SlideShare a Scribd company logo
1 of 2
REMEMBERING CYNTHIA UDOKA OSOKOGU (Part 1)
July 2012, a young, promising and enterprising post-graduate student of Nasarawa State University had
embarked on a treacherous journey; one that will forever leave an indelible mark in the hearts of her
family, friends and the nation at large. Although it was a journey for the sole aim of replenishing stock
for her clothing business, she did have other plans that were by the way. The only daughter, though the
last of her family; the uniting child of her family as at the time of birth, She had high hopes, tall dreams,
king sized aspirations and she worked tenaciously hard at achieving them, so also did her family.
Today, Cynthia Udoka Osokogu is no more; she never returned from the supposed business trip, she was
cut short in her prime by her assailants, a victim of social media abuse, unsafe online communications,
interfacing and a nauseating national and identification management security system that’s un-
proactive, intelligently-clueless and consistently tackling crime from the management-of-crisis position,
rather than from the crisis management stand – I wonder just how many more we would lose before
institutions responsible for safety and protection of lives actually realize crime has recently undergone
facial (recognition) surgery
A secure cyberspace is critical to our prosperity, we use the Internet and other online environments to
increase our productivity, as a platform for innovation, and as a venue in which to create new
businesses “Our digital infrastructure, therefore, is a strategic national asset, and protecting it—while
safeguarding privacy and civil liberties—is a national security priority” and an economic necessity and by
addressing threats in this environment, we will help individuals (and institutions) protect themselves in
cyberspace and enable both the private sector and government to offer more services online
With more and more devices and individuals connected to the internet on a daily basis, the need to well
authenticate these devices and individuals have become very important. Who are you? And how can
you prove it? has become two very simple yet critical questions that lie at the heart of all internet based
transactions and answering these questions is fast becoming a key requirement for significant online
based activity.
The rapid and vastly positive changes that have followed the rise of online activity – like making online
purchases, transact bank activities or connecting with our peers – have also led to new challenges, few
have been as costly or nerve wracking for businesses and families as online fraud, human trafficking,
kidnapping, ritual related deaths and identity thefts stem high. These crimes cost families and the nation
billions yearly and often leave in their wake, ransoming kidnapped family members or an endless search
for missing persons and in complex cases, a mess of ruined credit, damaged finances that can take years
to repair.
It will amaze you to know that one way to track missing persons and understand rape cases clearer is to
have access to the victim’s social media accounts and effectively profile their IDs cross referenced – that
is if they have maintained an active online presence. While the potential for fraud and crime-related
proclivity of internet users often leave individuals and businesses reluctant to conduct major
transactions online yet same strongly desire to expand its communications and interface channels, open
up its doors to individuals and vendors, then the withdrawal factor comes to play and often times
masked as security measures
Honestly, we really need to begin considering a national security strategy to online interactions.
Understanding that online crime is not only finance related but encompasses every other form of crime
as perpetrated in the offline environment, it’s a national embarrassment that as Nigeria ranks high in
Africa as one with the highest number of internet users, equally we account in several international
registers as a nation with the highest record of online fraudsters and scammers.
The present administration should set up a national strategy to include governments at all levels,
regulatory agencies and ministries, defining proper conduct in the use of the internet, proper
identification and authentication of individuals and devices that connect to the internet, charting a
course for the public and private sectors to collaborate to raise the levels of trust associated with the
identities of individuals, organizations, networks, services, and devices involved in online transactions.
This roadmap will only be a success—and the ideal of a proper identification management structure will
only be fulfilled—if privacy, security, interoperability, and ease-of-use are achieved. Achieving them
separately will not only lead to an inadequate solution but could serve as a hindrance to the broader
evolution of cyberspace.
Specifically, achieving optimal identification and authentication of connected components to cyber will
likely reduce the occurrence of anti social vices linked to anonymous. However, this risk is more likely to
be realized if we take no action: while identity solutions globally are evolving to keep pace with the
intricate nature of security risks, our local identification management structure is ill-defined,
inconsistent and zero-functional – how do we then achieve security at a digital front. The onus is on the
Federal Government alongside relevant agencies, in the implementation of this strategy to partner with
the private sector to ensure that the strategy is coupled with the necessary databases of individuals in
the offline and online environments and a robust identification management structure at all levels.

More Related Content

What's hot

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Digital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticDigital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticChristopher Porter
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach ColumnMichael Sexton
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual propertyCarlos Gonsalves
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 

What's hot (17)

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Digital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticDigital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging Tactic
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 

Similar to Remembering Cynthia Udoka Osokogu and the Need for Improved Online Security

Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wrightPaul Wright MSc
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillanceYavuz Paksoy
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésGim Andrade Vidal
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019Martin Cerny
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challengesijtsrd
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 

Similar to Remembering Cynthia Udoka Osokogu and the Need for Improved Online Security (20)

Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wright
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillance
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Cogniware 2019
Cogniware 2019Cogniware 2019
Cogniware 2019
 
Cogniware in #2019
Cogniware in #2019Cogniware in #2019
Cogniware in #2019
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 

Remembering Cynthia Udoka Osokogu and the Need for Improved Online Security

  • 1. REMEMBERING CYNTHIA UDOKA OSOKOGU (Part 1) July 2012, a young, promising and enterprising post-graduate student of Nasarawa State University had embarked on a treacherous journey; one that will forever leave an indelible mark in the hearts of her family, friends and the nation at large. Although it was a journey for the sole aim of replenishing stock for her clothing business, she did have other plans that were by the way. The only daughter, though the last of her family; the uniting child of her family as at the time of birth, She had high hopes, tall dreams, king sized aspirations and she worked tenaciously hard at achieving them, so also did her family. Today, Cynthia Udoka Osokogu is no more; she never returned from the supposed business trip, she was cut short in her prime by her assailants, a victim of social media abuse, unsafe online communications, interfacing and a nauseating national and identification management security system that’s un- proactive, intelligently-clueless and consistently tackling crime from the management-of-crisis position, rather than from the crisis management stand – I wonder just how many more we would lose before institutions responsible for safety and protection of lives actually realize crime has recently undergone facial (recognition) surgery A secure cyberspace is critical to our prosperity, we use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses “Our digital infrastructure, therefore, is a strategic national asset, and protecting it—while safeguarding privacy and civil liberties—is a national security priority” and an economic necessity and by addressing threats in this environment, we will help individuals (and institutions) protect themselves in cyberspace and enable both the private sector and government to offer more services online With more and more devices and individuals connected to the internet on a daily basis, the need to well authenticate these devices and individuals have become very important. Who are you? And how can you prove it? has become two very simple yet critical questions that lie at the heart of all internet based transactions and answering these questions is fast becoming a key requirement for significant online based activity. The rapid and vastly positive changes that have followed the rise of online activity – like making online purchases, transact bank activities or connecting with our peers – have also led to new challenges, few have been as costly or nerve wracking for businesses and families as online fraud, human trafficking, kidnapping, ritual related deaths and identity thefts stem high. These crimes cost families and the nation billions yearly and often leave in their wake, ransoming kidnapped family members or an endless search for missing persons and in complex cases, a mess of ruined credit, damaged finances that can take years to repair. It will amaze you to know that one way to track missing persons and understand rape cases clearer is to have access to the victim’s social media accounts and effectively profile their IDs cross referenced – that is if they have maintained an active online presence. While the potential for fraud and crime-related proclivity of internet users often leave individuals and businesses reluctant to conduct major
  • 2. transactions online yet same strongly desire to expand its communications and interface channels, open up its doors to individuals and vendors, then the withdrawal factor comes to play and often times masked as security measures Honestly, we really need to begin considering a national security strategy to online interactions. Understanding that online crime is not only finance related but encompasses every other form of crime as perpetrated in the offline environment, it’s a national embarrassment that as Nigeria ranks high in Africa as one with the highest number of internet users, equally we account in several international registers as a nation with the highest record of online fraudsters and scammers. The present administration should set up a national strategy to include governments at all levels, regulatory agencies and ministries, defining proper conduct in the use of the internet, proper identification and authentication of individuals and devices that connect to the internet, charting a course for the public and private sectors to collaborate to raise the levels of trust associated with the identities of individuals, organizations, networks, services, and devices involved in online transactions. This roadmap will only be a success—and the ideal of a proper identification management structure will only be fulfilled—if privacy, security, interoperability, and ease-of-use are achieved. Achieving them separately will not only lead to an inadequate solution but could serve as a hindrance to the broader evolution of cyberspace. Specifically, achieving optimal identification and authentication of connected components to cyber will likely reduce the occurrence of anti social vices linked to anonymous. However, this risk is more likely to be realized if we take no action: while identity solutions globally are evolving to keep pace with the intricate nature of security risks, our local identification management structure is ill-defined, inconsistent and zero-functional – how do we then achieve security at a digital front. The onus is on the Federal Government alongside relevant agencies, in the implementation of this strategy to partner with the private sector to ensure that the strategy is coupled with the necessary databases of individuals in the offline and online environments and a robust identification management structure at all levels.