CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED
INTRODUCTION RESTRICTED
CYBERWARFARE AND CYBERCRIME ARE INTERTWINED CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN INSTRUMENT OF STATE POWER CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT COMMUNICATIONS AND THE FLOW OF INFORMATION “WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE CANNOT FIND OUT ANYTHING, INTELLIGENCE CANNOT FORM A STRATEGY” – SUN TZU IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER ARMY IN THE WORLD RESTRICTED
AIM THE AIM OF THIS PAPER IS TO HIGHLIGHT THE SECURITY IMPLICATIONS OF CYBER THREATS TO NIGERIA’S NATIONAL INTEREST RESTRICTED
SCOPE CONCEPTUAL DISCOURSE NATIONAL SECURITY SPECTRUM CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTERESTS AND THEIR EFFECTS CYBER STRATEGIES TO STEM THREATS RESTRICTED
CONCEPTUAL DISCOURSE CYBERCRIME CYBER TERRORISM CYBER WARFARE CYBER SECURITY NATIONAL INTEREST RESTRICTED
CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTEREST SOCIO-ECONOMIC SPHERE ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES CHILD PREDATION CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG TRAFFICKING ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM JAN – DEC FIGURE UP BY 50% COMPARED TO 2008 GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA UNDERSCORES THE FACT THAT A HOSTILE NATION WITH CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS THREAT RESTRICTED
POLITICO-MILITARY SPHERE MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES ARE PRONE TO EQUIPMENT DISRUPTION; SO, STRATEGISTS MUST BE AWARE THAT PART OF POILITICO- MILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNET- Kenneth Geers DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL ASSETS- President Barak Obama HACKING IN USA MILITARY FACILITY IN THE MIDDLE EAST 2008 OPERATION ORCHARD CYBER-SABOTAGE RESTRICTED
CYBER STRATEGIES TO STEM CYBER THREATS NATIONAL POLICY FRAMEWORK TO ALSO CAPTURE LEGAL REQUIREMENTS PUBLIC ENLIGHTENMENT CAPACITY BUILDING GOVERNMENT- PRIVATE PARTNERSHIP SYNERGY RESHAPING THE INTERNET ARCHITECTURE CYBER COUNTER-THREAT AGENCY RESTRICTED
CONCLUSION CYBER THREATS ARE GETTING WORSE DAILY THE NATION DOES NOT HAVE TO WAIT FOR A CYBER TSUNAMI TO OCCUR BEFORE IT ACTS A HOLISTIC APPROACH USING BDT ROADMAP NATIONAL POLICY FRAMEWORK PUBLIC ENLIGHTENMENT CAPACITY BUILDING GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY ESTABLISHMENT OF C2TA RESTRICTED
FOOD-FOR-THOUGHT ‘‘THE MODERN THIEF CAN STEAL MORE WITH A COMPUTER THAN WITH A GUN; TOMORROW’S TERRORIST MAY BE ABLE TO DO MORE DAMAGE WITH A KEYBOARD THAN WITH A BOMB’’ -DANIEL A. MORRIS …‘SO, THE TIME TO STEM CYBER THREATS IS NOT TODAY BUT NOW’ RESTRICTED
THANK YOU RESTRICTED