Download presentation
Presentation is loading. Please wait.
Published byIngrid Sader Modified over 9 years ago
1
CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED
2
INTRODUCTION RESTRICTED
3
CYBERWARFARE AND CYBERCRIME ARE INTERTWINED CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN INSTRUMENT OF STATE POWER CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT COMMUNICATIONS AND THE FLOW OF INFORMATION “WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE CANNOT FIND OUT ANYTHING, INTELLIGENCE CANNOT FORM A STRATEGY” – SUN TZU IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER ARMY IN THE WORLD RESTRICTED
4
AIM THE AIM OF THIS PAPER IS TO HIGHLIGHT THE SECURITY IMPLICATIONS OF CYBER THREATS TO NIGERIA’S NATIONAL INTEREST RESTRICTED
5
SCOPE CONCEPTUAL DISCOURSE NATIONAL SECURITY SPECTRUM CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTERESTS AND THEIR EFFECTS CYBER STRATEGIES TO STEM THREATS RESTRICTED
6
CONCEPTUAL DISCOURSE CYBERCRIME CYBER TERRORISM CYBER WARFARE CYBER SECURITY NATIONAL INTEREST RESTRICTED
7
CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTEREST SOCIO-ECONOMIC SPHERE ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES CHILD PREDATION CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG TRAFFICKING ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM JAN – DEC 2009. FIGURE UP BY 50% COMPARED TO 2008 GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA UNDERSCORES THE FACT THAT A HOSTILE NATION WITH CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS THREAT RESTRICTED
8
POLITICO-MILITARY SPHERE MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES ARE PRONE TO EQUIPMENT DISRUPTION; SO, STRATEGISTS MUST BE AWARE THAT PART OF POILITICO- MILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNET- Kenneth Geers DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL ASSETS- President Barak Obama HACKING IN USA MILITARY FACILITY IN THE MIDDLE EAST 2008 OPERATION ORCHARD CYBER-SABOTAGE RESTRICTED
9
CYBER STRATEGIES TO STEM CYBER THREATS NATIONAL POLICY FRAMEWORK TO ALSO CAPTURE LEGAL REQUIREMENTS PUBLIC ENLIGHTENMENT CAPACITY BUILDING GOVERNMENT- PRIVATE PARTNERSHIP SYNERGY RESHAPING THE INTERNET ARCHITECTURE CYBER COUNTER-THREAT AGENCY RESTRICTED
10
CONCLUSION CYBER THREATS ARE GETTING WORSE DAILY THE NATION DOES NOT HAVE TO WAIT FOR A CYBER TSUNAMI TO OCCUR BEFORE IT ACTS A HOLISTIC APPROACH USING BDT ROADMAP NATIONAL POLICY FRAMEWORK PUBLIC ENLIGHTENMENT CAPACITY BUILDING GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY ESTABLISHMENT OF C2TA RESTRICTED
11
FOOD-FOR-THOUGHT ‘‘THE MODERN THIEF CAN STEAL MORE WITH A COMPUTER THAN WITH A GUN; TOMORROW’S TERRORIST MAY BE ABLE TO DO MORE DAMAGE WITH A KEYBOARD THAN WITH A BOMB’’ -DANIEL A. MORRIS …‘SO, THE TIME TO STEM CYBER THREATS IS NOT TODAY BUT NOW’ RESTRICTED
12
THANK YOU RESTRICTED
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.