130 likes | 366 Views
RESTRICTED. CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc (+) fwc CMH MIMC MNIM. RESTRICTED. RESTRICTED. INTRODUCTION. RESTRICTED. RESTRICTED. CYBERWARFARE AND CYBERCRIME ARE INTERTWINED
E N D
RESTRICTED CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTERESTBYMAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED
RESTRICTED INTRODUCTION RESTRICTED
RESTRICTED • CYBERWARFARE AND CYBERCRIME ARE INTERTWINED • CYBERSPACE TECHNOLOGY IS FAST EMERGING AS AN INSTRUMENT OF STATE POWER • CYBER COULD BE EXPLOITED TO DEGRADE, DISRUPT COMMUNICATIONS AND THE FLOW OF INFORMATION • “WHEN YOU HAVE FORM, UNDERCOVER ESPIONAGE CANNOT FIND OUT ANYTHING, INTELLIGENCE CANNOT FORM A STRATEGY” – SUN TZU • IRAN CLAIMS TO HAVE THE SECOND-LARGEST CYBER ARMY IN THE WORLD RESTRICTED
RESTRICTED AIM THE AIM OF THIS PAPER IS TO HIGHLIGHT THE SECURITY IMPLICATIONS OF CYBER THREATS TO NIGERIA’S NATIONAL INTEREST RESTRICTED
RESTRICTED SCOPE • CONCEPTUAL DISCOURSE • NATIONAL SECURITY SPECTRUM • CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTERESTS AND THEIR EFFECTS • CYBER STRATEGIES TO STEM THREATS RESTRICTED
RESTRICTED CONCEPTUAL DISCOURSE • CYBERCRIME • CYBER TERRORISM • CYBER WARFARE • CYBER SECURITY • NATIONAL INTEREST RESTRICTED
RESTRICTED CRITICAL CYBER THREATS INIMICAL TO NATIONAL INTEREST SOCIO-ECONOMIC SPHERE • ONE MILION ATTACKS DAILY ON ECONOMIC ACTIVITIES • CHILD PREDATION • CYBER CRIMES GIVES ILLEGAL MONEY MORE THAN DRUG TRAFFICKING • ALMOST USD 560M LOST TO CYBER CRIMINALS IN THE USA FROM JAN – DEC 2009. FIGURE UP BY 50% COMPARED TO 2008 • GEORGIA’S AND ESTONIA’S CYBER ATTACKS BY RUSSIA UNDERSCORES THE FACT THAT A HOSTILE NATION WITH CYBER TECHNOLOGY EDGE COULD CONSTITUTE A SERIOUS THREAT RESTRICTED
RESTRICTED POLITICO-MILITARY SPHERE • MILITARY ACTIVITIES USING COMPUTERS AND SATELLITES ARE PRONE TO EQUIPMENT DISRUPTION; SO, STRATEGISTS MUST BE AWARE THAT PART OF POILITICO-MILITARY CONFLICTS WILL TAKE PLACE ON THE INTERNET-Kenneth Geers • DIGITAL INFRASTRUCTURE ARE STRATEGIC NATIONAL ASSETS- President Barak Obama • HACKING IN USA MILITARY FACILITY IN THE MIDDLE EAST 2008 • OPERATION ORCHARD • CYBER-SABOTAGE RESTRICTED
RESTRICTED CYBER STRATEGIES TO STEM CYBER THREATS • NATIONAL POLICY FRAMEWORK TO ALSO CAPTURE LEGAL REQUIREMENTS • PUBLIC ENLIGHTENMENT • CAPACITY BUILDING • GOVERNMENT- PRIVATE PARTNERSHIP SYNERGY • RESHAPING THE INTERNET ARCHITECTURE • CYBER COUNTER-THREAT AGENCY RESTRICTED
RESTRICTED CONCLUSION • CYBER THREATS ARE GETTING WORSE DAILY • THE NATION DOES NOT HAVE TO WAIT FOR A CYBER TSUNAMI TO OCCUR BEFORE IT ACTS • A HOLISTIC APPROACH USING BDT ROADMAP • NATIONAL POLICY FRAMEWORK • PUBLIC ENLIGHTENMENT • CAPACITY BUILDING • GOVERNMENT-PRIVATE PARTNERSHIP SYNERGY • ESTABLISHMENT OF C2TA RESTRICTED
RESTRICTED FOOD-FOR-THOUGHT ‘‘THE MODERN THIEF CAN STEAL MORE WITH ACOMPUTER THAN WITH A GUN; TOMORROW’S TERRORIST MAY BE ABLE TO DO MORE DAMAGE WITH A KEYBOARD THAN WITH A BOMB’’ -DANIEL A. MORRIS …‘SO, THE TIME TO STEM CYBER THREATS IS NOT TODAY BUT NOW’ RESTRICTED
RESTRICTED THANK YOU RESTRICTED