CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Working Jointly to Tackle e-Crime Paul Wright Hi-Tech Crime Team City of London Police.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Cyberterrorism. Critical Infrastructure Vulnerability.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Network Security of The United States of America By: Jeffery T. Pelletier.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Cyber-Warfare: The Future is Now!
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos Chapter 20.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
DBI Presentation, Nov CYBERCRIME & CERT ISSUES & PROBABLE POLICIES FOR NIGERIA By Prof. Augustine C Odinma, PhD, MIEEE, MNIM, FIET, FNSE, FBCS,
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Understanding the Threats of and Defenses Against Cyber Warfare.
Hurdles in implementation of cyber security in India.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Computer crimes.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
1 National Security Strategy: Whole of Government Approaches Lessons learned from the National Security Strategic Review 2012, (NSSR),Poland Brigade General.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Information Security – Current Challenges
National Workshop on Cyber Crimes and Cyber Laws
Joint Force Headquarters-Michigan CCIRs and PIRs
Certified Forensic Investigator
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Cybersecurity in Belarus a general overview of support areas
Joint Force Headquarters-Michigan CCIRs and PIRs
8 Building Blocks of National Cyber Strategies
MOI Security Sector Reform
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Role of US Security and Intelligence Agencies
Presentation transcript:

CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED

INTRODUCTION RESTRICTED

 CYBERWARFARE AND CYBERCRIME ARE INTERTWINED  CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN INSTRUMENT OF STATE POWER  CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT COMMUNICATIONS AND THE FLOW OF INFORMATION  “WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE CANNOT FIND OUT ANYTHING, INTELLIGENCE CANNOT FORM A STRATEGY” – SUN TZU  IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER ARMY IN THE WORLD RESTRICTED

AIM THE AIM OF THIS PAPER IS TO HIGHLIGHT THE SECURITY IMPLICATIONS OF CYBER THREATS TO NIGERIA’S NATIONAL INTEREST RESTRICTED

SCOPE  CONCEPTUAL DISCOURSE  NATIONAL SECURITY SPECTRUM  CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTERESTS AND THEIR EFFECTS  CYBER STRATEGIES TO STEM THREATS RESTRICTED

CONCEPTUAL DISCOURSE  CYBERCRIME  CYBER TERRORISM  CYBER WARFARE  CYBER SECURITY  NATIONAL INTEREST RESTRICTED

CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTEREST SOCIO-ECONOMIC SPHERE  ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES  CHILD PREDATION  CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG TRAFFICKING  ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM JAN – DEC FIGURE UP BY 50% COMPARED TO 2008  GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA UNDERSCORES THE FACT THAT A HOSTILE NATION WITH CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS THREAT RESTRICTED

POLITICO-MILITARY SPHERE  MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES ARE PRONE TO EQUIPMENT DISRUPTION; SO, STRATEGISTS MUST BE AWARE THAT PART OF POILITICO- MILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNET- Kenneth Geers  DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL ASSETS- President Barak Obama  HACKING IN USA MILITARY FACILITY IN THE MIDDLE EAST 2008  OPERATION ORCHARD  CYBER-SABOTAGE RESTRICTED

CYBER STRATEGIES TO STEM CYBER THREATS  NATIONAL POLICY FRAMEWORK TO ALSO CAPTURE LEGAL REQUIREMENTS  PUBLIC ENLIGHTENMENT  CAPACITY BUILDING  GOVERNMENT- PRIVATE PARTNERSHIP SYNERGY  RESHAPING THE INTERNET ARCHITECTURE  CYBER COUNTER-THREAT AGENCY RESTRICTED

CONCLUSION  CYBER THREATS ARE GETTING WORSE DAILY  THE NATION DOES NOT HAVE TO WAIT FOR A CYBER TSUNAMI TO OCCUR BEFORE IT ACTS  A HOLISTIC APPROACH USING BDT ROADMAP  NATIONAL POLICY FRAMEWORK  PUBLIC ENLIGHTENMENT  CAPACITY BUILDING  GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY  ESTABLISHMENT OF C2TA RESTRICTED

FOOD-FOR-THOUGHT ‘‘THE MODERN THIEF CAN STEAL MORE WITH A COMPUTER THAN WITH A GUN; TOMORROW’S TERRORIST MAY BE ABLE TO DO MORE DAMAGE WITH A KEYBOARD THAN WITH A BOMB’’ -DANIEL A. MORRIS …‘SO, THE TIME TO STEM CYBER THREATS IS NOT TODAY BUT NOW’ RESTRICTED

THANK YOU RESTRICTED