Egypt has seen a sharp rise in cybercrime and malware in recent years. Political unrest led the government to shut off internet access during protests in 2011. Egypt now ranks third globally for phishing attacks and had one of the highest malware infection rates in Africa in 2012. The government is working to establish comprehensive cybersecurity laws and regulations but currently has only piecemeal legislation across various bills. Reducing software piracy by 10% could generate $287 million and nearly 2,000 new IT jobs for Egypt.
The document provides an analysis of Libya's cyber capabilities and vulnerabilities based on open source intelligence. It finds that while Libya lags in offensive cyber abilities, its critical infrastructure faces significant risks. Internet connectivity in Libya was shut off during periods of unrest, likely to conceal events from civilians and the world. Libya relies heavily on international partners for its limited cyber defenses. The country presents opportunities for malicious actors and foreign meddling if these gaps are not addressed properly in Libya's development.
Forbes Africa - Africa ICT Outlook 2016Tebogo Mogapi
The document discusses ICT integration in Africa and its importance for development on the continent. Mobile connectivity has generated $56 billion for Africa's economy but more needs to be done to overcome challenges. Infrastructure investments in undersea cables have boosted internet access but cybercrime risks must be addressed. Cloud computing adoption is growing and countries aim to connect all sectors by 2030. Harnessing ICT requires expanding infrastructure to rural areas and closing gaps between those who can and cannot access the internet.
The document discusses cyber threats facing the Middle East in the 21st century. It outlines vulnerabilities in the region's ICT infrastructure and maturity levels. Major threats discussed include targeted attacks like Stuxnet, politically motivated hacktivism during the Arab Spring, and the growing cybercrime underground market. The region faces risks from threats tailored to its infrastructure and from being used as a launch point for global attacks due to vulnerabilities. Stronger security practices, regulations, and expertise are needed to protect critical systems and address cyber issues in the Middle East.
Cybercrime poses one of the biggest existential threats according to Michael Mullen. The document discusses the history of cybercrime from the first recorded incident in 1820 to modern trends, including over 600,000 compromised Facebook accounts daily and 1 in 10 social network users becoming victims. With the global cost of cybercrime estimated to reach $2 trillion by 2019, the document emphasizes the importance of using antivirus software, firewalls, backups, and security settings to stay safe from cybercrime and maintain privacy.
Research Article published in the 3rd Annual Cyber Security for Energy & Utilities.
23 - 26 March 2014 - The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, United Arab Emirates
The document discusses the growing threat of mobile botnets and their potential to infect smartphones on a massive scale. It outlines how existing Android and Symbian botnets have infected over a million devices and describes how future mobile botnets could utilize SMS and hijacked phone functions like tethering to spread. The presentation warns that without security improvements to platforms, smartphones risk becoming "mini ISPs" that amplify botnet attacks. It advocates restricting phone functions and revealing only device IDs to prevent proliferation of these "pocket botnets".
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
Cyber war a threat to indias homeland security 2015Ajay Serohi
The document discusses cyber warfare as a threat to India's homeland security. It notes India's increasing reliance on digital infrastructure and discusses potential future cyber incidents like power grid failures, financial system paralysis, and satellite or communication system disruptions. The document outlines challenges like attribution of attacks and issues with cyber deterrence. It also examines threats in India's cyber domain from state actors like China and Pakistan as well as non-state groups, and argues for integrating cyber security into India's overall homeland security strategy.
The document provides an analysis of Libya's cyber capabilities and vulnerabilities based on open source intelligence. It finds that while Libya lags in offensive cyber abilities, its critical infrastructure faces significant risks. Internet connectivity in Libya was shut off during periods of unrest, likely to conceal events from civilians and the world. Libya relies heavily on international partners for its limited cyber defenses. The country presents opportunities for malicious actors and foreign meddling if these gaps are not addressed properly in Libya's development.
Forbes Africa - Africa ICT Outlook 2016Tebogo Mogapi
The document discusses ICT integration in Africa and its importance for development on the continent. Mobile connectivity has generated $56 billion for Africa's economy but more needs to be done to overcome challenges. Infrastructure investments in undersea cables have boosted internet access but cybercrime risks must be addressed. Cloud computing adoption is growing and countries aim to connect all sectors by 2030. Harnessing ICT requires expanding infrastructure to rural areas and closing gaps between those who can and cannot access the internet.
The document discusses cyber threats facing the Middle East in the 21st century. It outlines vulnerabilities in the region's ICT infrastructure and maturity levels. Major threats discussed include targeted attacks like Stuxnet, politically motivated hacktivism during the Arab Spring, and the growing cybercrime underground market. The region faces risks from threats tailored to its infrastructure and from being used as a launch point for global attacks due to vulnerabilities. Stronger security practices, regulations, and expertise are needed to protect critical systems and address cyber issues in the Middle East.
Cybercrime poses one of the biggest existential threats according to Michael Mullen. The document discusses the history of cybercrime from the first recorded incident in 1820 to modern trends, including over 600,000 compromised Facebook accounts daily and 1 in 10 social network users becoming victims. With the global cost of cybercrime estimated to reach $2 trillion by 2019, the document emphasizes the importance of using antivirus software, firewalls, backups, and security settings to stay safe from cybercrime and maintain privacy.
Research Article published in the 3rd Annual Cyber Security for Energy & Utilities.
23 - 26 March 2014 - The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, United Arab Emirates
The document discusses the growing threat of mobile botnets and their potential to infect smartphones on a massive scale. It outlines how existing Android and Symbian botnets have infected over a million devices and describes how future mobile botnets could utilize SMS and hijacked phone functions like tethering to spread. The presentation warns that without security improvements to platforms, smartphones risk becoming "mini ISPs" that amplify botnet attacks. It advocates restricting phone functions and revealing only device IDs to prevent proliferation of these "pocket botnets".
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
Cyber war a threat to indias homeland security 2015Ajay Serohi
The document discusses cyber warfare as a threat to India's homeland security. It notes India's increasing reliance on digital infrastructure and discusses potential future cyber incidents like power grid failures, financial system paralysis, and satellite or communication system disruptions. The document outlines challenges like attribution of attacks and issues with cyber deterrence. It also examines threats in India's cyber domain from state actors like China and Pakistan as well as non-state groups, and argues for integrating cyber security into India's overall homeland security strategy.
This document defines key concepts related to information security. It discusses what information and information security are, as well as the multilayered nature of security. The main threats to information security are described as inadvertent acts, deliberate acts, natural disasters, technical failures, and management failure. Specific types of malware like viruses, worms, trojans, and spyware are explained. The document also differentiates between hackers and crackers and emphasizes the importance of using antivirus software to protect against threats.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Cyber security involves protecting computers, networks, programs and data from unauthorized access and cyber attacks. It includes communication security, network security and information security to safeguard organizational assets. Cyber crimes are illegal activities that use digital technologies and networks, and include hacking, data and system interference, fraud, and illegal device usage. Some early forms of cyber crime date back to the 1970s. Maintaining antivirus software, firewalls, backups and strong passwords can help protect against cyber threats while being mindful of privacy and security settings online. The document provides an overview of cyber security, cyber crimes, their history and basic safety recommendations.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
This document discusses cyber security and the need for it. It begins by defining cyber security as the security offered through online services to protect information. It then discusses how security threats are increasing as more people go online. The document covers the meaning of the term "cyber," major security problems like viruses and hackers, and ways to implement and maintain cyber security, such as using strong passwords and firewalls. It concludes by emphasizing that cyber security is everyone's responsibility.
This document provides an overview of cyber crime and security. It defines cyber crime as illegal activity committed on the internet, such as stealing data or importing malware. The document then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using the computer as a target or weapon. Specific types of cyber crimes discussed include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document concludes by emphasizing the importance of cyber security.
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
This document discusses cybercrime and cyber security challenges in Africa. It notes that while internet penetration is growing, broadband access remains low. Mobile networks are the primary way Africans access the internet. Cybercriminals target both individuals and networks across borders through social media and mobile phones. African governments recognize cyber security issues but have limited capabilities. The document recommends capacity building, international cooperation, and establishing legal frameworks to promote cyber security in Africa.
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
The document discusses addressing cyber threats in the banking sector. It outlines CyberSecurity Malaysia's mandate to monitor national cybersecurity and provide specialized cybersecurity services. It then discusses trends in cyber attacks targeting the banking and financial sector, including advanced persistent threats and malware attacks. Specific data on phishing and ransomware attacks is also presented. The document concludes by noting growing concerns around threats posed by the expanding Internet of Things.
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceMoses Kemibaro
I am Moses Kemibaro, the Founder & CEO of Dotsavvy, Nairobi's leading digital business agency committed to driving digital transformation across East Africa and beyond.
Recently, I had the incredible opportunity to present at the inaugural Cyberweek Africa 2023 Cybersecurity Conference, an event that brought together a diverse group of experts and stakeholders in the field of cybersecurity.
In my presentation titled "Building Cybersecurity Ecosystems in Africa: Prescription for Resilience," I delved into the potential, risks, and realities of navigating the digital frontier in Africa.
The focus was on establishing a harmonious and resilient cybersecurity ecosystem that safeguards our digital assets while enabling growth.
Key Takeaways:
Africa's Cyber Landscape: I emphasized the urgent need to address the rising cyber threats in Africa, which, if unchecked, could hinder economic growth and digital progress.
Opportunities and Challenges: Africa's rapid digital transformation offers immense opportunities, but it is also accompanied by infrastructure and regulatory challenges that need immediate attention.
Building a Cybersecurity Ecosystem: The presentation underscored the necessity of a strong technological backbone, a robust regulatory framework, and a well-educated and empowered human element to combat cybersecurity challenges.
Collaborations and Success Stories: Highlighting successful initiatives and collaborations, I underscored the need for global partnerships and knowledge sharing.
Path Forward: The presentation concluded with short-term and long-term strategies that can help Africa secure its digital future.
This document discusses cybersecurity challenges in Africa. It notes that while Africa has experienced strong economic growth in recent decades, increased technology and internet usage has also increased vulnerabilities to cybercrime. Cybercrime is growing rapidly in Africa and costs economies millions annually. The document recommends that African countries strengthen policy and legal frameworks around cybersecurity, harmonize laws and standards across countries, increase coordination and cooperation between governments and organizations, and invest in cybersecurity infrastructure to help address these challenges.
The document discusses cybersecurity trends in South Africa. Some key points:
1. South Africa has a growing cybersecurity market due to increasing digital transformation and cyber attacks targeting sectors like financial services and healthcare.
2. The cybersecurity market in South Africa is expected to grow from $667 million in 2017 to over $1 billion by 2022, as enterprises allocate more of their IT budgets to security.
3. Common causes of data breaches in South Africa include malicious attacks and human errors, with the financial cost estimated to be around $200 million per year.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
This document summarizes a presentation on cybercrime. It defines cybercrime and discusses the underground economy where cybercriminals buy and sell stolen data and hacking tools. It provides statistics on the top countries and sectors targeted by cyberattacks. Examples of cybercriminal business models are given, showing how they mimic legitimate business models. The types of stolen data for sale in cybercrime forums are listed, along with their typical price ranges.
The report summarizes McAfee's findings on cyber threats from the first quarter of 2010. Key points include:
- Spam volumes returned to mid-2008 levels after declining in late 2009. Pill and male enhancement messages made up over 70% of spam.
- Different types of spam were most common in different countries. For example, malware and drugs messages were popular from China while 419 scams and watches messages came mostly from Nigeria.
- Attacks continued to target popular software like Adobe Reader and Microsoft Internet Explorer. Cybercriminals also increasingly targeted social media like Facebook.
- Major cyberattacks in the quarter included Operation Aurora, which compromised many large companies by targeting software vulnerabilities.
The document discusses cyber crime and security. It defines cyber crime as illegal activities committed on computers using the internet, such as hacking, computer vandalism, software piracy, and cyber terrorism. The document outlines the history of cyber crime, categories of cyber crime, types of cyber crime, and the current state of cyber crime in Nepal. It emphasizes the importance of cyber security and cyber laws in Nepal to curb illegal online activities and keep internet users safe.
1. The document discusses issues related to internet governance and the annual Internet Governance Forum (IGF) meeting in Istanbul, Turkey. It outlines challenges facing developing countries regarding digital divides, lack of standards and policies, and high costs.
2. It then summarizes Nepal's status and challenges, including increasing cybercrime, lack of payment gateways hindering e-commerce, and the need for improved infrastructure and policies.
3. The document concludes by making suggestions for IGF 2014, calling for more multistakeholder participation and an approach that preserves free and equal internet access for all.
This document defines key concepts related to information security. It discusses what information and information security are, as well as the multilayered nature of security. The main threats to information security are described as inadvertent acts, deliberate acts, natural disasters, technical failures, and management failure. Specific types of malware like viruses, worms, trojans, and spyware are explained. The document also differentiates between hackers and crackers and emphasizes the importance of using antivirus software to protect against threats.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Cyber security involves protecting computers, networks, programs and data from unauthorized access and cyber attacks. It includes communication security, network security and information security to safeguard organizational assets. Cyber crimes are illegal activities that use digital technologies and networks, and include hacking, data and system interference, fraud, and illegal device usage. Some early forms of cyber crime date back to the 1970s. Maintaining antivirus software, firewalls, backups and strong passwords can help protect against cyber threats while being mindful of privacy and security settings online. The document provides an overview of cyber security, cyber crimes, their history and basic safety recommendations.
Cybercrime involves using computers or the internet to steal identities or import illegal programs. The first recorded cybercrime took place in 1820. There are different types of cybercrimes such as hacking, denial of service attacks, computer viruses, and software piracy. Cybercrimes also include using computers to attack other systems, commit real-world crimes, or steal proprietary information. Common cyber attacks include financial fraud, sabotage of networks, theft of data, and unauthorized access. Internet security aims to establish rules to protect against such attacks by using antivirus software, firewalls, and updating security settings regularly.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
This document discusses cyber security and the need for it. It begins by defining cyber security as the security offered through online services to protect information. It then discusses how security threats are increasing as more people go online. The document covers the meaning of the term "cyber," major security problems like viruses and hackers, and ways to implement and maintain cyber security, such as using strong passwords and firewalls. It concludes by emphasizing that cyber security is everyone's responsibility.
This document provides an overview of cyber crime and security. It defines cyber crime as illegal activity committed on the internet, such as stealing data or importing malware. The document then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using the computer as a target or weapon. Specific types of cyber crimes discussed include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document concludes by emphasizing the importance of cyber security.
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
This document discusses cybercrime and cyber security challenges in Africa. It notes that while internet penetration is growing, broadband access remains low. Mobile networks are the primary way Africans access the internet. Cybercriminals target both individuals and networks across borders through social media and mobile phones. African governments recognize cyber security issues but have limited capabilities. The document recommends capacity building, international cooperation, and establishing legal frameworks to promote cyber security in Africa.
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
The document discusses addressing cyber threats in the banking sector. It outlines CyberSecurity Malaysia's mandate to monitor national cybersecurity and provide specialized cybersecurity services. It then discusses trends in cyber attacks targeting the banking and financial sector, including advanced persistent threats and malware attacks. Specific data on phishing and ransomware attacks is also presented. The document concludes by noting growing concerns around threats posed by the expanding Internet of Things.
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceMoses Kemibaro
I am Moses Kemibaro, the Founder & CEO of Dotsavvy, Nairobi's leading digital business agency committed to driving digital transformation across East Africa and beyond.
Recently, I had the incredible opportunity to present at the inaugural Cyberweek Africa 2023 Cybersecurity Conference, an event that brought together a diverse group of experts and stakeholders in the field of cybersecurity.
In my presentation titled "Building Cybersecurity Ecosystems in Africa: Prescription for Resilience," I delved into the potential, risks, and realities of navigating the digital frontier in Africa.
The focus was on establishing a harmonious and resilient cybersecurity ecosystem that safeguards our digital assets while enabling growth.
Key Takeaways:
Africa's Cyber Landscape: I emphasized the urgent need to address the rising cyber threats in Africa, which, if unchecked, could hinder economic growth and digital progress.
Opportunities and Challenges: Africa's rapid digital transformation offers immense opportunities, but it is also accompanied by infrastructure and regulatory challenges that need immediate attention.
Building a Cybersecurity Ecosystem: The presentation underscored the necessity of a strong technological backbone, a robust regulatory framework, and a well-educated and empowered human element to combat cybersecurity challenges.
Collaborations and Success Stories: Highlighting successful initiatives and collaborations, I underscored the need for global partnerships and knowledge sharing.
Path Forward: The presentation concluded with short-term and long-term strategies that can help Africa secure its digital future.
This document discusses cybersecurity challenges in Africa. It notes that while Africa has experienced strong economic growth in recent decades, increased technology and internet usage has also increased vulnerabilities to cybercrime. Cybercrime is growing rapidly in Africa and costs economies millions annually. The document recommends that African countries strengthen policy and legal frameworks around cybersecurity, harmonize laws and standards across countries, increase coordination and cooperation between governments and organizations, and invest in cybersecurity infrastructure to help address these challenges.
The document discusses cybersecurity trends in South Africa. Some key points:
1. South Africa has a growing cybersecurity market due to increasing digital transformation and cyber attacks targeting sectors like financial services and healthcare.
2. The cybersecurity market in South Africa is expected to grow from $667 million in 2017 to over $1 billion by 2022, as enterprises allocate more of their IT budgets to security.
3. Common causes of data breaches in South Africa include malicious attacks and human errors, with the financial cost estimated to be around $200 million per year.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
This document summarizes a presentation on cybercrime. It defines cybercrime and discusses the underground economy where cybercriminals buy and sell stolen data and hacking tools. It provides statistics on the top countries and sectors targeted by cyberattacks. Examples of cybercriminal business models are given, showing how they mimic legitimate business models. The types of stolen data for sale in cybercrime forums are listed, along with their typical price ranges.
The report summarizes McAfee's findings on cyber threats from the first quarter of 2010. Key points include:
- Spam volumes returned to mid-2008 levels after declining in late 2009. Pill and male enhancement messages made up over 70% of spam.
- Different types of spam were most common in different countries. For example, malware and drugs messages were popular from China while 419 scams and watches messages came mostly from Nigeria.
- Attacks continued to target popular software like Adobe Reader and Microsoft Internet Explorer. Cybercriminals also increasingly targeted social media like Facebook.
- Major cyberattacks in the quarter included Operation Aurora, which compromised many large companies by targeting software vulnerabilities.
The document discusses cyber crime and security. It defines cyber crime as illegal activities committed on computers using the internet, such as hacking, computer vandalism, software piracy, and cyber terrorism. The document outlines the history of cyber crime, categories of cyber crime, types of cyber crime, and the current state of cyber crime in Nepal. It emphasizes the importance of cyber security and cyber laws in Nepal to curb illegal online activities and keep internet users safe.
1. The document discusses issues related to internet governance and the annual Internet Governance Forum (IGF) meeting in Istanbul, Turkey. It outlines challenges facing developing countries regarding digital divides, lack of standards and policies, and high costs.
2. It then summarizes Nepal's status and challenges, including increasing cybercrime, lack of payment gateways hindering e-commerce, and the need for improved infrastructure and policies.
3. The document concludes by making suggestions for IGF 2014, calling for more multistakeholder participation and an approach that preserves free and equal internet access for all.
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
This document discusses rallying youth against cyber crime through awareness and prevention. It proposes a three-pronged strategy focusing on prevention, preparedness, and awareness creation. This would involve conducting forums to educate youth, promoting cyber safety drills, and lobbying for legal changes. The strategy argues that youth are well-positioned to catalyze change given their role as major users of technology. By making youth aware of the serious financial and social impacts of cyber crimes, this approach could drastically reduce such incidents worldwide.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Digital Bosphorus - The State of Turkish eCommerce 2013 - Sina AfraSina Afra
Turkey has seen strong growth in eCommerce, with online retail sales growing at a 35.5% compound annual growth rate since 2008. Key factors driving this growth include high rates of internet and mobile internet penetration among Turkish consumers, widespread credit card usage, a strong logistics infrastructure, and social media-savvy consumers under 35. While eCommerce still only accounts for a small portion of total retail spending, Turkey is well-positioned for continued expansion in online shopping due to strong underlying demand and technological adoption trends.
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
Computer science and cyber crime were presented. Cyber crime was defined as illegal activity committed using computers and the internet, such as hacking, denial of service attacks, credit card fraud, and software piracy. A brief history noted the first recorded cyber crime occurred in 1981, and the first cyber crime in Pakistan was reported in 2003. Cyber crimes can involve computers being used as targets or weapons, such as ransomware preventing access to files. Basic safety tips include using antivirus software, firewalls, and maintaining backups to help prevent cyber crimes.
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
Pat Pather, Chief Executive Officer at Forensic Sciences Institute, delivered a presentation on Cyber Security Unchartered: Vigilance, Innovation and Adaptability- Exploring the Depths of Cybersecurity, at Public Sector Cybersecurity Summit 2023 on the 3rd of October 2023. #PublicSec2023 #Conference #Cybersecurity #PublicSector
Similar to Africa 2013: Cyber-Crime, Hacking & Malware (20)
Our own new research into bullying in tech supports this slightly sinister, nefarious view of career climbers who clamber on up, at both the expense of the company and their victims. Findings reveal that from a self-selecting study of over 650 IT professionals, 75% reported they had been bullied. Of these 94% highlighted psychological bullying, and in 74% of cases, the perpetrator was senior. This perfectly fits the profile of individuals who strategically abuse others to maintain their own position. And this type of manipulative self-protectionism can really hinder the bottom line.
InfoShot: Smartphones Dial Up The WorldIDG Connect
Smartphones are the phasers that bridge real and virtual worlds and as prices have fallen and more countries have created wealth they have become enormously popular. As the mobile device most of use to access the internet they are arguably the most significant devices in use today. But smartphones cost more than ‘dumbphones’ – basic handsets – or feature phones and so they are still advancing in market share. However, falling prices, more wireless broadband access and deliberate attempts to crack more markets on the part of vendors mean that smartphones are coming to more of us all over the world.
Over the last couple of months, many of the big US tech companies have been releasing their diversity reports. It’s reinforced a fact most people have known for a while: Tech is a white man’s game.
While many of the companies have a fairly high proportion of women in the workforce, few are in tech or leadership roles. Pinterest’s Tracy Chou recently gathered info on the number of female software engineers at various startups and big tech companies.
Women make up about 16% of engineers from 150 startups. The only company with more than 100 engineers and more than a 20% female workforce is ThoughtWorks. Dropbox, Mozilla and Yelp’s engineering workforces are only 8% women, Github’s is 6%.
But while gender and tech is an issue often brought up, ethnic diversity is also still a major issue. According to US census figures, the ethnic make-up of the country’s 317 million-odd people is around 16% Hispanic, 12% African America and 4.7% Asian. Look at the diversity reports of some of the US’ biggest tech firms however, and you’d get a very different picture.
Tech companies seem to have a disproportionate amount of Asian workers compared to Hispanic or African American workers. Most have fewer than 3% African American workers and 9% Hispanic, but 30% Asian – often within tech or leadership roles. Only Apple can say its company workforce is even close to the ethnic make-up of the country.
This isn’t to say companies should purposely go out of their way to hire Hispanic or African Americans over other ethnicities. Companies should hire the best people for the job irrelevant of other issues. But why there are so few people from certain communities when they make up a significant proportion of the population needs to be looked at.
Bullying: The Uncomfortable Truth About IT IDG Connect
IDG Connect has spoken to a range of bullying experts and
conducted research to a self-selecting sample of 650 IT
professionals. This report blends new statistics with detailed feedback from over 400 testimonials and aims to shed light on this misunderstood and overlooked topic.
The document surveys hybrid cloud adoption in Australia and New Zealand. It finds that the top barriers to hybrid cloud implementation are integration costs, lack of interoperability and complexity with multiple service level agreements. It also finds that future cloud investment plans show a preference for on-premise private cloud solutions, as well as off-premise public cloud services both approved and unapproved by IT departments. The high frequency of cloud-supported projects demonstrates how organizations in Australia and New Zealand have come to rely on cloud services.
Security in the Hybrid Cloud Now and in 2016 IDG Connect
New research conducted by IDG Connect, on behalf of F5, collates the views of 50 IT decision makers in large organisations across Australia and Singapore. This infographic investigates the state of current security practices in the hybrid cloud and looks at where things are likely to head by 2016.
The majority of organizations in France, Germany and the UK have more work to do to implement security measures required by new EU regulations on networking, information security, and data protection that take effect in the next two to three years. A survey found that only 39% have all measures in place for the Network and Information Security regulation, and only 20% have all measures for the General Data Protection Regulation. Establishing new hardware, software, and security policies to comply with the regulations is seen as the biggest challenge, along with high implementation costs. In-house IT departments are expected to take primary responsibility for assessing compliance requirements and developing policies.
OpenStack: The Platform of Choice for Cloud [Infographic]IDG Connect
An IDG Connect survey found that many organizations are on their second or third implementation of private cloud using either internally developed solutions or vendor offerings. Companies face challenges like resource management, application management, application migration, and simplifying IT management. Vendors and system integrators can help address these issues and provide guidance on starting an OpenStack implementation to manage private cloud environments.
Digital Maturity in the Financial Sector IDG Connect
The digital maturity of Financial Services through South East Asia currently lags behind
some markets like China. Yet looking ahead, it is set to change over the next 18 months
– if the cost barriers preventing organizations from achieving digital maturity can be overcome. This infographic highlights core digital marketing trends in the finance sector for 2015 and beyond, collected from a split of 150 senior marketers in Malaysia, Thailand, Singapore and Indonesia.
This infographic, produced by IDG Connect, provides feedback from 110 C-Level and IT decision makers on desktop virtualisation. These professionals come from a broad range of industries and help deliver a snapshot of industry opinion on Desktop as a Service through the UK.
20 Red Hot, Pre-IPO Companies in 2015 B2B TechIDG Connect
This document profiles 20 privately held tech companies that the author believes have good prospects for an initial public offering (IPO) in 2015. It provides a brief overview and analysis of each company, including their market opportunity and competitiveness, funding to date, and interviews with executives. The author notes that not all of the companies will necessarily IPO, as some may be acquired, but they each have a chance to go public if market conditions are right and they can continue executing well. The purpose is to survey interesting pre-IPO companies, not to predict their success or failure on public markets.
The Cloud may invoke images of effervescence that leaves no trace,
but in reality the Cloud means just another data center, along with the
accompanying Carbon Footprint. The issue of being Green has never
been higher on the agenda, but how do professionals feel about Green IT,
and how does this vary either side of the Atlantic? This paper compares
the enthusiasm for Green IT between the US and Europe.
Voted third in ‘105 Crucial Websites on Data Centers for IT Specialists’, by Technologyschools.org, ‘The Future of the Data Center’ is an Oracle sponsored social portal created by IDG Connect. Through a new white paper, 24 blogs and a targeted email campaign, this delivered 561 leads from 26 countries in 6 months.
The document discusses Ethiopia's efforts to build a private sector and attract foreign investment through its $79 billion Growth and Transformation Plan. Some key points:
- The plan aims to boost infrastructure like roads, railways, and a large hydroelectric dam, but the World Bank and IMF are concerned it is "crowding out" the private sector.
- Foreign interest is rising due to Ethiopia's large, low-cost workforce and central location, but its business culture can be difficult for outsiders to understand given the country's history of state dominance.
- Ethiopia has ambitious goals but faces challenges in transitioning to a market-driven economy and making credit available to support private businesses. Success will
Healthcare Report: Robots, Tablets & Social MediaIDG Connect
IDG Connect has released a new report on how consumer devices are dramatically changing healthcare. It examines the numerous benefits it offers, such as the integration of iPads into practicing medicine, and the use of apps that can track patient health. It also questions the impact of these devices on the patient-doctor relationship. Are these devices actually improving patient care – or are they contributing to destroying the heart of healthcare – the traditional patient-doctor relationship?
The document summarizes research from IDG Connect on legal and marketing professionals' views of US data privacy laws. The research found that 81% of respondents did not think US privacy laws were sufficient or did not know if they were sufficient. Both legal and marketing professionals shared similar views, with only around 20% feeling current laws go far enough. The US has a fragmented approach to data privacy laws compared to a unified approach in the EU. There is debate around whether proposed stronger EU privacy laws under the GDPR will have significant impacts on US companies.
This document provides an overview of big data in 2013 based on a survey of 469 global IT and marketing professionals. It finds that while most see big data as an opportunity, there is a disconnect between IT and marketing departments in how they collaborate on big data initiatives. Both sides agree more investment in data scientists is needed to maximize big data's potential but recognize challenges in skills gaps and a lack of communication between top managers. The future of big data is predicted to grow substantially across industries globally by 2018, though regulations and consumer privacy concerns present challenges that companies must address.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
The Microsoft 365 Migration Tutorial For Beginner.pptx
Africa 2013: Cyber-Crime, Hacking & Malware
1. CYBER-CRIME , HACKING
AND MALWARE
2013
AFRICA
As economies and technology thrive across Africa, IDG Connect investigates the
state of cyber threats across the four corners of the continent. With spotlights on
Egypt, South Africa, Kenya and Nigeria, this paper also presents local security
opinions from experts on the ground.
19th October 2012
2. Africa
Contents
African Overview 3
Introduction 3
The Security Conundrum 4
Malware and Piracy 4
Regulation 5
Expert Opinion - Contador Harrison 6
Software Director, Somocon Oy, Finland
Egypt : SP TLIGHT 7
Cyber-crime 7
Politics 8
Cyber-war 8
Expert Opinion - Pierluigi Paganini 9
Chief Security Information Officer, Bit4ld Group & Founder of
SecurityAffairs.co
South Africa : SP TLIGHT 10
Decline in Viruses 10
Pirates and Hackers 11
Overview 11
Kenya : SP TLIGHT 12
Open Season for Hackers 12
Fighting Back 13
Expert Opinion - Kostja Reim 14
Managing Director of Security Risk Solutions Ltd
Nigeria : SP TLIGHT 15
People Power 15
Positive Action 16
Conclusion 17
3. Africa
Introduction
In the first decade of this millennium, the Economist found that six of the world’s fastest growing economies were in
sub-Saharan Africa. This has only continued, and today the continent is renowned for its bourgeoning middle class,
mall culture and rapid adoption of mobile technology. In a recent report from HSBC that predicted the top 50 world
economies of 2050, there were substantial rises expected across Africa; Egypt is due to climb 15 places to 20th
position (putting it four places ahead of the Netherlands, which drops nine places); whilst Nigeria is anticipated to rise
nine places to 37th. It seems Africa is finally beginning to put its stamp on the global economic map.
The African Development Bank expects most of Africa to comprise of a solid middle-class by 2030, with consumer
spending power likely to hit $2.2 trillion. Not surprisingly, big businesses are starting to move in - IBM already has
operations in more than 20 African countries, and this August announced plans to open its first tech research hub on
the African continent, in Nairobi. News, research and economic reports all paint the same picture: Africa is on the up;
change, development and opportunity are firmly on the horizon. However, like every positive story there is always a
negative underbelly lurking beneath the surface.
In Africa, like everywhere else in the world, progress is indelibly linked with IT and technology. And like everywhere
else, technology has its downsides: malware, threats and cyber-crime. In the Western world the difficulty lies in
constantly upgrading and securing IT whilst simultaneously retiring legacy systems; many countries in Africa may
provide a virtually blank slate, but do they have the knowledge to maximise this potential? To give some global
context, the US has a 78% internet penetration (World Internet Stats), whilst Nigeria - which has the highest levels
in Africa - stands at only 29%. South Africa - which has the largest economy on the continent - is currently at 14%.
Mobility aside, with the African market so new, as IT levels improve is Africa really equipped to remain secure?
Nigeria Egypt
$235.92 Billion GDP $229.53 Billion GDP
29% Internet Penetration 26% Internet Penetration
Nigeria’s infamous for Egypt has seen a sharp rise
cybercrime and the notorious in malware and cyber-crime
‘Nigerian Prince’ emails still in recent years.
feature prominently.
Kenya
$33.62 Billion GDP
26% Internet Penetration
Kenya’s chronic hacking
problem and general lack
of internet security is
currently being addressed
South Africa by the government.
$408.24 Billion GDP
14% Internet Penetration
South Africa’s relatively
under-developed
infrastructure makes its high
rates of cybercrime all the
more alarming.
3
4. Africa
The Security Conundrum
As the IT sector continues to grow, concerns about security will only rise. Greater accessibility means more opportunities
for criminals to exploit naive users, and inexperience with technology increases the chance of encountering viruses and
malware. Ill-prepared governments and businesses can also suffer at the hands of hackers taking advantage of the
inadequate protection put in place. Each area of Africa is unique, however, there are some notable trends; skills shortages
and lack of education on potential cyber threats seems to be a recurring theme, and levels of viruses and malware are
significantly higher to other regions, such as Europe.
The aim of this report from IDG Connect is to investigate how Africa as a continent is coping with IT security. This is no
simple task; it is a very diverse region, with approximately 30 million square kilometres of land mass, 57 countries and (by
estimates) as many as 3000 languages. So, in order to make this as digestible as possible we decided to focus on four
pivotal countries, which tie together the four corners of Africa: Egypt, South Africa, Kenya and Nigeria. Throughout this
report we attempt to collate the wealth of information available in order to provide a cohesive snapshot of security across
the continent.
Malware and Piracy
Malware infection rates by country
According to Microsoft’s Security Intelligence Report for the (per thousand computers) - 2011
second half of 2011, malware infections in Africa are higher [Source Microsoft Security Intelligence Report]
than the worldwide average. The infection rate in Egypt
which has been on the increase over the past two years, is
now the highest in Africa and among the top five worldwide.
20+
Worms were also a common problem, and phishing sites
were much higher than the worldwide average in Algeria and 15-20
Tunisia in 2011.
10-15
Africa traditionally has a high rate of software piracy. 5-10
According to BSA’s 2011 study, the average in the region
is around 73%, and there has been little change in recent 0-5
years. In fact, parts of Northern Africa have seen a slight
rise between 2010-2011, possibly due to the Arab Spring
Morocco
Nigeria
France
Australia
Canada
Algeria
US
Egypt
Kenya
SA
uprisings. Aside from the financial loss (approx. $1,785M),
this high level of unauthorised software is likely to add to the
region’s virus and malware woes.
4
5. Africa
Regulation
In order to address security, governments are now looking to introduce wider-reaching cyber-security laws. Many African
countries currently have no laws, or have piecemeal legislation in other bills. To remedy this, much of the continent is
looking to pass regional cyber bills that allow countries to work together in preventing crimes.
All 15 countries in the Southern African Development Community (SADC) have, or are in the process of passing, a cyber-
bill. The East African Community (EAC) is on track to have a common cyber-crime bill for the region, while the Economic
Community of West African States (ECOWAS) has yet to adopt such a policy. As well as legislation, nine countries also
have their own Computer Emergency Response Teams (CERT).
SADC countries that have crafted cyber-crime
legislation to curb computer-related crimes
SADC countries that are crafting cyber-crime
legislation to curb computer-related crime
Will be involved with East African
Community (EAC) joint cyber-crime laws
Have a Computer Emergency
Response Team (CERT)
5
6. Africa
Expert Opinion
Contador Harrison,
Software Director,
Somocon Oy,
Finland
African Union must act to reduce cyber-crime
The current situation in Africa cannot be allowed to continue because internet crime, intellectual property,
and identity theft are thriving, and a good number of continent heavyweights have now begun to prepare for
cyber-warfare, yet close to half of their population are living on under a dollar per day. Criminal organizations
are making hundreds of millions of dollars and appear to be re-investing to develop new and more
sophisticated scams in the continent. African governments must act to reduce cyber-crime and to secure the
key systems and infrastructure in the continent.
African governments must not launch their e-government systems until security can be guaranteed. If
necessary, they should only be utilized on a separate network through a secure network for key national
systems and infrastructure. One of the most important services on the Internet today is still one of the most
insecure, and that’s email. The fastest way for a criminal organization to breach security is through the use
of email. It is fundamental that the use of SSL certificates for SMTP server to SMTP server communications
and the use of SSL certificates for SMTP server to client communications be implemented first.
I do also feel that most countries need new legislations that will set out a path towards Africa having two
separate networks. One would remain the public Internet and the other would be a secure network for key
national systems and infrastructure. Also, I feel it is important to make it clear how authorities disconnect
parts of the network and to disconnect countries from the African countries network should be detailed.
Protocols need to be put in place for these actions to occur and it must be decided who will carry out the
actions. Legislation should set out a timeline and framework whereby equipment and systems suppliers will
be required to improve their products with safety and security in mind because this has been a thorn to some
governments in East and Southern Africa.
Certain well-known security flaws in the way computers are made and sold must be identified in the
legislation and made illegal, especially in East and Southern Africa countries where rogue suppliers thrive
by selling substandard and refurbished computers which are sold at the same price as new ones. One of
the many cases I have witnessed in African countries I have visited - Operating Systems are sold without
adequate integrated anti-virus and anti-malware capability. I have always argued in the past that all
computers connected to the Internet should be registered and the computer operating system should report
the computers’ state, including the health of the anti-virus and anti-malware checks.
If you look at the automobile industry in the continent, which is also growing at a very fast rate, registration
is mandatory for any vehicle utilizing public roads in any country within the African Union member states. In
12 African countries I have visited, car roadworthy checks are carried out randomly and whenever a vehicle
is sold, valuers have to value it afresh before a new buyer acquires it. African Union, Africa’s governing body
should take the lead by working with its member states to identify and try to solve some of the issues with
the internet. But the pace of this continental effort is glacial and more needs to be done to reduce cyber-
crime in Africa.
6
7. Africa
EGYPT : SP TLIGHT
It’s hard to talk about IT security in Egypt without going into politics. The uprising and recent elections have had a big
impact on almost every aspect of life in Egypt, and the world of IT is no different. As one of the continent’s biggest
economies, and just coming out the other side of civil unrest, the new government has a lot of work ahead of it. While
cyber-security seems to have improved in recent years, since last year’s uprisings, things appear to have deteriorated.
Unlike many parts of Africa, Egypt has a relatively well-developed IT landscape. It has infrastructure, 3G in the cities, a
competitive and affordable telecomms sector, and a well-trained IT workforce of around 200,000. Mobile penetration
stands at 112% - over 90 million people - while the region's internet boasts 30 million users, of whom around 22%
shop using E-commerce, and many think Egypt is poised to emerge as a major player in the information economy.
112%
mobile penetration
26%
internet penetration
[Sources: World Internet Stats, Egypt Ministry of
Communications and Information Technology]
According to BSA’s most recent global software piracy study, Egypt’s levels of pirated software stands at around 60%,
slightly higher than the average in the region, and totalling a value of $172m. The government has said it has plans
to curb piracy and intellectual property abuses which, according to the IIPA, could “generate US$254 million in GDP,
US$33 million in additional tax revenues and 1,978 new IT jobs” if the piracy rate was reduced by 10% in four years.
Cyber-Crime
While there were relatively few targeted cyber-attacks originating out In 2010 Egypt was named by
of North Africa last year, Egypt isn’t crime free. Despite Damballa Labs Kaspersky Labs as one of
claiming “Egypt isn’t a global player in cyber-crime,” history seems to
disagree. In 2010 Egypt was named by Kaspersky Labs as one of the
the top sources of password-
top sources of password-stealing Trojans, and the year before, Egyptian stealing trojans, and the year
hackers were involved in one of the world’s largest cyber-crime criminal before, Egyptian hackers were
court cases. More recently, Websense named Egypt third for countries involved in one of the world’s
hosting phishing fraud in this year’s Threat Report. While it totalled 6.8% largest cyber-crime criminal
of worldwide phishing, the report noted it had experienced a large rise in
the last year. Whether this is related to the recent political turmoil is hard
court cases.
to tell.
This year’s Microsoft Malware Protection Center figures shows that last year Egypt had one of the highest malware
detection figures on the whole continent, which may be due to a high number of people using older versions of internet
browsers, which are always more vulnerable to attacks than up-to-date software.
7
8. Africa
Politics
Between 28th January and 2nd February 2011, Egypt was one
of, if not the, first users of an internet ‘Killswitch,’ where the Egypt ranking for worldwide phishing:
government essentially shut off the entire internet in the country
with aims to stop protestors communicating. The move wasn’t
3rd
popular, but did lead to other countries contemplating similar
ideas. Interestingly one of the earliest ways this shut-off was
discovered by those outside the country was through malware
monitoring. In retaliation, the hacktivist group Anonymous
launched ‘Operation Egypt’, bringing down four government
Egyptian computers infected by FLAME malware:
sites with DDoS attacks, while spammers used unrest to target
people looking for news on the subject.
5
Now that peace has returned to the country (though the internet
freedoms are said to be strict), the new government can get
on with addressing new cyber-crime bills. Currently there is no
comprehensive cyber-space law, though there are piecemeal
parts across other separate bills. An unregulated internet is
a breeding ground for hackers and criminals, and something Estimated savings from reducing software
concrete needs to be put in place as soon as possible. Despite piracy by 10%:
these problems, the government is moving towards better
cyber security. The Ministry of Communications 2011 round up
explains how the Egyptian Computer Emergency Response
$287million & 1978 jobs
Team (EG-CERT) is working internationally to help combat [Sources: Websense, Kaspersky Labs, IIPA]
cyber-crime, which is a good sign.
Cyber-War
The recent Flame attacks that struck Iran and other MENA countries (including Egypt) have brought state-led cyber-
attacks and the general idea of ‘cyber-war’ to the foreground, and it seems the Egyptian government had similar plans
of their own. Around April last year, it came to light that a UK firm offered custom-made malware to Egyptian Security
Services. Consisting of a “remote intrusion solution,” the total deal was projected to cost the government just over
$350,000. Meanwhile, a new Persian-born trojan was discovered spying on Egypt’s Middle Eastern neighbours only
recently. While these state-sponsored attacks may become a common occurrence in the coming years, Egypt would
do well to rise above the regional political quagmire and avoid trying their own versions of these attacks.
Though out of government hands, Egyptian hackers have been reported as going specifically for Israeli websites. Last
year Israeli Prime Minister Benjamin Netanyahu’s own site was hacked, placing an image of Egyptian soldiers raising
the Egyptian flag in Sinai, while in April, Barack Obama’s Israeli site was hacked by the group known as ‘TeaM HacKer
Egypt’.
Egypt is at a crossroads. The fledgling government needs to be careful in getting the balance right. They need a
new set of laws and policies that help tighten security and reduce problems with hackers and phishing, but without
oppressing the people and suffering the inevitable pushback from hackers and a vocal youth unafraid of showing their
grievances.
8
9. Africa
Expert Opinion
Pierluigi Paganini,
Chief Security Information Officer
Bit4ld Group & Founder of SecurityAffairs.co
The African challenge is one of the most interesting adventures in the cyber security landscape; despite
adverse political and economic events, the continent is demonstrating an impressive increase in
technological demand.
According to statistics, Africa has an internet penetration level of 13% with a relative growth of 2,988.4 %
in the period 2000-2011 - an unparalleled rise. With such numbers and growth, cyber security assumes a
fundamental importance. Egypt, for example, has a mobile penetration of 112%, and more than 20 million
internet users, but it’s clear that the level of exposure to cyber threats is really high, and is likely to increase.
The entire region of North Africa represents a valuable market in cyber security, an opportunity for both
African and also foreign businesses.
Looking deeper into cyber security in North Africa, it is worth noting that despite a low number of state-
sponsored attacks, the countries still suffers from cybercrime. In 2011 was discovered Operation Phish Phry,
which was conducted by Egyptian-based hackers who obtained bank account numbers and related personal
identification information from an unknown number of bank customers with a phishing campaign. Meanwhile,
according to the Websense Threat Report, Egypt is third for countries hosting phishing fraud with a total of
6.8% of worldwide phishing.
The African hacking underground is considered one of the most interesting; according to researchers of
Kaspersky Lab, Egypt is one of the primary users and designers for cyber espionage malware. Where this
is the case, the commitment of governments and mutual collaboration are important factors to successful
introduction of technology on a large scale. Good strategy will involve the creation and the strengthening of
Computer Emergency Response Teams (CERT) for the monitoring of cyberspace and of course, as usual, the
engagement of common people in the new digital experience.
The Middle East and North Africa (MENA) countries are at a delicate historic point where a suitable cyber
strategy could significantly influence their development in the mid- and long-term. Increased investment
in cyber security is an obligation, not a choice, in order to avoid disastrous consequences for everybody,
because cyber space has no borders.
9
10. Africa
SOUTH AFRICA : SP TLIGHT
Despite being the largest economy on the continent, making up 30% of the total income of the continent by some
estimates, South Africa is struggling with a range of issues typically associated with emerging markets. In 2009, a
carrier pigeon proved quicker than broadband at relaying information from one side of the country to the other. And
now, despite the addition of undersea broadband cables, rural areas lack proper communications infrastructure and
connection speeds are still incredibly slow. What is more, despite relatively low numbers of internet users, South Africa
ranks higher than it probably should on cyber-crime statistics.
Computers infected
8.1 with Malware in SA
7.1 World average
14%
internet penetration
Computers infected with malware per 1000
[sources: Microsoft Security Intelligence Report,
Internet World Stats]
Decline in Viruses
While the number of viruses in the country is relatively high, the good news is that the figures are declining, albeit slowly.
The number of worms decreased in the last quarter of 2011 by 0.9%, while trojans were also down. According to
Microsoft's Malicious Software Removal Tool (MSRT) there was malware detected on 8.1 of every 1,000 computers
scanned in SA in the fourth quarter of 2011, compared to the worldwide average of 7.1 for the same period. While still
unacceptably high, it has been declining all year, thanks to improving local security tools, so progress is being made.
A report on SA security by WolfPack provides some really useful insight into how businesses approach security.
This shows 93% of companies have tools to capture and report on risks, and around 60% expected a rise in their
security budget next year. However, some worrying stats show almost a third of companies have no defined cyber-
forensics process, and over half have problems with budgets, enforcing policy and security, data leakage and lack of
commitment from management. The most common incident on the rise is online fraud, with over 20% reporting an
increase in the last 12 months, while second was device theft (also rated as decreasing the most).
67% 46% 41% 84%
of SA companies expect didn’t spend anything won’t spend anything of South Africans have
a rise in their security on security awareness next year been a victim of cyber-
budget next year this year crime (Value $573M)
R150billion Estimated loss to insider
fraud per year
($18.3 billion)
[Sources: Wolfpack, Norton, Supervision]
10
11. Africa
Pirates & Hackers
While software piracy stands at around half the levels of its BRIC counterparts, according to BSA around a third of all
South African software is pirated, well above the likes of the US (21%), but lower than most of Africa. Using pirated
software always runs the risk of introducing viruses, and needs tackling if SA wants to improve its security standards.
Reducing piracy rates can be a difficult task however, and piracy rates have remained unchanged for several years.
Software Piracy [Source: BRICS] 2010 2011
78%
77%
65%
63%
64%
63%
54%
59%
58%
53%
35%
35%
Country: Brazil Russia India China SA BRICS Average
Value in 2011: $2,848M $2,659M $2,930M $8,902M $564M $3,581M
Despite the hacking of the ANC Youth League’s website last year, hacking in general hasn’t quite reached the same
levels as other countries (there’s no ‘Anonymous SA’ for example), with an average of one or two major stories hitting
the news each year. So far, this year’s big hacking story was a cyber-bank robbery on New Year’s Day, where the
thieves managed to steal $6.7m over 72 hours. Norton’s cyber-crime figures for SA are estimated to total $573M, with
84% of people having been a victim at some point. And although the number of phishing attacks on the country are
down by 11% year on year, they still run into the millions.
Overview
Although a decrease in attacks does sound like a good thing, it may be a result of South Africa’s low number of internet
users, who make up around 14% of the population (though growing quickly). To add to this, there is a skills shortage
in the IT sector, which could be slowing down the development of the country. The World Economic Forum’s Global IT
Report said of SA: “Important shortcomings in terms of basic skills availability in large segments of the population and
the high costs of accessing the insufficiently developed ICT infrastructure result in poor rates of ICT usage,” despite
efforts from businesses to integrate IT into the workplace.
According to iC3 figures,
Rural areas of the country are especially at risk, after one study from
SA ranks 7th in the
ResearchSpace.csir found “a large portion of the South African population that
has not had regular and sustained exposure to technology and broadband world for cyber-crime,
internet access [could] expose local communities to cyber threats.” According surprisingly high for a
to iC3 figures, SA ranks 7th in the world for cyber-crime, and has hovered country with relatively few
around the same position on the list for a good few years. These numbers are internet users.
surprisingly high for a country with relatively few internet users.
Despite some of the problems, back in Pretoria the government is taking steps to improve security. Its new cyber-
security policy aims to create a more secure digital environment through awareness programs aimed at both the public
and businesses, better research and skills, and establishing a National Cyber-Security Centre.
Overall South Africa has less trouble with hackers and both businesses and governments are taking steps to improve
education and protection. However problems with viruses and fraud do still remain.
11
12. Africa
KENYA : SP TLIGHT
Kenya is fast becoming a major player in the IT sector. East Africa's biggest economy has undergone something of
an IT revolution in recent years, with the sector outperforming other more traditional ventures such as agriculture and
manufacturing for a few years now. But lack of skills and protection is leaving computers extremely susceptible to
viruses and hacking.
KENYA SA
$71.4b $555.1b
$36m $573m
Crime cost as a % of economy = 0.05% Crime cost as a % of economy = 0.01%
US
$15.1tr
Size of economy
Estimated cost of cyber-crime each year
$32b
[Sources: Daily Nation, IMF, Norton]
Crime cost as a % of economy = 0.02%
According to World Bank data, mobile subscriptions actually outnumber adults in the country, and as with many
markets, the rise of Kenya’s Generation Y, combined with affordable smartphones, internet and social media have
all been a key influence on this rise. Of the 17 million people on the Internet, 6 million are mobile internet users,
and that number is rising steeply. Kenya seems to be going towards a wholly mobile internet set up. But perhaps
because so few people are hooked up at home (around 2% have home computers), this could be the reason Kenya
is vulnerable and open to attacks.
Open Season for Hackers
Recently, workers from the Kaspersky Lab said 20% of computers being used in Kenya are vulnerable to viruses,
and the number is rising. They attributed 17% of that to the use of free software downloaded from the internet,
saying ignoring updates left them vulnerable, and pointed to the government
to create proper regulations on cyber-crime. Less than half of SMBs
think staff are properly
Meanwhile a research paper from the Jomo Kenyatta University of Agriculture
and Technology on Kenyan SMBs found some very worrying statistics. Less
trained to secure their
than half felt they had documented information security policy, roughly the computers properly at
same amount thought staff were properly trained to secure their computers all times.
properly at all times, fewer than half had a business continuity plan in the
event of a disaster, while almost half weren’t aware of international information security standards available for
organisations to adopt. This level of negligence and ignorance is dangerous, especially when novice hackers are
targeting the country for fun and succeeding every time. Proper training and business strategies are key.
12
13. Africa
But it’s not just ignorance and possibility; Kenya’s security problems are very real. Forensic experts are claiming
cyber-crime poses the biggest challenge to organisations and the police, and already costs Kenya almost Sh3 billion
($36 million) every year. Organisations are being urged to employ Forensic Certified Public Accountants (FCPAs) to
try and counter the problem.
Aside from cyber-crime, your average ‘hacktivists’ are targeting Kenya
for fun and practice. Last year, an Indonesian student-hacker known 42.8%
as ‘direxer’, took down 103 government of Kenya web sites overnight. 20%
Part of an online Indonesian security forum known as Forum Code
Security, the hacker said he took down
Average ‘hacktivists’ the web sites following tutorials from
are targeting Kenya for the forum. That followed a year after Kenya
fun and practice. One another hacker attacked and disabled
hacker took down 103 the official police site, and two university
hacks, one to change exam results
government of Kenya and another to clear student fees.
web sites overnight by Clearly this should cause concern. If
following tutorials from government and academic institutional % of SMBs in Kenya who have
an online forum. sites are being hacked so easily, there’s not security trained their staff
nothing to say local businesses are in
any more of a secure position. Various blogs online offer some advice for % of computers in Kenya
basic security but there are some serious questions that need answering, vunerable to viruses
not by blogs, but by the government and the private sector to really
address what is a lack of adequate protection. [Source: Kaspersky, cscjournals]
Fighting Back
The business level responses so far have seen Techno Brain, an IT solutions company, starting to offer hacking
forensic courses to banks, government agencies and other corporates, while Kenya Methodist University (KeMU)
launched a string of professional courses in IT security, in an attempt to plug some of the holes these attacks have
highlighted. The government is moving in the right direction too. Last year they set up their own Computer Incident
Response Team (CIRT) to combat the problem, which aims to deal with incidents, promote security, issue warnings,
and generally try to address the issues the country has with security and bring it up to scratch with the rest of the
world.
However, the government is also making some not so great decisions. Its new Information Protection bill has been
labelled ‘flawed’ by the Kenyan chapter of the International Body for Professionals in Audit and Information Security
(ISACA), who said it was a step in the right direction but left holes open for misuse. New monitoring devices installed
by the Communication Commission of Kenya (CCK) are worryingly Big Brother, though they promise they are for
assisting in early detection and prevention of cyber-crime incidents, and have said, “It is a passive system and not
a tool for spying on users. The system cannot be used to block access to the internet at all.” This monitoring of the
public web traffic is very worrying for people.
Clearly Kenya has some serious security issues that need addressing. This isn’t to say they are the only victims, as
seen by the recent attacks on the likes of Sony and LinkedIn, but a major government site being brought down by a
lone student makes it clear security isn’t good enough by any stretch of the imagination. The lack of knowledge and
skilled workers also need to be tackled, otherwise East Africa’s biggest economy may become a hacker’s paradise.
13
14. Africa
Expert Opinion
Kostya Reim,
Managing Director of Security
Risk Solutions Ltd
In a country pained by poverty, famine, refugees, war on Somalia and terrorist attacks; one would not
believe that Information Security was an everyday topic.
Indeed, priorities are a little different and have been, understandably, for the last decade as the country
progresses on its Vision 2030 implementation. Kenya as the business and financial hub of Eastern Africa
is slowly gaining back its powerhouse reputation once gained in the 70s, and is a vastly growing center
in the region. Even though the cost of living keeps at par with the ever-increasing global trends, the
spending power of Kenyans is manifested by the mushrooming shopping malls and office buildings in the
cities and suburbs. Convenience is a regular requirement during the busy and traffic-affected days and
therefore the uptake of Internet (on Mobile), Mobile Banking (M-PESA), Internet Banking, Credit Cards
and eCommerce has been massive and overwhelming.
Information Security’s biggest driver is compliance and so it has been in Kenya. The regulators have
defined very clear guidelines and issued directives that are clear and implementable. This includes
PCI DSS controls, regular penetration testing, and guidelines for security in Internet Banking, as with
the recent changes of the Prudential Guidelines issued by the Central Bank of Kenya. Many banks,
merchants and payment processors are undertaking PCI remedial projects and placing controls where
previously have been none. Investigations into computer abuse and fraud have resulted in many more
convictions as the changes in telecoms and evidence acts have now reached the courts of law. The
media has become infosec aware and report on issues of breaches and developments regularly and with
depth. The government has recognized the risk and made information security a key requirement in their
e-government strategic plan.
So clearly, Kenya is on its way, development and infosec wise, thanks to a great number of technology
professionals making the lives of Kenyans more convenient and technology-enabled every day,
sometimes with mishaps that put them at risk...
14
15. Africa
NIGERIA : SP TLIGHT
Nigeria boasts a 29% internet penetration rate, the highest in Africa, yet has suffered for years with 419 scammers.
Though not as bad as it was once, the infamous Nigerian prince scams have certainly had an impact on the country’s
reputation.
2015 70m
2012 45m $200m
annual cost of cyber-crimes to
the Nigerian economy
0m 50m 100m
[source: IT News Africa]
Nigerian Internet Users,
[source: The Guardian Nigeria, Internetworldstats]
Like many African countries, Nigeria suffers from an underdeveloped and unreliable fixed-line infrastructure. However,
that hasn’t stopped it topping 45 million internet users, the highest number on the continent. But with such large
numbers come many dangers. Emerging markets across the world are suffering
at the hands of targeted hackers and malware due to insecure websites and “Nigeria, being a fast
poorly-trained staff. And on the whole Nigeria is no different. emerging market... risks
Though the country may be aiming to have 70 million internet users by 2015, higher foreign invasion of
Symantec has warned that the rise of internet users in Nigeria puts the country cyber-attacks because
at a greater risk from cyber-crime. Kelvin Isaac, Symantec’s Vice President of the glut in capacity
of Emerging Markets said, “Nigeria, being a fast emerging market, with huge utilisation.”
bandwidth deposits from the various submarine cables, risk higher foreign
invasion of cyber-attacks because of the glut in capacity utilization. [That is the] Reason why government, regulators
and operators must work in collaboration to ensure that every avenue to encourage is blocked completely in the
country and the risk mitigated.” Like many places around the world, SMBs are particularly at risk as they lack proper
security plans and trained in-house staff to counter or quickly recover from any attacks.
People Power
There are plenty of web 2.0-literate people in the country, but not necessarily using their skillset for legal purposes. Last
year a group of Nigerian hackers known as NaijaCyberHacktivists attacked government sites, including the National
Poverty Eradication Programme website and the Niger Delta Development Commission, posting a letter protesting
against the N1b ($6.6 million) cost for inauguration for President Goodluck Jonathan and the country’s Freedom
of Information Act. The author of the report pointed to the county’s rabid unemployment figures (currently hovering
around the 23% mark) and a country that is ‘rich in raw technology talent’. In a similar attack in January the Economic
and Financial Crime Commission (EFCC) was attacked in response to reports of corruption.
15
16. Africa
This pool of unemployed and angry talent has only recently started targeting its government. For years Nigeria has
been king of spam, with promises of Nigerian Princes offering millions for only a small advance fee. These 419 Scams
(in reference to the article it’s a crime under in the Nigerian Criminal Code) are so synonymous with the country they are
often called Nigerian scams. Back in 2005 Lagos was widely considered the world’s leading place for scam crimes.
Although they are still common, they have been on the decline of late (spam is at its lowest levels for years) and
Nigerian police have been more active in recent years in shutting down these kinds of operations.
Positive Action
Given that Nigeria’s IT sector is booming, programmes to equip more people for careers in the sector are coming
through, including World Bank’s ACCESS (Assessment of Core Competence for Employability in the Services Sector)
programme, which trains young people on a variety of aspects, from written English and basic numerical skills to
internet browsing, use of office software, and attention to detail. It’s not quite on the same level as Kenya’s various
forensic hacking courses, but it’s a start.
The government is trying to gain traction on developing a world class IT sector, with various ideas and policies to
improve accessibility. But a possible cyber-crime spree waiting to happen lies within the country’s move towards a
‘cashless society.’ This move to reduce the amount of cash used and increase electronic payments is a perfectly valid
one, but where money is involved there will always be criminals trying to abuse the system. And without adequate
protection, hackers could rob organisations of several millions, if not billions, of Naira.
A big stumbling block is the country’s lack of cyber security law. It is making it difficult to actually criminalise the
hacking of any websites in the country, governmental or otherwise. Dr. Emmanuel Ekuwem, chief executive of Teledom
International Group, lamented this lack of law, saying, “Do we have a cybercrime and cyber security law in place?
No! Have we designated our Critical National Information Infrastructure? No! There is no law yet that criminalises the
hacking any websites. Pity!” A bill is in the works, and has been promised sooner rather than later, but when that
actually will be is anyone’s guess.
Nigeria is a country with a tradition in cyber-fraud with 419, but as that slowly gets put to bed it will want to avoid the
rise of hackers, especially around its E-commerce ambitions. As with many emerging markets, proper training and
security measures will help immensely. But critically, getting a proper cyber-security bill in place is needed as a tangible
deterrent to would-be criminals. Without that, Nigerian Princes needing bank account details might be the least of
people’s worries.
16
17. Africa
Conclusion
The African landscape is changing rapidly. This can be seen across expanding economies, rising populations and
major technological developments. Over the last few years this has resulted in many improvements. However, due to
the pivotal nature of technology, one serious stumbling block to true progress could well be IT security.
There are so many granular differences across 57 diverse African countries that it is hard to assess the pan-African
situation in any meaningful way. To tackle this we split the continent into four and looked at one country across each
of the corners. Through this approach some core trends did surface. These are namely, a massive IT skills shortage,
a severe lack of education on potential cyber-threats, along with significantly higher levels of viruses and malware than
other regions, such as Europe.
These concerns do seem to be gradually reaching governments, and necessary legislation is slowly being put in place,
but security overall is clearly a big problem across the continent. This report has shown that malware and cyber-crime
have taken a sharp rise in Egypt in recent years; South Africa suffers from a profound lack of security awareness;
Kenya is subject to chronic hacking and Nigeria is still world famous for its ‘Nigerian Prince’ emails. With business
booming; numerous foreign companies moving in, and IT looking set to play an ever more crucial role in the continent’s
development, it is becoming more and more vital that IT security sits firmly on the African agenda.
About IDG Connect
IDG Connect is the demand generation division of International Data Group (IDG), the world’s largest technology media
company. Established in 2005, it utilises access to 35 million business decision makers’ details to unite technology
marketers with relevant targets from any country in the world. Committed to engaging a disparate global IT audience
with truly localised messaging, IDG Connect also publishes market specific thought leadership papers on behalf of its
clients, and produces research for B2B marketers worldwide.
For more information visit: http://www.idgconnect.com/
17