The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
1 African ICT Roadmap to Achieve NEPAD Objectives Arusha, Tanzania, 1-3 April 2003 Roles of Government and ATU in the Implementation of NEPAD ICT objectives.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
ICT in Higher Education. A sub-Saharan Africa Prospective Oxford Symposium 2014 Daria Montella.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
EACO, WORKING GROUP 10 E-WASTE WORKSHOP REPORT
Mobile Technology And Cyber Security K. N. ATUAHENE Director, Domestic Trade and Distribution Ministry of Trade and Industry.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Cooperatives and Youth in the Context of Rural Development Presented at the Seminar Organized by Agri-Seta Prof. Muxe Nkondo National Small Business Advisory.
The Sixth Annual African Consumer Protection Dialogue Conference
AFI Comprehensive Implementation Programme (ACIP), in cooperation with AFCAC and other stakeholders, to organize Pan African Training Coordination Conferences.
A Framework for an African Policy Towards Creating Cyber Security Awareness IST-Africa 2011, Gaborone, Botswana May 2011 Zama Dlamini - CSIR Barend.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
Ng Regenie Fräser Secretary General October 29, 2008 Connecting the Caribbean & Caribbean Internet Forum.
BRIEF ON THE WORK OF THE EACO WORKING GROUP 4 ON POSTAL SERVICES DEVELOPMENT AND REGULATION By MATSIKO Gonzague – WG4 Representative.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
11 Workshop on Establishment of a Continental Accreditation Agency for Higher Education in Africa 10 – 11 April 2013, Addis Ababa Rationale for Establishing.
Armenia and Diaspora Armenia’s investment climate and Diaspora’s participation in development policies. Hayk Sargsyan, Johns Hopkins University.
Fair competition commission 1 Fifth Annual African Dialogue Consumer Protection Conference September 10-12, 2013 ● Livingstone, Zambia Empowering and Educating.
Cybersecurity Governance in Ethiopia
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
TSB WORKSHOP ACCRA, May ASSISTING COUNTRIES IN AFRICA REGION presented by: Margarida Evora Sagna ITU Representative,West Africa,
Ninth Meeting of the Regional Interagency Working Group on Information and Communication Technology (ICT), 19 December, 2005, Bangkok 1 STRATEGIC PLAN.
Committed to Connecting the World International Telecommunication Union Presentation Brief about ICTs Applications activities Telecommunication Development.
8 TH -11 TH NOVEMBER, 2010 UN Complex, Nairobi, Kenya MEETING OUTCOMES David Smith, Manager PEI Africa.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
1 “NEPAD and the Role of the Internet” By Dr Andile Ngcaba, DG, Department of Communications 12 September 2002 Department: Communications.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010.
MODEL POLICY FRAMEWORK FOR E-WASTE MANAGEMENT IN THE EAST AFRICAN REGION Nakiguli Helen Cynthia, Uganda Communications Commission,
International Telecommunication Union Accra, Ghana, June 2009 Towards Cyber Security - Kenyan Experience Christopher Kemei, Asst. Director Licensing.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
A look into current and future trends in national policies for eHealth and Innovation in the WHO European Region Clayton Hamilton, eHealth and Innovation.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Information Society and Development Applying Information and Communication Technologies (ICT) in the Finnish development co-operation.
CARIBBEAN WORKSHOP ON E-GOVERNMENT BEST PRACTICES Port of Spain, Trinidad & Tobago, July 26-28, 2005.
Cyberlaw Harmonization in the East African Community Cécile Barayre-El Shami Programme Manager, E-Commerce and Law Reform, ICT Analysis Section, Division.
In relation to WSIS Plan of Action – Internet Governance
Cyber Security and Georgia. New Challenges
MGMT 452 Corporate Social Responsibility
Cybersecurity in the ECOWAS region
Transport cooperation for an interconnected Africa
UNCITRAL Colloquium on Electronic Commerce Cécile Barayre-El Shami
Gender statistics in Information and Communication Technology for Women’s Empowerment and Gender Equality Dorothy Okello, Annual.
GENDER STATISTICS IN INFORMATION AND COMMUNICATION
Cybersecurity in Belarus a general overview of support areas
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
Summary of Actions ITU Regional Standardization Forum for Africa
Supported by ITU-BTRC Asia-Pacific Regulators’ Roundtable
Cyber Security Ecosystem of Georgia. Experience and Challenges
OVERVIEW OF EACO WORKING GROUP 07: E-WASTE AND COUNTERFEIT GADGETS MANAGEMENT PRESENTED TO THE 3RD AWARENESS WORKSHOP, 14TH – 16TH MAY 2018, KIGALI,
OVERVIEW OF EACO WORKING GROUP 07: E-WASTE AND COUNTERFEIT GADGETS MANAGEMENT PRESENTED TO THE 3RD AWARENESS WORKSHOP, 14TH – 16TH MAY 2018, KIGALI,
Workshop on Continental Strategy for Data Collection and Validation SRO-EA’s activities on Statistics Mr. Mactar Seck Economic Affairs Officer ICT Policies.
UNODC and CYBERCRIME October 2009.
SECURITY IN THE DIGITAL AGE
Presentation transcript:

The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber Security and Global Affairs With focus on International Cyber Security Governance, Human Factors, Policies and Technologies DBH, Budapest, Hungary May 31 to Jun 2, 2011

The Dilemma of the Information Society  The benefits of the Information Society are well known …  But the Information society has also created the new problems of Cyber Crime and Cyber Security

Cybercrime and Cyber Security in the Information Society  Definition  Cybercrime -- all criminal offences which are committed with the aid of, or targeted at, communication devices in a network. This can be for example the Internet, the telephone line or the mobile network.

Cybercrime and Cyber Security in the Information Society Why are Cyber Crimes on the Rise? 1. They are easy to learn how to commit; 2. They require few resources relative to the potential damage caused; 3. They can be committed in a jurisdiction without being physically present in it; 4. They are often not clearly illegal.

Issues and Challenges of Cyber security in Africa  Internet penetration is still relatively low but it is growing in Africa  Broadband penetration is very low  Mobile Telecommunications is growing exponentially

Issues and Challenges of Cyber Security in African  Increasingly more Cybercrimes are perpetrated through mobile phones  Social networking is on the rise and increasingly cybercrimes are perpetrated through the social networks (facebook, etc)  Cyber criminals target people inside and outside their national boundaries

Issues and Challenges of Cyber Security in African  Cloud computing is just being introduced into the continent but it has met with a lot of skepticism. Uncertainty about cloud security is evident in a Global Risk Survey by IBM’s Institute for Business Value, with 77% of respondents believing cloud made protecting privacy more difficult and 50% expressing worries about data breach or loss. In a further IBM survey 66% cite security as their top concern when considering cloud. The good news is that enterprises and governments around the world are addressing cloud’s privacy, authentication and security issues, and turning the promise of cloud computing into reality.

Cyber Security Initiatives in Africa  The United Nations Economic Commission for Africa (UNECA) is addressing cyber security within the framework of African Information Society Initiative (AISI). It advocates coherent and coordinated continental and regional approach to cyber security, as well as enhanced consideration of the issue in national ICT and Information Society strategies and action plans.

Cyber security Initiatives in Africa  According to the UNECA, African governments are demonstrating increased awareness of cyber security issues, but existing capability to deter, monitor or pursue cyber security is relatively low. The UNECA cyber security initiative is implemented in cooperation with the African Union in order to arrive at harmonized legal framework, and especially with guidelines on: Cyber crime; Personal data protection; Electronic transactions; e-Signature / Certification; Cyber security.

Cyber security Initiatives for Africa  CTOs Cyber security Forum 2011 aims to build on the achievements made in 2010 by encouraging a discourse on Cyber security between principal policy makers and ICT regulators from across the Commonwealth, particularly from Africa, with Global experts. The event will examine eight critical aspects of Cyber security: Protecting Government networks Protecting banking networks International Cooperation Protection of children online Security in the Cloud SPAM Identity theft and data protection Privacy on the Net

Cyber security Initiatives in Africa  Mauritius adopted a holistic approach in ensuring cyber security as the country views ICT as a pillar of national development and plans to make the country a national ICT hub.  The country’s National Information Security Strategic Plan is a part of the National Information Communication Technologies Strategic Plan 2007 – 2011 and Mauritius has set up a comprehensive legal framework along with an implementation and institutional framework.  Enforcement has been improved with the setting up of the Police Cyber crime unit in 2000 and the CERT-Mu in 2008.

Cyber security Initiatives in Africa  The cyber security taskforce of East African Communications Organization (EACO) consisting of ICT Regulators and Operators of Kenya Uganda and Tanzania, Rwanda and Burundi, was formed in 2008 to coordinate the development and of a cyber security management framework for the EACO region.  It is tasked with establishment of national CERTs, coordinating responses to cyber security incidents at the regional level; establishing regional and international partnership; and providing Regional Cyber security Incident Reports annually to the EACO member countries.

Cyber security Initiatives in Africa  Managing Cyber security in the EACO member countries is hampered by the lack of policy, legal and regulatory frameworks; lack of national security management frameworks; and limited cyber security awareness among other factors

Conclusions/Recommendations  African governments are demonstrating increased awareness of cyber security issues, but existing capability to deter, monitor or pursue cyber security is relatively low. Efforts to promote cyber security should focus on the following:  Create awareness and build capacity of key decision- makers to implement robust Cybersecurity frameworks  Help identify resilient technical measures, appropriate organizational structures and strong laws and regulations  Facilitate partnerships between different stakeholders to facilitate the flow of information, expertise and resources  Promote international cooperation

Conclusions/Recommendations Efforts to promote cyber security in Africa should specifically target the following:  Capacity Building  International Cooperation  Security for Mobile communications  Establishment of Policy and Legal frameworks  Protection of children online  Security in the Cloud  Identity theft and data protection  Privacy on the Net

16 Thank You!!! Prof Raymond Akwule President, Digital Bridge Institute  

Cybercrime and Cyber Security in the Information Society  Types of Cybercrime Auction Fraud Auction Fraud — Romania Counterfeit Cashier's Check Credit Card Fraud Debt Elimination Parcel Courier Scheme Employment/Business Opportunities Escrow Services Fraud Identity Theft Internet Extortion Investment Fraud Lotteries Nigerian Letter or "419" Phishing/Spoofing Ponzi/Pyramid Reshipping Spam Third Party Receiver of Funds Telecom Fraud

Top Ten Countries (Cyber Crime Perpetrators)  2008  1. United States 66.1%  2. United Kingdom 10.5%  3. Nigeria 7.5%  4. Canada 3.1%  5. China 1.6%  6. South Africa 0.7%  7. Ghana 0.6%  8. Spain 0.6%  9. Italy 0.5%  10. Romania 0.5%  2010  1. United States 91.2%  2. Canada 1.5%  3. United Kingdom 1.0%  4. Australia 0.7%  5. India 0.5%  6. South Africa 0.2%  7. Germany 0.2%  8. Mexico 0.2%  9. France 0.2%  10. Philippines 0.2%  FBI Reports 18