SlideShare a Scribd company logo
1 of 9
Table of Contents
3. Need of security in cyberspace...........................................................................................2
3.1. Link of cyber security with information security ........................................................2
3.2. Cyber security approach of Nigeria ............................................................................3
3.3. Cybersecurity framework of Nigeria ...........................................................................3
3.3.1. Accountability of top security positions ...................................................................4
3.3.2. Coordination of national cyber security ..................................................................4
3.3.3. A cybersecurity excellence center...........................................................................4
3.3.4. Legal measures of cyber security............................................................................5
3.3.5. Education and awareness ........................................................................................5
3.3.6. Cybersecurity collaboration between the public and business sectors .............5
3.3.7. Cyber security training and education. ...................................................................5
3.4. Culture of cyber security...............................................................................................6
3.5. Conclusion......................................................................................................................8
Chapter 3
3. Need of security in cyberspace
The data person posts on the internet may tell a lot about their online presence. That is
because a lot of the work done by internet services involves exchanging, transmitting,
and analyzing sensitive data. As a result, this data is subject to the online dangers that
are all too common as discussed in chapter two. Individuals, as well as organizations and
countries, are unlikely to be safe online in the absence of effective data security
measures. It follows that efforts to secure cyberspace are intimately linked to those aimed
at protecting personal information (Osho et al., 2015). In order to better understand the
connection between information security and cyber security, this section will provide
definitions for each term. In addition, the International Telecommunications Union's cyber
security guidance will be discussed in detail (ITU).
3.1. Link of cyber security with information security
Information security is described as the security of data from numerous dangers that
might undermine its privacy, integrity, and accessibility. CIA triad which is known as
confidentiality, integrity, and availability of information is essential which means the
information must only be available to the authorized people.
There are a number of reasons why information security is implemented, including
business continuity and risk reduction for the organization. It requires the use of proper
controls, rules, procedures, and processes to guarantee that the CIA of information is
maintained in an organization. To put it another way, information security is all about
securing data in the workplace. However, protecting data is a requirement that extends
well beyond the walls of a company. If you have ever used a web service, you will know
that sharing and releasing information is commonplace. Although information security and
cyberspace security are closely linked, there are aspects of cyberspace security that do
not fall under the purview of information security. As a result, a new field of security has
emerged that is known as cyber security.
To put it another way, ISO/IEC 27032 defines cyber security as ensuring that information
in cyberspace is safe (Lebogang et al., 2022). This definition is based on the information
security definition from the standards of the international standard organization. Following
ISO/IEC 27032, users and network operators are expected to take steps to ensure the
safety of their online activities. When it comes to cyber security, the ITU recommends a
few different approaches. Adoption of cyber security measures such as best practices
and standards are among the recommendations. The International Telecommunication
Union (ITU) provides an outline of cyber security in the following section.
3.2. Cyber security approach of Nigeria
Protecting Nigeria's cyberspace and online activities are still in their immaturity. The policy
cybersecurity framework, on the other hand, has been authorized, although there is just
a draught version accessible right now. In this country's cyber security strategy
framework, the government has laid forth its goal. To summarize, this vision envisions a
society where cyber security is ingrained in the psyche of the people.
The International Telecommunication Union (ITU) has issued a set of recommendations
for implementing cyber security. Among the ITU's 10 critical components of an integrated,
multi-stakeholder, and strategy-driven approach to cyber security are given below. The
ITU has proposed a methodology for creating a national cyber plan based on these
aspects. Nigeria's draught National Cyber Security Policy Approach is founded on these
aspects, and this section will compare it to ITU's definition of a strategic objective
cybersecurity program.
3.3. Cybersecurity framework of Nigeria
Nigeria is taking a positive step forward by drafting a Cybersecurity Policy Framework.
However, it is only a good start to a policy framework that has to be followed up by
execution. It is unfortunate that Nigeria's proposed policy framework has not yet been
implemented, given that it has been authorized but not yet announced. Some of the key
points of the framework are given below:
 An integrated strategy to cyber security that is guided by the government is being
developed.
 Encouraging employees to take the bare minimum of security precautions.
 Cybercrime, cyber warfare, and cyberterrorism may be prevented and dealt with
through strengthening legal systems.
 Critical information infrastructure security is a top priority.
 Establishing cooperation with public and private organizations to organize action
plans that are consistent with the policy's intentions.
 Creating a formal framework for online governance.
Some of the ITU's national cyber security program's components have already been
incorporated into the policy framework's proposed solutions. Each of these subsections
provides a clear mapping of the various ITU national cyber security program aspects into
Nigeria’s draught policy framework and supporting literature.
3.3.1. Accountability of top security positions
It is Nigeria's obligation to protect its citizens against cyberattacks. Since then, they have
drafted a cyber security legislative framework. Some of the ITU's recommendations for a
national cyber security program are discussed in detail in this draught policy document.
3.3.2. Coordination of national cyber security
The policy framework acknowledges the need for having a specialized coordinator for
cyber security initiatives. Cyber Security Response Committees are outlined in the policy,
which states that they will be formed to handle the coordination of cybersecurity efforts.
3.3.3. A cybersecurity excellence center
A center of cyber security is going to be built that will work on all the standards of cyber
security in the country. According to the policy framework already in place, the focus of
the center is to keep check and balance of the national cyber events.
3.3.4. Legal measures of cyber security
Some cybercrimes and malicious activities are already covered by legislation in force in
Nigeria. Some of the used laws in Nigeria include the electronic transactions act of 2002
and the interception of the regulation act. The lack of a functioning incident response team
in Nigeria has been cited as an issue. As a result of this, the strategy seeks to create
national and government-level computer incident response committees. In Nigeria, one
of the incident response teams has already been set up that is working jointly with the
communication department and this effort is being led by a number of other parties
(Okorodudu et al., 2017).
3.3.5. Education and awareness
The proposed policy framework does not adequately address the need for cyber security
education and awareness program. An educational and awareness campaign should be
undertaken across the country. However, this cyber security program's execution and
promotion are impossible without its creation.
3.3.6. Cybersecurity collaboration between the public and business sectors
In addition, the proposed policy framework highlights the need of fostering local
collaborations. Researchers found that the National CSIRT encourages collaboration and
cooperation between the public, private, and civil sectors. This is why it is included in the
draught policy.
3.3.7. Cyber security training and education.
Nigeria lacks the necessary professional expertise. Computer forensics, incident
response, and secure software coding are among them. As a result, Nigeria stands to
gain from the creation of a training and education program. As a result of the draught
policy framework's framework standard, the essential skills program may be more
effectively developed.
There are several similarities between the ITU's approach to cyber security and the
draught policy framework proposed by South Africa. There is still a lot of space for
improvement, particularly with regard to executing the policy framework's proposed
changes. The goal of this policy framework is to instill a sense of cyber security in the
inhabitants of South Africa. It's not clear how this "culture of security" would be fostered,
though, under the policy. As a result, the next section will focus on the characteristics of
such a cyber security culture.
3.4. Culture of cyber security
Developing a cyberculture and appropriate user conduct in the new normal of cyberspace
is essential, but so is the ability to pursue wrongdoers and prosecute, even in the internet
world. New security concerns have arisen as a result of increasing dependence on
cyberspace and other internet materials. As a result of this reliance, cyber security has
now been added to the list of national security issues.
Creating a culture of cyber security is the greatest way to ensure cyber security, according
to ITU. A culture based on awareness and education, according to the study, is one of its
foundations. It is possible to see this pillar in the general assembly's rules on the
development of cyber security culture and in the recommendations for the protection of
computer networks (Rufai et al., 2021). Cyber security culture must be depicted by these
standards, which include a variety of objectives. The following are the goals of the
cybersecurity culture in Nigeria:
 cyberspace users in order to provide a safe and secure environment for everyone
 educating the public about the dangers that lurk in plain sight on the internet and
providing solutions to these dangers
 enhancing the trust that all users have in the systems and networks that supply
and use information
 helping to create and execute cyber security measures by providing a general
framework of reference
 All parties in the development and execution of security measures should be
encouraged to cooperate and share information with each other.
 stressing the importance of security to all parties engaged in the creation or
implementation of the policies
In order to cultivate a culture of cyber security, the following objectives might be utilized
as a starting point. One must first recognize the need for security and then be educated
on how to implement it in order to create an effective cyber security culture, according to
the aforementioned recommendations. Promoting a cyber security culture in Nigeria
begins with educating the general public about the importance of cyber security. There
are further eight measures the ITU recommends be followed to develop a cyber security
culture in addition to these principles. Below is a step-by-step guide defined by the ITU:
1 Plan for administration systems to be safe against cyberattacks.
2 Educate system and network users on the need for security awareness.
3 Develop a security-conscious corporate culture.
4 Encourage outreach to the general public.
5 An extensive national awareness campaign should be developed and
implemented.
6 Intensify efforts in the fields of science and technology, as well as in research and
development.
7 Re-evaluate and modernize the current internet privacy regime.
8 Make sure you're aware of cyber risks and the remedies that are out there.
In light of the principles and the measures outlined above, it's evident that promoting cyber
security literacy is a critical component of the field's overall health. In step 5, it is stated
that a nationwide awareness campaign should be launched. As a result, boosting public
awareness and making resources readily available are interrelated challenges that must
be addressed independently. This necessitates a concentrated effort to raise awareness
and educate the public.
Both education and support play a critical part in cyber security, as demonstrated by the
ITU's standards and actions above. As a result, they are even more crucial to the
development of a cyber security mindset. Because of this, the state of South Africa needs
a consistent and well-defined strategy for cyber security awareness and education in
order to achieve its goals. However, it is critical that the government take the reins and
set the example. Every online user also has a responsibility in this respect, but this
obligation can only be acknowledged if the users are well-informed through successful
campaigns of awareness and education.
3.5. Conclusion
Many people have become acclimated to the benefits of cyberspace, but it also has a
sinister side. This means that everyone should be aware of both the advantages and
dangers of using the internet. Individuals, organizations, and countries alike are affected
by online threats. It is necessary to take sufficient precautions against the evil side of
cyberspace.
Cyber security is a shared responsibility for everyone who uses the internet. According to
the ITU, the government should be in charge of cyber security. In addition, it is the
government's duty to promote a cyberspace security culture. One of the many foundations
that support this culture is public awareness and education. As far as cyber security is
concerned, education and awareness are essential. Consequently, if Nigeria is to achieve
its goal of cyber security culture, it will have to concentrate on national cyber education
and awareness efforts. As a result, in the next chapter, we'll look at the efforts of
industrialized countries to raise cyber security designed to educate their citizens.
References
Osho, O. and Onoja, A.D., 2015. National Cyber Security Policy and Strategy of Nigeria:
A Qualitative Analysis. International Journal of Cyber Criminology, 9(1).
Lebogang, V., Tabona, O. and Maupong, T., 2022. Evaluating Cybersecurity Strategies
in Africa. In Cybersecurity Capabilities in Developing Nations and Its Impact on Global
Security (pp. 1-19). IGI Global.
Okorodudu, F.O. and Okorodudu, P.O., 2017. Cyber security and digital privacy: an
imperative for information and communication technology and sustainable development
in Nigeria. International Journal of Research, 4(03), pp.412-421.
Rufai, A., Modi, S. and Wadata, B., 2021. A survey of cyber-security practices in
Nigeria. International Research Journal of Advanced Engineering and Science, pp.222-
226.

More Related Content

What's hot

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsIRJET Journal
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 

What's hot (20)

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
76 s201918
76 s20191876 s201918
76 s201918
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
IOT connected with e-learning
IOT connected with e-learningIOT connected with e-learning
IOT connected with e-learning
 

Similar to Chapter 3.docx

Computer Emergency Response Team for Health Care Sector (CERT-H)
Computer Emergency Response Team for Health Care Sector (CERT-H)Computer Emergency Response Team for Health Care Sector (CERT-H)
Computer Emergency Response Team for Health Care Sector (CERT-H)Manpreet Singh Sidhu
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesICT Watch
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXIJNSA Journal
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfNiloufer Tamboly
 
CSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdfCSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdfSnahvaFray
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHA COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHijcisjournal
 
INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...
INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...
INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...ijeljournal
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 

Similar to Chapter 3.docx (20)

Computer Emergency Response Team for Health Care Sector (CERT-H)
Computer Emergency Response Team for Health Care Sector (CERT-H)Computer Emergency Response Team for Health Care Sector (CERT-H)
Computer Emergency Response Team for Health Care Sector (CERT-H)
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
Assingment 2 - Law
Assingment 2 - LawAssingment 2 - Law
Assingment 2 - Law
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Global CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness ProfilesGlobal CyberSecurity Index and Cyberwellness Profiles
Global CyberSecurity Index and Cyberwellness Profiles
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
 
CSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdfCSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdf
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHA COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
 
INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...
INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...
INVESTIGATION OF OPTIMIZED PROCESS PARAMETERS ON DENSIFICATION OF SAMARIUM CO...
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 

Chapter 3.docx

  • 1. Table of Contents 3. Need of security in cyberspace...........................................................................................2 3.1. Link of cyber security with information security ........................................................2 3.2. Cyber security approach of Nigeria ............................................................................3 3.3. Cybersecurity framework of Nigeria ...........................................................................3 3.3.1. Accountability of top security positions ...................................................................4 3.3.2. Coordination of national cyber security ..................................................................4 3.3.3. A cybersecurity excellence center...........................................................................4 3.3.4. Legal measures of cyber security............................................................................5 3.3.5. Education and awareness ........................................................................................5 3.3.6. Cybersecurity collaboration between the public and business sectors .............5 3.3.7. Cyber security training and education. ...................................................................5 3.4. Culture of cyber security...............................................................................................6 3.5. Conclusion......................................................................................................................8
  • 2. Chapter 3 3. Need of security in cyberspace The data person posts on the internet may tell a lot about their online presence. That is because a lot of the work done by internet services involves exchanging, transmitting, and analyzing sensitive data. As a result, this data is subject to the online dangers that are all too common as discussed in chapter two. Individuals, as well as organizations and countries, are unlikely to be safe online in the absence of effective data security measures. It follows that efforts to secure cyberspace are intimately linked to those aimed at protecting personal information (Osho et al., 2015). In order to better understand the connection between information security and cyber security, this section will provide definitions for each term. In addition, the International Telecommunications Union's cyber security guidance will be discussed in detail (ITU). 3.1. Link of cyber security with information security Information security is described as the security of data from numerous dangers that might undermine its privacy, integrity, and accessibility. CIA triad which is known as confidentiality, integrity, and availability of information is essential which means the information must only be available to the authorized people. There are a number of reasons why information security is implemented, including business continuity and risk reduction for the organization. It requires the use of proper controls, rules, procedures, and processes to guarantee that the CIA of information is maintained in an organization. To put it another way, information security is all about securing data in the workplace. However, protecting data is a requirement that extends well beyond the walls of a company. If you have ever used a web service, you will know that sharing and releasing information is commonplace. Although information security and cyberspace security are closely linked, there are aspects of cyberspace security that do not fall under the purview of information security. As a result, a new field of security has emerged that is known as cyber security.
  • 3. To put it another way, ISO/IEC 27032 defines cyber security as ensuring that information in cyberspace is safe (Lebogang et al., 2022). This definition is based on the information security definition from the standards of the international standard organization. Following ISO/IEC 27032, users and network operators are expected to take steps to ensure the safety of their online activities. When it comes to cyber security, the ITU recommends a few different approaches. Adoption of cyber security measures such as best practices and standards are among the recommendations. The International Telecommunication Union (ITU) provides an outline of cyber security in the following section. 3.2. Cyber security approach of Nigeria Protecting Nigeria's cyberspace and online activities are still in their immaturity. The policy cybersecurity framework, on the other hand, has been authorized, although there is just a draught version accessible right now. In this country's cyber security strategy framework, the government has laid forth its goal. To summarize, this vision envisions a society where cyber security is ingrained in the psyche of the people. The International Telecommunication Union (ITU) has issued a set of recommendations for implementing cyber security. Among the ITU's 10 critical components of an integrated, multi-stakeholder, and strategy-driven approach to cyber security are given below. The ITU has proposed a methodology for creating a national cyber plan based on these aspects. Nigeria's draught National Cyber Security Policy Approach is founded on these aspects, and this section will compare it to ITU's definition of a strategic objective cybersecurity program. 3.3. Cybersecurity framework of Nigeria Nigeria is taking a positive step forward by drafting a Cybersecurity Policy Framework. However, it is only a good start to a policy framework that has to be followed up by execution. It is unfortunate that Nigeria's proposed policy framework has not yet been implemented, given that it has been authorized but not yet announced. Some of the key points of the framework are given below:
  • 4.  An integrated strategy to cyber security that is guided by the government is being developed.  Encouraging employees to take the bare minimum of security precautions.  Cybercrime, cyber warfare, and cyberterrorism may be prevented and dealt with through strengthening legal systems.  Critical information infrastructure security is a top priority.  Establishing cooperation with public and private organizations to organize action plans that are consistent with the policy's intentions.  Creating a formal framework for online governance. Some of the ITU's national cyber security program's components have already been incorporated into the policy framework's proposed solutions. Each of these subsections provides a clear mapping of the various ITU national cyber security program aspects into Nigeria’s draught policy framework and supporting literature. 3.3.1. Accountability of top security positions It is Nigeria's obligation to protect its citizens against cyberattacks. Since then, they have drafted a cyber security legislative framework. Some of the ITU's recommendations for a national cyber security program are discussed in detail in this draught policy document. 3.3.2. Coordination of national cyber security The policy framework acknowledges the need for having a specialized coordinator for cyber security initiatives. Cyber Security Response Committees are outlined in the policy, which states that they will be formed to handle the coordination of cybersecurity efforts. 3.3.3. A cybersecurity excellence center A center of cyber security is going to be built that will work on all the standards of cyber security in the country. According to the policy framework already in place, the focus of the center is to keep check and balance of the national cyber events.
  • 5. 3.3.4. Legal measures of cyber security Some cybercrimes and malicious activities are already covered by legislation in force in Nigeria. Some of the used laws in Nigeria include the electronic transactions act of 2002 and the interception of the regulation act. The lack of a functioning incident response team in Nigeria has been cited as an issue. As a result of this, the strategy seeks to create national and government-level computer incident response committees. In Nigeria, one of the incident response teams has already been set up that is working jointly with the communication department and this effort is being led by a number of other parties (Okorodudu et al., 2017). 3.3.5. Education and awareness The proposed policy framework does not adequately address the need for cyber security education and awareness program. An educational and awareness campaign should be undertaken across the country. However, this cyber security program's execution and promotion are impossible without its creation. 3.3.6. Cybersecurity collaboration between the public and business sectors In addition, the proposed policy framework highlights the need of fostering local collaborations. Researchers found that the National CSIRT encourages collaboration and cooperation between the public, private, and civil sectors. This is why it is included in the draught policy. 3.3.7. Cyber security training and education. Nigeria lacks the necessary professional expertise. Computer forensics, incident response, and secure software coding are among them. As a result, Nigeria stands to gain from the creation of a training and education program. As a result of the draught policy framework's framework standard, the essential skills program may be more effectively developed. There are several similarities between the ITU's approach to cyber security and the draught policy framework proposed by South Africa. There is still a lot of space for
  • 6. improvement, particularly with regard to executing the policy framework's proposed changes. The goal of this policy framework is to instill a sense of cyber security in the inhabitants of South Africa. It's not clear how this "culture of security" would be fostered, though, under the policy. As a result, the next section will focus on the characteristics of such a cyber security culture. 3.4. Culture of cyber security Developing a cyberculture and appropriate user conduct in the new normal of cyberspace is essential, but so is the ability to pursue wrongdoers and prosecute, even in the internet world. New security concerns have arisen as a result of increasing dependence on cyberspace and other internet materials. As a result of this reliance, cyber security has now been added to the list of national security issues. Creating a culture of cyber security is the greatest way to ensure cyber security, according to ITU. A culture based on awareness and education, according to the study, is one of its foundations. It is possible to see this pillar in the general assembly's rules on the development of cyber security culture and in the recommendations for the protection of computer networks (Rufai et al., 2021). Cyber security culture must be depicted by these standards, which include a variety of objectives. The following are the goals of the cybersecurity culture in Nigeria:  cyberspace users in order to provide a safe and secure environment for everyone  educating the public about the dangers that lurk in plain sight on the internet and providing solutions to these dangers  enhancing the trust that all users have in the systems and networks that supply and use information  helping to create and execute cyber security measures by providing a general framework of reference  All parties in the development and execution of security measures should be encouraged to cooperate and share information with each other.  stressing the importance of security to all parties engaged in the creation or implementation of the policies
  • 7. In order to cultivate a culture of cyber security, the following objectives might be utilized as a starting point. One must first recognize the need for security and then be educated on how to implement it in order to create an effective cyber security culture, according to the aforementioned recommendations. Promoting a cyber security culture in Nigeria begins with educating the general public about the importance of cyber security. There are further eight measures the ITU recommends be followed to develop a cyber security culture in addition to these principles. Below is a step-by-step guide defined by the ITU: 1 Plan for administration systems to be safe against cyberattacks. 2 Educate system and network users on the need for security awareness. 3 Develop a security-conscious corporate culture. 4 Encourage outreach to the general public. 5 An extensive national awareness campaign should be developed and implemented. 6 Intensify efforts in the fields of science and technology, as well as in research and development. 7 Re-evaluate and modernize the current internet privacy regime. 8 Make sure you're aware of cyber risks and the remedies that are out there. In light of the principles and the measures outlined above, it's evident that promoting cyber security literacy is a critical component of the field's overall health. In step 5, it is stated that a nationwide awareness campaign should be launched. As a result, boosting public awareness and making resources readily available are interrelated challenges that must be addressed independently. This necessitates a concentrated effort to raise awareness and educate the public. Both education and support play a critical part in cyber security, as demonstrated by the ITU's standards and actions above. As a result, they are even more crucial to the development of a cyber security mindset. Because of this, the state of South Africa needs a consistent and well-defined strategy for cyber security awareness and education in order to achieve its goals. However, it is critical that the government take the reins and set the example. Every online user also has a responsibility in this respect, but this
  • 8. obligation can only be acknowledged if the users are well-informed through successful campaigns of awareness and education. 3.5. Conclusion Many people have become acclimated to the benefits of cyberspace, but it also has a sinister side. This means that everyone should be aware of both the advantages and dangers of using the internet. Individuals, organizations, and countries alike are affected by online threats. It is necessary to take sufficient precautions against the evil side of cyberspace. Cyber security is a shared responsibility for everyone who uses the internet. According to the ITU, the government should be in charge of cyber security. In addition, it is the government's duty to promote a cyberspace security culture. One of the many foundations that support this culture is public awareness and education. As far as cyber security is concerned, education and awareness are essential. Consequently, if Nigeria is to achieve its goal of cyber security culture, it will have to concentrate on national cyber education and awareness efforts. As a result, in the next chapter, we'll look at the efforts of industrialized countries to raise cyber security designed to educate their citizens.
  • 9. References Osho, O. and Onoja, A.D., 2015. National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology, 9(1). Lebogang, V., Tabona, O. and Maupong, T., 2022. Evaluating Cybersecurity Strategies in Africa. In Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (pp. 1-19). IGI Global. Okorodudu, F.O. and Okorodudu, P.O., 2017. Cyber security and digital privacy: an imperative for information and communication technology and sustainable development in Nigeria. International Journal of Research, 4(03), pp.412-421. Rufai, A., Modi, S. and Wadata, B., 2021. A survey of cyber-security practices in Nigeria. International Research Journal of Advanced Engineering and Science, pp.222- 226.