SlideShare a Scribd company logo
1
Policy
Brief
Tackling the challenges of cybersecurity in Africa
1.	 Introduction
The 2013 Economic Report on Africa, a joint
publication of the Economic Commission for
Africa (ECA) and the African Union Commission
(AUC), states that “following two decades of
near stagnation, Africa’s growth performance
has improved hugely since the start of the 21st
century”.1
Since 2000, the African continent has
experienced a prolonged commodity boom and
a sustained growth trend. The report further
states that “Africa’s medium-term growth
prospects remain strong, too, at for example 4.8
per cent in 2013 and 5.1 per cent in 2014”.2
Also
of note, highly regarded publications, such as
The Economist3
and the International Business
Times4 and organzations, such as the African
Development Bank (AfDB)5, have asserted that
1	 African Union Commission and United Nations, Economic
Commission for Africa, Making the Most of Africa’s Commodities:
Industrializing for Growth, Jobs and Economic Transformation: Economic
Report on Africa 2013, (United Nations publication), Sales No. : E.13.IIK.1.,
p.6.
2	 Ibid.
3	 J. O’S, “Growth and other good things”, The Economist, 1
May 2013. Available from www.economist.com/ blogs/baobab/2013/05/
development-africa.
4	 Mike Obel, “Africa poised for unprecedented, long-term economic
growth: Seven drivers that could transform Africa into the world’s economic
powerhouse”, International Business Times, 13 September 2013. Available
from www.ibtimes.com/africa-poised-unprecedented-long-term-economic-
growth-seven-drivers-could-transform-africa-worlds.
5	 African Development Bank Group, “Africa is now the fastest
growing continent in the world”, 7 November 2013. Available from www.afdb.
org/en/news-and-events/article/africa-is-now-the-fastest-growing-continent-
in-the-world-12107/.
Africa is home to some of the world’s most
rapidly growing economies.
This newAfrica, captured by the aphorism“Africa
rising”, is reflected in the continent’s expanding
middle class and rapid adoption of mobile
technology. According to recent estimates by
the International Telecommunications Union
(ITU), the number of mobile subscribers
reached 63 per cent in 2013, and more than 16
percent of the African population are now using
the Internet.6
Furthermore, it is estimated that
the global value of web-based retail sales for
2013, amounted to $963 billion,7
while business
to consumer (B2C) e-commerce sales for the
same period totalled $ 1.3 trillion.8
Although the
e-commerce market is dominated by developed
economies, the global share of e-commerce for
the Middle East and Africa is expected to rise
from 1.6 per cent in 2011 to 2.3 per cent by 2016.
However, new challenges arise alongside
growth, and increasing technological exposure
6	 International Telecommunications Union, “ICTs facts and
figures 2013”, ITU Telecommunication Development Bureau (Geneva,
2008). Available from www.itu.int/en/ITU-D/Statistics/Documents/facts/
ICTFactsFigures2013-e.pdf.
7	 Goldman Sachs, “eCommerce expected to accelerate globally in
2014”, Equity Research, New York: The Goldman Sachs Group, Inc., 5 March
2013. Available from http://boletines.prisadigital.com/Global_ecommerce.pdf.
8	 eMarketer, “eMarketer in review – key 2013 trends, coverage areas
and platform growth”, Newsroom, 4 September 2013. Available from www.
emarketer.com/newsroom/index.php/emarketer-review-key-2013-trends-
coverage-areas-platform-growth/#UG1Ch9mS5hMlp1JX.99.
NTIS/002/2014
2
poses its own vulnerabilities and risks. One such
risk that derives from increased technological
exposures and requires urgent policy attention
and action is cybercrime.9
Cybercrime is a growing global phenomenon,
which, according to a report by Symantec,
Corporation10
issued in 2013, is increasing at a
more rapid rate in Africa than in any other area
of the world. Indeed, cybersecurity experts
estimate that 80 per cent of personal computers
on the African continent are infected with
viruses and other malicious software.11
Cybercriminals have long considered Africa
as opportune to commit their criminal acts.
Statistics from various sources indicate that
Africa is very prone to cyber-related threats due
to the high number of domains coupled with
very weak network and information security. For
example, according to the Norton Cyber-Crime
Report, every second, 18 adults are victims of
cybercrime, resulting in more than 1.5 million
victims globally per day. In addition, South Africa
(80 per cent) has the third highest number of
cybercrime victims in the world, after Russia (92
percent) and China (84 percent).12
The Symantec report10
further reveals that in
2012, the number of targeted cyberattacks
in Africa increased by 42 per cent. Thirty-
one percent of these attacks, categorized as
cyberespionage, have hit both large and small
businesses. Individual consumers have also
become vulnerable to viruses and other forms
of cyberthreats. In Africa, Nigeria is the largest
target and source of malicious Internet activities,
the consequences of which are unfortunately
spilling into the other countries in the West
9	 Cybercrimeisdefinedasabroadrangeofillegalactivitiescommitted
by means of, or in relation to, a computer system or network, including such
crimes as illegal possession and offering or distributing information by means
of a computer system or network.
10	 Symantec Corporation, Internet Security Threat Report 2013, 2012
Trends, Volume 18 (April, 2013). Available from www.symantec.com/content/
en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-
us.pdf.
11	 Franz-Stefan Gacy, “Foreign policy: Africa’s internet threat”,
National Public Radio, 29 March 2010.
Available from www.npr.org/templates/story/story.php?story-
Id=125297426.
12	 Symantec Corporation, 2012 Norton Cybercrime Report, September
2012.
African subregion. In major African cities, such
as Cairo, Johannesburg, Lagos and Nairobi,
the rate of cyberconnected disturbances, such
as fraudulent financial transactions and child
kidnappings, especially in Kenya, facilitated
through Internet communications has doubled
in the past three years.
Recent use of information and communications
technologies (ICTs) in support of terrorism
attacks throughout Africa is adding an
additional dimension to the cybersecurity
issue. Evidence from the investigation into the
recent attack of the Westgate Mall in Kenya,
the activities of Boko Haram in Nigeria and Al-
Qaida in Islamic Maghreb (AQIM) in Northern
Africa highlight the use ICTs in the planning,
coordination, implementation and promotion
of the various attacks. Such attacks have
destabilized and hampered recent economic
growth performances of African countries. For
example, the Westgate Mall attack not only cost
at least 67 innocent lives and millions of dollars
in infrastructure damage, but it is also expected
to have cost the Kenyan economy some $200
million in lost tourism revenue.13
Consequently, African countries need to
urgently scale up efforts to combat cybercrimes
through a multi-stakeholder approach involving
government, industry and civil society
organizations.
As per the new strategic focus of ECA
on evidence-based policy and analytical
research, this policy brief provides options for
consideration by member States, within the
context of the African Union Convention on
Cyberspace Security and Protection of Personal
data to stem the threats posed by cybecrime
and cybercriminals, to their national economic
security.
13	 Jacob Kushner, Jacob, “Mall terrorist attack may cost Kenya
$200 million in lost tourism earnings”, The Associated Press, 1 October 2013.
Available from www.ctvnews.ca/mall-terrorist-attack-may-cost-kenya-200-
million-in-lost-tourism-earnings-1.1478573.
3
2.	 The economic impact of
cybersecurity
Theeconomicimpactofinadequatecybersecurity
is colossal. The Norton Cybercrime Report 2012
indicated that direct financial losses totalled an
average of $197 per victim worldwide, while
globally a grand $110 billion in direct financial loss
was recorded.14
A recent study by the International Data Group
Connect15
investigating the state of cyberthreats
in various regions of Africa, with particular
emphasis on Egypt, Kenya, Nigeria and South
Africa, shows that there is a strong correlation
between cybersecurity and economic growth.
Africa, traditionally, has a high rate of software
piracy. According to a 2011 study,16
the average
rate of software piracy in the region is about 73
per cent, with little change in recent years. In
addition to the financial loss — $1.785 billion —,
the high level of use of unauthorized software is
likely to aggravate the region’s virus and malware
woes.
The study by the International Data Group
Connect estimates that annually, cybercrimes
cost the South African economy $573 million, the
Nigerian economy $200 million, and the Kenyan
economy $36 million.15
A 2011 DeloitteTouche survey found that financial
institutionsinKenya,Rwanda,Uganda,theUnited
Republic of Tanzania and Zambia had registered
losses of up to $245 million due to cyberfraud,17
a
high sum for countries without highly developed
banking systems. Several commercial banks in
Zambia18
were robbed of more than $4 million in
14	 Symantec Corporation, 2012 Norton Cybercrime Report,
September 2012.
15	 International Data Group Connect, “Africa 2013: Cyber-crime,
hacking and malware”, White Paper. Available from www.idgconnect.com/
view_abstract/11401/africa-2013-cyber-crime-hacking-malware.
16	 Business Software Alliance, Shadow market: 2011 BSA global
software piracy study, ninth edition, May 2012. Available from http://
globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_Study-
Standard.pdf.
17	 Henry Quarshie and Alexander Martin-Odoom, “Fighting
Cybercrime in Africa”, Computer Science and Engineering, vol. 2, No. 6
(2012), pp. 98-100.
18	 Michael Chawe, “Cyber crime costs Zambian banks $4m”, Africa
Review, 14 June 2013, Available from www.africareview.com/News/Cyber-
the first half of 2013 as a result of sophisticated
cybercrime collaborations between Zambians
and foreigners.
3.	 Cybersecurity: challenges for Africa
Africa is facing several Internet-related challenges
in relation to security risk, intellectual property
infringement and protection of personal data.
Cybercriminals target people inside and outside
their national boundaries and most African
governments have neither the technical, nor the
financial capacity to target and monitor electronic
exchangesdeemedsensitivefornationalsecurity.
These challenges are:
•	 Low level of security provisions sufficient
to prevent and control technological and
informational risks.
•	 Lack of technical know-how in terms of
cybersecurity and inability to monitor and
defend national networks, making African
countries vulnerable to cyberespionage, as
well as to incidences of cyberterrorism.
•	 Inability to develop the necessary
cybersecurity legal frameworks to fight
cybercrime. A survey of 21 countries
conducted by ECA19
found that while many
countries had proposed legislations, the
level of deployment of security systems in
both the private and the public sectors to
combat cyber-crime was low.
•	 Cyber-security concerns are broader in
scope than national security concerns.
Yet, few major significant cybersecurity
initiatives in Africa have been implemented.
As ICTs are hailed as the end-all to the many
pressing problems of Africa, cybersecurity
is a critical issue that needs to be dealt
more comprehensively.
•	 There is a need to build an information
society that respects values, rights and
crime-costs-Zambian-banks--4millio/-/979180/1883006/-/128vr2iz/-/index.
html.
19	 Benin, Burundi, the Congo, Cote d’Ivoire, the Democratic Republic
of the Congo, Egypt, Ethiopia, the Gambia, Ghana, Guinea-Bissau, Kenya,
Madagascar, Mali, Mozambique, Niger, Nigeria, Senegal, Sudan, Togo,
Uganda and Zambia.
4
freedoms and guarantees equal access to
information, while encouraging the creation
of authentic knowledge and that can build
confidence and trust in the use of ICTs in
Africa.
•	 Generally limited levels of awareness of
ICT-related security issues by stakeholders,
such as ICT regulators, law enforcement
agencies, the judiciary, information
technology professionals and users.
4.	 Policy recommendations
Measuring the magnitude of challenges posed
by lack of adequate cybersecurity is complex.
Cybercrime is transnational in nature. Thus,
tackling it requires coordinated and focused
policies.The plurality of the issues dictates taking
into account its multiple dimensions, which are,
amongothers,scientific,technological,economic
and financial, political, and sociocultural. The
interaction between these dimensions reinforces
the complexity of cybesecurity, which is apparent
at several levels.
4.1	 Policy, legal and regulatory
mechanisms
While continental dependence on ICTs is
growing, individuals, organizations and countries
are becoming highly vulnerable to attacks on
information systems and networks, such as
hacking, cyberterrorism and cybercrime. Few
individuals and organizations are equipped to
cope with such attacks. In this regard, the role
of governments in dealing with this important
phenomenon cannot be overemphasized. The
success of any cybersecurity initiative requires
the full involvement and support of the political
leadership at the very highest level. The role
of governments in putting in place the policy,
legal and regulatory framework is of paramount
importance. Some of these include the following:
4.1.1	Legal framework
Lack of cybersecurity legislation negatively
affects business. It is, therefore, essential that
effective anti-spam and cybercrime laws and
regulations be put in place in order to ensure
confidence and trust in the use of the Internet,
including carrying out online transactions, by
all stakeholders. This should be enhanced by
initiating capacity- building among relevant
policy stakeholders and creating a framework
for local enforcement of cybercrime mitigation.
4.1.2	Harmonization of policy and legal
frameworks
Separate but extremely intertwined to the
issue above is that of harmonization. Although
member States are at varying levels of
tackling cybersecurity and establishing policy
instruments and legislative frameworks, given
the global nature of cybercrime, policy and legal
frameworks need to be harmonized.
Cybersecurity is a global good and global and
regional actions are required. There is a need
to set minimum standards and procedures to
enable the continent to operate as one and instil
efficiency and effectiveness in its operations.
In this regard, the African Union Commission
(AUC) and ECA have been spearheading the
development of the African union convention
on cyber security, which has been undergoing
a series of reviews by the regional economic
communities and endorsed by the African
Union Ordinary Conference in Charge of
Communication and InformationTechnologies in
September 2012 in Khartoum and adopted by the
African Union Heads of State and Governments
Summit in June 2014 in Malabo. Countries
will, therefore, be expected to transpose their
cybersecurity laws in the framework of the
Convention and others can also be guided by it
to develop one.
4.1.3	Coordination and cooperation
Cybersecurity transcends all boundaries.
Given the global dimension of cybersecurity,
it is difficult to fight against cybersecurity
breaches at the national level alone. Combatting
cybersecurity breaches requires cooperation
at all levels, among countries and international
organizations,andbetweenthepublicandprivate
sectors. Thus, a comprehensive framework for
international cooperation and outreach must
5
be developed. To accomplish this, coordination
and collaboration in areas including computer-
aided fraud, hacking, distribution of child abuse
images and copyright infringement, as well as
uniformity in procedures and processes, must
occur.
4.2	 Technological considerations
4.2.1	Development of infrastructure and
services
•	 There should be dedicated national
network infrastructures that can connect
government, industry and the research
community for the benefit of promoting
open knowledge engagement, an open
data system for researchers, innovation,
end-users and researchers’ synergy and
information technology development.
•	 There is also a need to establish a national
computer emergency readiness and
response team ecosystem to promote
national synergy on cybersecurity,
knowledge-sharing and intelligence
gathering on countermeasures against
cybercrime injurious to States, as well as
to individuals.
•	 A dedicated call centre for reporting
cybecrime should be set up with the
aim to assure cybervictims that there is
a place that they can turn to report such
crimes and receive assistance. As part of
the broader cybersecurity strategy, the
call centre should be staffed by sufficiently
trained and knowledgeable personnel and
have a website and a toll free number to
enable victims to report a cybecrime with
minimal inconvenience.
•	 The dissemination of best practices of
Internet service providers and registrar/
registry in their efforts to mitigate
cybercrime activities and undertake
capacity-building for e-commerce and
online transaction providers should be
promoted.
4.2.2	Investment on research
Knowledge and information serve as a direct
way of empowering countries and their citizens.
Currently, there is general lack of knowledge
and information on cybersecurity matters in
Africa. This gap must be closed. To achieve
this, sufficient resources has to be channelled
towards investment in research on cybersecurity
in Africa, which is currently lacking. Even in
cases in which research has been carried
out, such material is not readily available and
accessible. Thus, databanks need to be created
to serve as platforms for researchers to deposit
their outputs, including tools and techniques
used to identify and gather information about
cybercrime activities. Some countries have
in place data deposit laws. As these are very
useful, those without such laws, should impose
them using best practices of countries that have
already established them.
4.3	 The social dimensions
4.3.1	Education
The exponential growth in the use of cyberspace
in Africa is not matched by the necessary skills.
Thus, there is a need for broad-based education
initiatives on Internet safety and security to
tackle the issues of child protection and social
security in general. Furthermore, facilitation of
secure ICT access for users is of a paramount
importance.
4.3.2	Engagement of all key stakeholders
It is important to understand that no one person
or institution can have the requisite capacity to
deal with cybersecurity. Cybesecurity is not
an event but rather a process. As a result, it
is not simply a matter of passing legislation,
or something that belongs to lawyers only.
Members of Parliament, lawyers, the judiciary,
intelligence/military, civil society, media, young
people and members of the public as key
stakeholders should all be involved in efforts
to deal with cybersecurity at the earliest
6
available opportunity. It is important to engage
all stakeholders to ensure the necessary buy-
in and that they understand the issues and
processes involved.
References
Atta-Asamoah, Andrews. (Jul 2010).
Understanding the West African cyber-crime
process. African Security Review Vol. 18 No.4
pp.105-114. Institute for Security Studies.
http://www.tandfonline.com/doi/s/10.1080/10
246029.2009.9627562?journalCode=rasr20#.
Uu9NOPtdx8E.
Kaiko Namusa,Cyber crime costs banks
$4m. Times of Zambia. http://www.times.
co.zm/?p=18423
Cyber-crime-costs-Zambian-banks--4millio/-
/979180/1883006/-/128vr2iz/-/index.html
United Nations Office on Drugs and Crime
(February 2013) Comprehensive Study on
Cybercrime. http://www.unodc.org/documents/
organized-crime/UNODC_CCPCJ_EG.4_2013/
CYBERCRIME_ STUDY_210213.pdf
This policy brief was contributed by Mr. Mactar Seck with support from Ms. Tsega Belai under the
supervision of Mr. Kasirim Nwuke, Chief, NTIS
Ordering information
To order copies of Tackling the challenges of
cyber-security in Africa policy brief by Economic
Commission for Africa;
Please contact
Please contact: Publications, Economic Commission
for Africa, P.O. Box 3001, Addis Ababa, Ethiopia,
Tel: +251 11 544-9900, Fax: +251 11 551-4416,
E-mail: ecainfo@uneca.org
Web: www.uneca.org
Contact
Further information on ECA’s programme on
Technology and Innovation can be obtained from
Mr. Kasirim Nwuke, Chief, New Technologies and
Innovation Section/Special Initiatives Division,
Telephone: +251-11-544-3375, Office Fax: +251-
11- 551-0512, email: Knwuke@uneca.org.

More Related Content

What's hot

e-Conomy SEA 2019 report (from Google and Temasek)
e-Conomy SEA 2019 report (from Google and Temasek)e-Conomy SEA 2019 report (from Google and Temasek)
e-Conomy SEA 2019 report (from Google and Temasek)
Duy Hoang
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
João Rufino de Sales
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Kenya Country Report 2020
Kenya Country Report 2020Kenya Country Report 2020
Kenya Country Report 2020
DavidSolerCrespo
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vasiliki Zioga
 
Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...
ijtsrd
 
Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...
ijtsrd
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transports
ijtsrd
 
We are social 2019 report
We are social   2019 reportWe are social   2019 report
We are social 2019 report
Arvind Mishra
 
Brand Protection Excellence, Munich 2017
Brand Protection Excellence, Munich 2017Brand Protection Excellence, Munich 2017
Brand Protection Excellence, Munich 2017
Klas Karlsson
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
ADISPO Asociación de directores de seguridad
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
Michael Yatskievych
 
Money laundering and gaming v1
Money laundering and gaming   v1Money laundering and gaming   v1
Money laundering and gaming v1
Federico Lannes
 
Taking advantage of african growth opportunities geo expansion
Taking advantage of african growth opportunities   geo expansionTaking advantage of african growth opportunities   geo expansion
Taking advantage of african growth opportunities geo expansion
Lynn Gunning
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
CheapSSLUSA
 
Ashton Global Investing in Africa
Ashton Global Investing in AfricaAshton Global Investing in Africa
Ashton Global Investing in Africa
Ashton Global
 

What's hot (19)

e-Conomy SEA 2019 report (from Google and Temasek)
e-Conomy SEA 2019 report (from Google and Temasek)e-Conomy SEA 2019 report (from Google and Temasek)
e-Conomy SEA 2019 report (from Google and Temasek)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
Kenya Country Report 2020
Kenya Country Report 2020Kenya Country Report 2020
Kenya Country Report 2020
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...
 
Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transports
 
We are social 2019 report
We are social   2019 reportWe are social   2019 report
We are social 2019 report
 
Brand Protection Excellence, Munich 2017
Brand Protection Excellence, Munich 2017Brand Protection Excellence, Munich 2017
Brand Protection Excellence, Munich 2017
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Money laundering and gaming v1
Money laundering and gaming   v1Money laundering and gaming   v1
Money laundering and gaming v1
 
Taking advantage of african growth opportunities geo expansion
Taking advantage of african growth opportunities   geo expansionTaking advantage of african growth opportunities   geo expansion
Taking advantage of african growth opportunities geo expansion
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 
Ashton Global Investing in Africa
Ashton Global Investing in AfricaAshton Global Investing in Africa
Ashton Global Investing in Africa
 

Similar to Cybersecurity

IAD Summit review from the conference chair
IAD Summit review from the conference chairIAD Summit review from the conference chair
IAD Summit review from the conference chair
Adrian Hall
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2
Marcio Kanamaru
 
BuildingadigitalNigeria_0
BuildingadigitalNigeria_0BuildingadigitalNigeria_0
BuildingadigitalNigeria_0
Michael Martins
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
marukanda
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
Cyber Threat Intelligence Network
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
Syamsul Bahrin Zaibon
 
The Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceThe Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs Vigilance
Waqas Tariq
 
Wef gitr report_highlights_2013 (1)
Wef gitr report_highlights_2013 (1)Wef gitr report_highlights_2013 (1)
Wef gitr report_highlights_2013 (1)
Victor Gridnev
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
Tanvi Jindal
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
TirthShah760404
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
ijcisjournal
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
International Federation of Accountants
 
The arab digital divide
The arab digital divideThe arab digital divide
The arab digital divide
team-abr
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
Running Head CYBER SECURITY IN AFRICA .docx
Running Head CYBER SECURITY IN AFRICA                            .docxRunning Head CYBER SECURITY IN AFRICA                            .docx
Running Head CYBER SECURITY IN AFRICA .docx
todd271
 
The Young Africa A Liveplex Report.pdf
The Young Africa A Liveplex Report.pdfThe Young Africa A Liveplex Report.pdf
The Young Africa A Liveplex Report.pdf
Liveplex
 
Pacific Alliance: Digital Connectivity
Pacific Alliance: Digital ConnectivityPacific Alliance: Digital Connectivity
Pacific Alliance: Digital Connectivity
Construir las Regiones, A.C.
 

Similar to Cybersecurity (20)

IAD Summit review from the conference chair
IAD Summit review from the conference chairIAD Summit review from the conference chair
IAD Summit review from the conference chair
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2
 
BuildingadigitalNigeria_0
BuildingadigitalNigeria_0BuildingadigitalNigeria_0
BuildingadigitalNigeria_0
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
The Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceThe Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs Vigilance
 
Wef gitr report_highlights_2013 (1)
Wef gitr report_highlights_2013 (1)Wef gitr report_highlights_2013 (1)
Wef gitr report_highlights_2013 (1)
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
The arab digital divide
The arab digital divideThe arab digital divide
The arab digital divide
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Running Head CYBER SECURITY IN AFRICA .docx
Running Head CYBER SECURITY IN AFRICA                            .docxRunning Head CYBER SECURITY IN AFRICA                            .docx
Running Head CYBER SECURITY IN AFRICA .docx
 
The Young Africa A Liveplex Report.pdf
The Young Africa A Liveplex Report.pdfThe Young Africa A Liveplex Report.pdf
The Young Africa A Liveplex Report.pdf
 
Pacific Alliance: Digital Connectivity
Pacific Alliance: Digital ConnectivityPacific Alliance: Digital Connectivity
Pacific Alliance: Digital Connectivity
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 

Cybersecurity

  • 1. 1 Policy Brief Tackling the challenges of cybersecurity in Africa 1. Introduction The 2013 Economic Report on Africa, a joint publication of the Economic Commission for Africa (ECA) and the African Union Commission (AUC), states that “following two decades of near stagnation, Africa’s growth performance has improved hugely since the start of the 21st century”.1 Since 2000, the African continent has experienced a prolonged commodity boom and a sustained growth trend. The report further states that “Africa’s medium-term growth prospects remain strong, too, at for example 4.8 per cent in 2013 and 5.1 per cent in 2014”.2 Also of note, highly regarded publications, such as The Economist3 and the International Business Times4 and organzations, such as the African Development Bank (AfDB)5, have asserted that 1 African Union Commission and United Nations, Economic Commission for Africa, Making the Most of Africa’s Commodities: Industrializing for Growth, Jobs and Economic Transformation: Economic Report on Africa 2013, (United Nations publication), Sales No. : E.13.IIK.1., p.6. 2 Ibid. 3 J. O’S, “Growth and other good things”, The Economist, 1 May 2013. Available from www.economist.com/ blogs/baobab/2013/05/ development-africa. 4 Mike Obel, “Africa poised for unprecedented, long-term economic growth: Seven drivers that could transform Africa into the world’s economic powerhouse”, International Business Times, 13 September 2013. Available from www.ibtimes.com/africa-poised-unprecedented-long-term-economic- growth-seven-drivers-could-transform-africa-worlds. 5 African Development Bank Group, “Africa is now the fastest growing continent in the world”, 7 November 2013. Available from www.afdb. org/en/news-and-events/article/africa-is-now-the-fastest-growing-continent- in-the-world-12107/. Africa is home to some of the world’s most rapidly growing economies. This newAfrica, captured by the aphorism“Africa rising”, is reflected in the continent’s expanding middle class and rapid adoption of mobile technology. According to recent estimates by the International Telecommunications Union (ITU), the number of mobile subscribers reached 63 per cent in 2013, and more than 16 percent of the African population are now using the Internet.6 Furthermore, it is estimated that the global value of web-based retail sales for 2013, amounted to $963 billion,7 while business to consumer (B2C) e-commerce sales for the same period totalled $ 1.3 trillion.8 Although the e-commerce market is dominated by developed economies, the global share of e-commerce for the Middle East and Africa is expected to rise from 1.6 per cent in 2011 to 2.3 per cent by 2016. However, new challenges arise alongside growth, and increasing technological exposure 6 International Telecommunications Union, “ICTs facts and figures 2013”, ITU Telecommunication Development Bureau (Geneva, 2008). Available from www.itu.int/en/ITU-D/Statistics/Documents/facts/ ICTFactsFigures2013-e.pdf. 7 Goldman Sachs, “eCommerce expected to accelerate globally in 2014”, Equity Research, New York: The Goldman Sachs Group, Inc., 5 March 2013. Available from http://boletines.prisadigital.com/Global_ecommerce.pdf. 8 eMarketer, “eMarketer in review – key 2013 trends, coverage areas and platform growth”, Newsroom, 4 September 2013. Available from www. emarketer.com/newsroom/index.php/emarketer-review-key-2013-trends- coverage-areas-platform-growth/#UG1Ch9mS5hMlp1JX.99. NTIS/002/2014
  • 2. 2 poses its own vulnerabilities and risks. One such risk that derives from increased technological exposures and requires urgent policy attention and action is cybercrime.9 Cybercrime is a growing global phenomenon, which, according to a report by Symantec, Corporation10 issued in 2013, is increasing at a more rapid rate in Africa than in any other area of the world. Indeed, cybersecurity experts estimate that 80 per cent of personal computers on the African continent are infected with viruses and other malicious software.11 Cybercriminals have long considered Africa as opportune to commit their criminal acts. Statistics from various sources indicate that Africa is very prone to cyber-related threats due to the high number of domains coupled with very weak network and information security. For example, according to the Norton Cyber-Crime Report, every second, 18 adults are victims of cybercrime, resulting in more than 1.5 million victims globally per day. In addition, South Africa (80 per cent) has the third highest number of cybercrime victims in the world, after Russia (92 percent) and China (84 percent).12 The Symantec report10 further reveals that in 2012, the number of targeted cyberattacks in Africa increased by 42 per cent. Thirty- one percent of these attacks, categorized as cyberespionage, have hit both large and small businesses. Individual consumers have also become vulnerable to viruses and other forms of cyberthreats. In Africa, Nigeria is the largest target and source of malicious Internet activities, the consequences of which are unfortunately spilling into the other countries in the West 9 Cybercrimeisdefinedasabroadrangeofillegalactivitiescommitted by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network. 10 Symantec Corporation, Internet Security Threat Report 2013, 2012 Trends, Volume 18 (April, 2013). Available from www.symantec.com/content/ en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en- us.pdf. 11 Franz-Stefan Gacy, “Foreign policy: Africa’s internet threat”, National Public Radio, 29 March 2010. Available from www.npr.org/templates/story/story.php?story- Id=125297426. 12 Symantec Corporation, 2012 Norton Cybercrime Report, September 2012. African subregion. In major African cities, such as Cairo, Johannesburg, Lagos and Nairobi, the rate of cyberconnected disturbances, such as fraudulent financial transactions and child kidnappings, especially in Kenya, facilitated through Internet communications has doubled in the past three years. Recent use of information and communications technologies (ICTs) in support of terrorism attacks throughout Africa is adding an additional dimension to the cybersecurity issue. Evidence from the investigation into the recent attack of the Westgate Mall in Kenya, the activities of Boko Haram in Nigeria and Al- Qaida in Islamic Maghreb (AQIM) in Northern Africa highlight the use ICTs in the planning, coordination, implementation and promotion of the various attacks. Such attacks have destabilized and hampered recent economic growth performances of African countries. For example, the Westgate Mall attack not only cost at least 67 innocent lives and millions of dollars in infrastructure damage, but it is also expected to have cost the Kenyan economy some $200 million in lost tourism revenue.13 Consequently, African countries need to urgently scale up efforts to combat cybercrimes through a multi-stakeholder approach involving government, industry and civil society organizations. As per the new strategic focus of ECA on evidence-based policy and analytical research, this policy brief provides options for consideration by member States, within the context of the African Union Convention on Cyberspace Security and Protection of Personal data to stem the threats posed by cybecrime and cybercriminals, to their national economic security. 13 Jacob Kushner, Jacob, “Mall terrorist attack may cost Kenya $200 million in lost tourism earnings”, The Associated Press, 1 October 2013. Available from www.ctvnews.ca/mall-terrorist-attack-may-cost-kenya-200- million-in-lost-tourism-earnings-1.1478573.
  • 3. 3 2. The economic impact of cybersecurity Theeconomicimpactofinadequatecybersecurity is colossal. The Norton Cybercrime Report 2012 indicated that direct financial losses totalled an average of $197 per victim worldwide, while globally a grand $110 billion in direct financial loss was recorded.14 A recent study by the International Data Group Connect15 investigating the state of cyberthreats in various regions of Africa, with particular emphasis on Egypt, Kenya, Nigeria and South Africa, shows that there is a strong correlation between cybersecurity and economic growth. Africa, traditionally, has a high rate of software piracy. According to a 2011 study,16 the average rate of software piracy in the region is about 73 per cent, with little change in recent years. In addition to the financial loss — $1.785 billion —, the high level of use of unauthorized software is likely to aggravate the region’s virus and malware woes. The study by the International Data Group Connect estimates that annually, cybercrimes cost the South African economy $573 million, the Nigerian economy $200 million, and the Kenyan economy $36 million.15 A 2011 DeloitteTouche survey found that financial institutionsinKenya,Rwanda,Uganda,theUnited Republic of Tanzania and Zambia had registered losses of up to $245 million due to cyberfraud,17 a high sum for countries without highly developed banking systems. Several commercial banks in Zambia18 were robbed of more than $4 million in 14 Symantec Corporation, 2012 Norton Cybercrime Report, September 2012. 15 International Data Group Connect, “Africa 2013: Cyber-crime, hacking and malware”, White Paper. Available from www.idgconnect.com/ view_abstract/11401/africa-2013-cyber-crime-hacking-malware. 16 Business Software Alliance, Shadow market: 2011 BSA global software piracy study, ninth edition, May 2012. Available from http:// globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_Study- Standard.pdf. 17 Henry Quarshie and Alexander Martin-Odoom, “Fighting Cybercrime in Africa”, Computer Science and Engineering, vol. 2, No. 6 (2012), pp. 98-100. 18 Michael Chawe, “Cyber crime costs Zambian banks $4m”, Africa Review, 14 June 2013, Available from www.africareview.com/News/Cyber- the first half of 2013 as a result of sophisticated cybercrime collaborations between Zambians and foreigners. 3. Cybersecurity: challenges for Africa Africa is facing several Internet-related challenges in relation to security risk, intellectual property infringement and protection of personal data. Cybercriminals target people inside and outside their national boundaries and most African governments have neither the technical, nor the financial capacity to target and monitor electronic exchangesdeemedsensitivefornationalsecurity. These challenges are: • Low level of security provisions sufficient to prevent and control technological and informational risks. • Lack of technical know-how in terms of cybersecurity and inability to monitor and defend national networks, making African countries vulnerable to cyberespionage, as well as to incidences of cyberterrorism. • Inability to develop the necessary cybersecurity legal frameworks to fight cybercrime. A survey of 21 countries conducted by ECA19 found that while many countries had proposed legislations, the level of deployment of security systems in both the private and the public sectors to combat cyber-crime was low. • Cyber-security concerns are broader in scope than national security concerns. Yet, few major significant cybersecurity initiatives in Africa have been implemented. As ICTs are hailed as the end-all to the many pressing problems of Africa, cybersecurity is a critical issue that needs to be dealt more comprehensively. • There is a need to build an information society that respects values, rights and crime-costs-Zambian-banks--4millio/-/979180/1883006/-/128vr2iz/-/index. html. 19 Benin, Burundi, the Congo, Cote d’Ivoire, the Democratic Republic of the Congo, Egypt, Ethiopia, the Gambia, Ghana, Guinea-Bissau, Kenya, Madagascar, Mali, Mozambique, Niger, Nigeria, Senegal, Sudan, Togo, Uganda and Zambia.
  • 4. 4 freedoms and guarantees equal access to information, while encouraging the creation of authentic knowledge and that can build confidence and trust in the use of ICTs in Africa. • Generally limited levels of awareness of ICT-related security issues by stakeholders, such as ICT regulators, law enforcement agencies, the judiciary, information technology professionals and users. 4. Policy recommendations Measuring the magnitude of challenges posed by lack of adequate cybersecurity is complex. Cybercrime is transnational in nature. Thus, tackling it requires coordinated and focused policies.The plurality of the issues dictates taking into account its multiple dimensions, which are, amongothers,scientific,technological,economic and financial, political, and sociocultural. The interaction between these dimensions reinforces the complexity of cybesecurity, which is apparent at several levels. 4.1 Policy, legal and regulatory mechanisms While continental dependence on ICTs is growing, individuals, organizations and countries are becoming highly vulnerable to attacks on information systems and networks, such as hacking, cyberterrorism and cybercrime. Few individuals and organizations are equipped to cope with such attacks. In this regard, the role of governments in dealing with this important phenomenon cannot be overemphasized. The success of any cybersecurity initiative requires the full involvement and support of the political leadership at the very highest level. The role of governments in putting in place the policy, legal and regulatory framework is of paramount importance. Some of these include the following: 4.1.1 Legal framework Lack of cybersecurity legislation negatively affects business. It is, therefore, essential that effective anti-spam and cybercrime laws and regulations be put in place in order to ensure confidence and trust in the use of the Internet, including carrying out online transactions, by all stakeholders. This should be enhanced by initiating capacity- building among relevant policy stakeholders and creating a framework for local enforcement of cybercrime mitigation. 4.1.2 Harmonization of policy and legal frameworks Separate but extremely intertwined to the issue above is that of harmonization. Although member States are at varying levels of tackling cybersecurity and establishing policy instruments and legislative frameworks, given the global nature of cybercrime, policy and legal frameworks need to be harmonized. Cybersecurity is a global good and global and regional actions are required. There is a need to set minimum standards and procedures to enable the continent to operate as one and instil efficiency and effectiveness in its operations. In this regard, the African Union Commission (AUC) and ECA have been spearheading the development of the African union convention on cyber security, which has been undergoing a series of reviews by the regional economic communities and endorsed by the African Union Ordinary Conference in Charge of Communication and InformationTechnologies in September 2012 in Khartoum and adopted by the African Union Heads of State and Governments Summit in June 2014 in Malabo. Countries will, therefore, be expected to transpose their cybersecurity laws in the framework of the Convention and others can also be guided by it to develop one. 4.1.3 Coordination and cooperation Cybersecurity transcends all boundaries. Given the global dimension of cybersecurity, it is difficult to fight against cybersecurity breaches at the national level alone. Combatting cybersecurity breaches requires cooperation at all levels, among countries and international organizations,andbetweenthepublicandprivate sectors. Thus, a comprehensive framework for international cooperation and outreach must
  • 5. 5 be developed. To accomplish this, coordination and collaboration in areas including computer- aided fraud, hacking, distribution of child abuse images and copyright infringement, as well as uniformity in procedures and processes, must occur. 4.2 Technological considerations 4.2.1 Development of infrastructure and services • There should be dedicated national network infrastructures that can connect government, industry and the research community for the benefit of promoting open knowledge engagement, an open data system for researchers, innovation, end-users and researchers’ synergy and information technology development. • There is also a need to establish a national computer emergency readiness and response team ecosystem to promote national synergy on cybersecurity, knowledge-sharing and intelligence gathering on countermeasures against cybercrime injurious to States, as well as to individuals. • A dedicated call centre for reporting cybecrime should be set up with the aim to assure cybervictims that there is a place that they can turn to report such crimes and receive assistance. As part of the broader cybersecurity strategy, the call centre should be staffed by sufficiently trained and knowledgeable personnel and have a website and a toll free number to enable victims to report a cybecrime with minimal inconvenience. • The dissemination of best practices of Internet service providers and registrar/ registry in their efforts to mitigate cybercrime activities and undertake capacity-building for e-commerce and online transaction providers should be promoted. 4.2.2 Investment on research Knowledge and information serve as a direct way of empowering countries and their citizens. Currently, there is general lack of knowledge and information on cybersecurity matters in Africa. This gap must be closed. To achieve this, sufficient resources has to be channelled towards investment in research on cybersecurity in Africa, which is currently lacking. Even in cases in which research has been carried out, such material is not readily available and accessible. Thus, databanks need to be created to serve as platforms for researchers to deposit their outputs, including tools and techniques used to identify and gather information about cybercrime activities. Some countries have in place data deposit laws. As these are very useful, those without such laws, should impose them using best practices of countries that have already established them. 4.3 The social dimensions 4.3.1 Education The exponential growth in the use of cyberspace in Africa is not matched by the necessary skills. Thus, there is a need for broad-based education initiatives on Internet safety and security to tackle the issues of child protection and social security in general. Furthermore, facilitation of secure ICT access for users is of a paramount importance. 4.3.2 Engagement of all key stakeholders It is important to understand that no one person or institution can have the requisite capacity to deal with cybersecurity. Cybesecurity is not an event but rather a process. As a result, it is not simply a matter of passing legislation, or something that belongs to lawyers only. Members of Parliament, lawyers, the judiciary, intelligence/military, civil society, media, young people and members of the public as key stakeholders should all be involved in efforts to deal with cybersecurity at the earliest
  • 6. 6 available opportunity. It is important to engage all stakeholders to ensure the necessary buy- in and that they understand the issues and processes involved. References Atta-Asamoah, Andrews. (Jul 2010). Understanding the West African cyber-crime process. African Security Review Vol. 18 No.4 pp.105-114. Institute for Security Studies. http://www.tandfonline.com/doi/s/10.1080/10 246029.2009.9627562?journalCode=rasr20#. Uu9NOPtdx8E. Kaiko Namusa,Cyber crime costs banks $4m. Times of Zambia. http://www.times. co.zm/?p=18423 Cyber-crime-costs-Zambian-banks--4millio/- /979180/1883006/-/128vr2iz/-/index.html United Nations Office on Drugs and Crime (February 2013) Comprehensive Study on Cybercrime. http://www.unodc.org/documents/ organized-crime/UNODC_CCPCJ_EG.4_2013/ CYBERCRIME_ STUDY_210213.pdf This policy brief was contributed by Mr. Mactar Seck with support from Ms. Tsega Belai under the supervision of Mr. Kasirim Nwuke, Chief, NTIS Ordering information To order copies of Tackling the challenges of cyber-security in Africa policy brief by Economic Commission for Africa; Please contact Please contact: Publications, Economic Commission for Africa, P.O. Box 3001, Addis Ababa, Ethiopia, Tel: +251 11 544-9900, Fax: +251 11 551-4416, E-mail: ecainfo@uneca.org Web: www.uneca.org Contact Further information on ECA’s programme on Technology and Innovation can be obtained from Mr. Kasirim Nwuke, Chief, New Technologies and Innovation Section/Special Initiatives Division, Telephone: +251-11-544-3375, Office Fax: +251- 11- 551-0512, email: Knwuke@uneca.org.