courtofappeal.gov.ng Federal Court of Appeal Not known Political: Protest of to deaths of Shiite members in Zaria during clash with Nigerian Army
2 19-Dec-15 Lagos State Government http://www.lagosstate.gov.ng ONSA Not known Not known
3 04-Dec-15 Akwa Ibom Government https://akwaibomstate.gov.ng
http://www.nigerianelitesforum.com/ng/politics-and-politikings/79920-akwa-ibom-government-website-hacked-print.html
Xvirus Not known
4 06-Aug-15 Fed Poly Idaho http://www.fepoda.edu.ng and http://www.federalpolyidah.edu.ng
http://universityng.com/federal-polytechnic-idah-websites-hacked/ Hackinthunder. Personal: Someone aggrieved with the institution
5 23-Apr-15 Globacom www.gloworld.com http://www.nigerianeye.com/2015/04/globacom-website-hacked-by-nigerian.html
The Nigerian Cyber Hunters led by HYPER-DARK a.k.a Brunolin The motive, and reason behind the hack is unknown.
6 23-Jan-15 Defence Headquarters http://defenceinfo.mil.ng
Source http://news2.onlinenigeria.com/headline/396879-nigerian-army-admits-military-defence-websites-hacked-isis.html and
@imamsadiq123 in a style replica of the dreaded Islamic terrorist group ISIS
Political: Targeted because of its role as a major channel for disseminating information on military and security activities in the nation’s counter-terrorism campaign
7 19-Dec-14 NotJuskOk music website www.NotJuskOk.com http://www.moroccoworldnews.com/2014/12/147441/moroccan-hacker-brings-down-nigerian-music-website/
Abdellah Elmaghribi a Moroccan hacker
Political: “Hacked By Abdellah Elmaghribi The Sahara is Moroccan Abdellah Elmaghribi ! Legend of Morocco!”
8 03-Nov-14 USA Indiana Department of Education's website http://www.doe.in.gov http://www.effecthacking.com/2014/1
1/indiana-doe-website-hacked.html Nigerian cyber army R3D-Spear and cY63r M4R$#$L Not known
9 01-Oct-14 Nigeria's House of Representatives http://www.nassnig.org
http://saharareporters.com/2014/10/01/nigerias-house-reps-website-hacked
Osaretin Michael Omoruyi, who goes by "Haxor Ositilife Leet"
Political: "Haxor Ositilife Leet was here. Patch your security or the next time we come [it's] gonna be rough." The warning, which has been on the page for much of the day, ends saying "No hard feelings though this is just a security reminder.
10 08-Aug-14 Ruth Kadiri’s, Producer, actress and story writer http://www.ruthkadiri.com http://www.gistmania.com/talk/topic,
215614.0.html and Not known Not known
11 11-Jul-14 Independent National Electoral Commission http://www.inecnigeria.org
http://www.vanguardngr.com/2015/03/inec-website-hacked/ http://pulse.ng/tech/exclusive-why-we-hacked-inec-website-the-nigerian-cyber-army-opens-up-id3610010.html
TeaM Nigerian Cyber Army, https://www.facebook.com/naijacyberarmy
Political: Initial reason given "Support of Kidnapped Chibok Girls." Subsequent reason "…. protect results from being manipulated by anyone, through any means."
12 12-Mar-14 Reddit entertainment, social networking and news website
https://www.reddit.com http://www.dailydot.com/news/reddit-hacked-nigerian-electronic-army/ Nigerian Electronic Army
Financial: Hackers claimed to discovered a zero day exploit (meaning a previously undiscovered hole in the site’s security system) and was attempting to sell information about it for a price. The going rate was apparently a single bitcoin—about $640 USD at the current market price.
13 27-Jan-14 Ministry of Police http://policeaffairs.gov.ng http://www.batblue.com/nigerian-ministry-of-police-affairs-website-hacked/
Nigerian Cyber Army
Political: Hackers blame police officials and the government for being corrupt and allowing corruption to continue in the country. The hackers write, “Every offense should have a fair punishment. People have committed greater offenses and nothing was done to them. Police officers collecting bribes only confirms how corrupt our society has become. It is also a sign of a failed government.”
14 14-Aug-13 Sahara Reporters www.SaharaReporters.com http://www.lailasblog.com/2013/08/saharareporters-website-hacked.html Not known
15 08-Jul-13 Federal Ministry of Information www.nigeria.gov.ng
http://www.cknnigeria.com/2013/07/gay-activist-to-attack-nigerian-websites.html
Paddyhack, Irish “Gay” Hacker Activist (Hacktivist) campaign themed #OpNigeria
Political: Protest an anti-gay bill that was passed by the Nigerian Senate.
Abdul-Hakeem Ajijola (.AhA) [email protected]
HACKED NIGERIAN GOVERNMENT ORGANISATIONS
16 15-Mar-13 Ministry of Foreign Affairs http://www.foreignaffairs.gov.ng/
http://techloy.com/2013/03/18/hackers-take-down-four-nigerian-government-websites/
PakCyberEaglez Not known
17 15-Mar-13 National Malaria Control Programme
http://www.nmcp.gov.ng/ http://techloy.com/2013/03/18/hackers-take-down-four-nigerian-government-websites/
PakCyberEaglez Not known
18 15-Mar-13 National Research Institute for Chemical Technology, Zaria
http://narict.gov.ng/ http://techloy.com/2013/03/18/hackers-take-down-four-nigerian-government-websites/
PakCyberEaglez Not known
19 12-Feb-13 Pakistan People's Party Official Website (of the late Benazir Bhutto)
http://ppp.org.pk/ http://www.voiceofgreyhat.com/2013/12/pakistan-peoples-party-website-hacked.html
Dr41DeY (Nigerian Cyber Army)
Not known
20 27-Jan-12 Nigeria Labour Congress http://www.nlcng.org/ http://techloy.com/2012/01/27/nlc-website-hacked/
NaijaCyberHactivists
Political: Protest of the action of the Nigeria Labour Congress (NLC) and the Trade Union Congress (TUC) in sabotaging the recent #OccupyNigeria mass protests.
21 16-Jan-12 Nigerian Army Education Corps (NAEC)
http://www.hqnaec.org/ http://thehackernews.com/2012/01/nigerian-army-education-site-hacked-by.html
NaijaCyberHactivists
Political: Seeking the Nigerian Army to leave the streets. Related Tweet: "Nigerian Army's Website Hacked & Defaced http://www.hqnaec.org/ || Go after Boko Haram NOT Innocent Protesters #OccupyNigeria cc @anonymousabu"
22 06-Jan-12 Federal Ministry of Transportation
http://fmt.gov.ng/ http://businessnews.com.ng/2012/01/06/federal-ministry-of-transportations-hackers-occupy-nigeria-website/
Naija Cyber Hacktivists
Political: Governments attempt cutting of the fuel subsidies
23 28-Oct-11 Economic Financial Crimes Commission (EFCC)
www.efccnigeria.org http://saharareporters.com/2011/10/28/efcc-website-hacked-nigerian-cyber-activist-group
Naija Cyber Hacktivist
Political: “Operation: Say No To Internet Censorship”
24 12-Sep-11 Federal Ministry of Information www.nigeria.gov.ng http://thehackernews.com/2011/09/federal-nigerian-government-websites.html
Brazilian Hacker, Elemento_pcx & s4r4d0
Not known
25 26-May-11 National Poverty Eradication Programme (NAPEP)
http://napep.gov.ng/ http://techloy.com/2011/05/26/nigerian-government-websites-hacked/
NaijaCyberHackers
Political: Hacked in protest of the Federal Government’s decision to spend N1 billion (over $6 million) for President Jonathan’s inauguration on 29 May 2011. Account currently suspended.
26 26-May-11 Niger Delta Development Commission (NDDC)
http://www.nddc.gov.ng/ http://techloy.com/2011/05/26/nigerian-government-websites-hacked/
NaijaCyberHackers [email protected]
Political: Hacked in protest of the Federal Government’s decision to spend N1 billion (over $6 million) for President Jonathan’s inauguration on 29 May 2011. Also 1.) If the FG decides to go on with the N1b budget 2.) If the killers of "Mr. Tochukwu Uzukwu" aint fished out 3.) All those detained with the arrest and detention of Prof. Steve Torkuma Ugbah are not released
27 08-Nov-10 Nigerian Society of Engineers http://www.nse.org.ng/ www.nairaland.com/547479/nigerian-society-engineers-website-hacked
MR.dem Personal: Because they could
28 15-Oct-09 Nigerian Population Commission (NPC)
http://www.population.gov.ng
https://whichlevel.wordpress.com/2009/09/16/npc-website-hacked/
Not known Not known
29 06-Feb-08
Central Securities Clearing System (CSCS) - The Clearing House of The Nigerian Stock Exchange
www.cscsnigerialtd.com http://www.stockmarketnigeria.com/forums/cscs/989-cscs-website-hacked.html
Pablin 77 Not known
30 07-May-03 Nigerian Scammer's Fake Bank Website Hacked
http://www.ndbankonline.com/
http://www.jehovahs-witness.com/topic/67762/nigerian-scammers-fake-bank-website-hacked?page=1&size=20
Not known Not known
Abdul-Hakeem Ajijola (.AhA) [email protected]
NIGERIAN GOVERNMENT ORGANISATIONS HACKED BY SYRIAN ANONYMOUS (HEXOR & SYRIAN DANGER @ SILENT INJECTOR & HATX HOMS) Victim • Victims Website
Ministry of Power • http://www.power.gov.ng/
Ministry of Communications Technology • http://www.commtech.gov.ng/ Office of the Head of the Civil Services of the
Federation • http://www.ohcsf.gov.ng/
Nigerian Christian Pilgrim Commission • http://www.ncpc.gov.ng/
National Emergency Management Agency • http://www.nema.gov.ng/
Ministry of Finance • http://www.finance.gov.ng/
National Centre for Agricultural Mechanisation • http://www.ncam.gov.ng/
University of Abuja Teaching Hospital • http://www.uath.gov.ng/
Bureau of Public Service Reforms (BPSR) • http://bpsr.gov.ng/
National Economic Reconstruction Fund • http://www.nerfund.gov.ng/
Office of the Auditor General for the Federation • http://www.oaugf.gov.ng/ Nigerian Educational Research and Development
Council (NERDC) • http://nerdc.gov.ng/wordpress/
National Board for Technology Incubation • http://www.nbti.gov.ng/ticyenagoa/
Nigeria Social Insurance Trust Fund • http://nsitf.gov.ng/
Federal Ministry of Ministry of Water Resources • http://waterresources.gov.ng/ Federal Ministry of Women Affairs and Social
Development • http://womenaffairs.gov.ng/
Federal Neuro Psychiatric Hospital • http://neuropsychiatrichospitalyaba.gov.ng/
Federal Fire Service • http://www.fedfire.gov.ng/
Federal Ministry of Education • http://education.gov.ng/
Federal School of Occupational Therapy Yaba • http://federalschoolofoccupationaltherapyyaba.
gov.ng/
Federal Capital Territory Administration • http://fcta.gov.ng/
Lake Chad Research Institute • http://lcrimaid.gov.ng/
Federal Ministry of Justice • http://justice.gov.ng/
Ministry of Mines and Steel Development • http://minesandsteel.gov.ng/
Citizenship and Leadership Training Centre (CLTC) • http://cltc.gov.ng/wordpress/
Abdul-Hakeem Ajijola (.AhA) [email protected]
CYBER THREATS ARE EVOLVING
The More We’re Interconnected to Cyber Space, The More We Are At Risk To Cyber Threats … Source: Dr. Zahri Yunos, http://zahriyunos.blogspot.my Chief Operating Officer, CyberSecurity Malaysia
Large scale, wide spreading incident (e.g. virus, worm
outbreak)
Specific targeted attack, powerful tool (e.g. Botnet,
Stuxnet)
Script kiddies, crackers Professionals, Criminals
Motivation: for fun, peer recognition, prestige
Specific Motivation: for economic gain, industrial
espionage, cyber terrorism
Abdul-Hakeem Ajijola (.AhA) [email protected]
UNDERNEATH OF A BRIDGE (“GADAR”) AT TAMBURAWA ALONG KADUNA-KANO
January 2016
Fiber Communications Ducts?
Abdul-Hakeem Ajijola (.AhA) [email protected]
Security Threats
Attack on Physical System
Lost Hardware
Unprotected Endpoint
Insecure Network points
Authentication & Privilege Attack
Password Disgruntled Employee
High Privileged Accounts
Denial of Service
Natural Disaster
Targeted DoS Single Point of
Failure
Hacktivist
Malicious Internet Content
Social Engineering
Malware
Downloads
Web Application Attacks
CYBER SECURITY THREAT MAP
Abdul-Hakeem Ajijola (.AhA) [email protected]
Que pouvons
nous faire
O que podemos
fazer
ماذا نستطيع ان نفعل
Abdul-Hakeem Ajijola (.AhA) [email protected]
Develop, nurture and patronize a home
grown ICT economic sector
Generate employment (job creation)
Increase incomes and Government revenue
Promote Knowledge Generation &
empowered Human Resources
Foster confidence in our economy and our Broadband as well as
related ICT infrastructure
Enable the Nation to meet it’s national
development agenda
Enhance human safety and national wellbeing
Foster broader adaptation of
knowledge “info-structure” for broader
and even socio-economic development
Reduce the cost of ICT services by ensuring that they carry only
what they are designated to carry
NATIONAL STRATEGIC INTEREST
Abdul-Hakeem Ajijola (.AhA) [email protected]
Goals:
Build an ecosystem to protect Critical National Information Infrastructure
Enforce extant Cyber Security & Cybercrime related Laws, Regulations & Rules
Objectives
Articulate cyber security related laws, regulations & best practices to be followed by other organizations
Build National readiness by fostering the development of sectorial Cyber Security Capacities
Provide “support” in responding to computer, network & related cyber security incidents
Engender a domestic Cyber Security Solutions industry
Critical Success Factors: Presidential approval
Establishment of a Cyber Security Commission as a focal point for enforcement & implementation of Cyber
related laws, policies & strategies Cyber Security Sector is Young & Growing Rapidly
Carve Out & Exploit Market Niches such as broadband, mobiles & algorithms. Africa Market Aggregation & Integration
Review of : . Cybercrime (Prohibition Prevention,
etc.,) Act 2015
. National Cyber Security Policy
. National Cyber Security Strategy
Barriers:
Ignorance of the threats across the spectrum of users & policy makers
Private ownership of Critical National Information Infrastructure
Asynchronous operating environment where high cost systems are vulnerable to low cost tools & players
Insufficient as well as misapplication of resources
Abuse of new media
Terrorists leveraging cyberspace Propaganda, Financing & Recruitment
Global “Hacktivism”
Initiatives:
Commissioning annual risk & vulnerability assessments
Develop & implement a national Cyber Security doctrine, with rules of engagement for key Cyber Security elements
Foster multi-stakeholder partnerships to address cyber threats in real-time
Enhanced inter-agency collaboration & information sharing
Broad-based capacity building including awareness, training & requisite activities to develop & preserve institutional memory
Priorities:
Build a network of credible Cyber Security entities & professionals
Assist various sectors to establish sectorial Computer Emergency Response Teams (CERTs) & strengthen relationships
Encourage experience & information sharing in ICT Security
Promote collaborative technology research, development, outreach & innovation in ICT security fields
Promote good practices &/ or recommendations to address legal & regulatory issues
Become the national & international focal point of contact to deal with counter parts & issues on international level
Proposed NIGERIA CYBER SECURITY COMMISSION [NCYSC] : Strategic Issues
Abdul-Hakeem Ajijola (.AhA) [email protected]
FEDERAL EXECUTIVE COUNCIL COMMITTEE ON
CRITICAL NATIONAL INFRASTRUCTURE
Technology
NITDA CERRT.ng
Service Providers
Country Domain & DNS
ICT Vendors
Other Technology National Security
ONSA NGCERT
Defence Space Agency
Intelligence
Military Law
Enforcement
Interior
Other Security
Cyber Forensics Laboratory
Financial Sector
Central Bank of Nigeria (CBN)
Banks
Clearing House Other financial
institutions
Academic
Higher Education Institutions
Cyber Institute: NITDA/
UniAbuja/
CS2
FUT Minna, Dept. of Cyber Security
NSUK, Centre for Cyberspace Studies
Research Institutes
Other Academic
Private Sector
Critical Information Infrastructure
providers
Innovators
Business Service Providers
CS2 Forensics Lab
Other Business
NGO CSEAN
Specialised
AG, Cybercrime Prosecution Unit Government
(GCERT)
Oil & Gas entities
Nuclear Aviation
Water
Other Specialised
SUGGESTED NATIONAL CYBER SECURITY ECOSYSTEM
Abdul-Hakeem Ajijola (.AhA) [email protected]
Like most of the World, Nigeria is building an electronic future upon capabilities, processes & infrastructure that we have not yet understood how to protect.
“I also wish to assure the wider international community of our readiness to cooperate & help to combat threats of ….. Cyber crime…..” - President Muhammadu
Buhari 29 May 2015 inauguration speech
On 16 May 2015, the President Jonathan signed the Cybercrime (Prohibition Prevention, etc.,) Act 2015 into law
05 February 2015, the President Jonathan launched:
National Cybersecurity Policy
National Cybersecurity Strategy
NIGERIA CYBER SECURITY: THE STATE OF PLAY
Abdul-Hakeem Ajijola (.AhA) [email protected]
• By the year 2020 an MSME based Cybersecurity Solutions economic sub-sector should be in place principally driven by suitably empowered knowledge workers below 35 years of age
•Highly skilled Cybersecurity knowledge workers will constitute a cyber-guard that the nation will leverage, in times of national cyber emergencies
•We can succeed by working together
Proposition for Adoption
Abdul-Hakeem Ajijola (.AhA) [email protected]
for your
attention
O ṣeun, fun
akiyesi rẹ
Na gode, don
kulawa
Na-ekele gị, n'ihi na gị na anya