SlideShare a Scribd company logo
1 of 18
The Realities and
Challenges of Cyber Crime
and Cyber Security in Africa
               Prof Raymond Akwule
                   President/CEO
               Digital Bridge Institute

   2011 Workshop on Cyber Security and Global Affairs
                     With focus on
    International Cyber Security Governance, Human
           Factors, Policies and Technologies

                DBH, Budapest, Hungary
                 May 31 to Jun 2, 2011
The Dilemma of the Information
         Society


   The benefits of the Information Society are well
    known …


   But the Information society has also created the new
    problems of Cyber Crime and Cyber Security
Cybercrime and Cyber Security in the
        Information Society

   Definition

   Cybercrime -- all criminal offences which are
    committed with the aid of, or targeted at,
    communication devices in a network. This can
    be for example the Internet, the telephone
    line or the mobile network.
Cybercrime and Cyber Security in the
        Information Society

Why are Cyber Crimes on the Rise?

  1. They are easy to learn how to commit;


  2. They require few resources relative to the potential damage
     caused;


  3. They can be committed in a jurisdiction without being
     physically present in it;


  4. They are often not clearly illegal.
Issues and Challenges of Cyber
     security in Africa


   Internet penetration is still relatively low but it is growing
    in Africa

   Broadband penetration is very low

   Mobile Telecommunications is growing exponentially
Issues and Challenges of Cyber
       Security in African

   Increasingly more Cybercrimes are perpetrated through
    mobile phones

   Social networking is on the rise and increasingly
    cybercrimes are perpetrated through the social networks
    (facebook, etc)

   Cyber criminals target people inside and outside their
    national boundaries
Issues and Challenges of Cyber
    Security in African
   Cloud computing is just being introduced into the
    continent but it has met with a lot of skepticism.

       Uncertainty about cloud security is evident in a Global Risk
        Survey by IBM’s Institute for Business Value, with 77% of
        respondents believing cloud made protecting privacy more
        difficult and 50% expressing worries about data breach or loss.
         In a further IBM survey 66% cite security as their top concern
        when considering cloud.
       The good news is that enterprises and governments around the
        world are addressing cloud’s privacy, authentication and
        security issues, and turning the promise of cloud computing
        into reality .
Cyber Security Initiatives in Africa

   The United Nations Economic Commission for Africa
    (UNECA) is addressing cyber security within the
    framework of African Information Society Initiative
    (AISI). It advocates coherent and coordinated
    continental and regional approach to cyber security,
    as well as enhanced consideration of the issue in
    national ICT and Information Society strategies and
    action plans.
Cyber security Initiatives in Africa

   According to the UNECA, African governments are
    demonstrating increased awareness of cyber security
    issues, but existing capability to deter, monitor or
    pursue cyber security is relatively low. The UNECA
    cyber security initiative is implemented in cooperation
    with the African Union in order to arrive at
    harmonized legal framework, and especially with
    guidelines on: Cyber crime; Personal data protection;
    Electronic transactions; e-Signature / Certification;
    Cyber security.
Cyber security Initiatives for Africa
   CTOs Cyber security Forum 2011 aims to build on the
    achievements made in 2010 by encouraging a discourse on Cyber
    security between principal policy makers and ICT regulators from
    across the Commonwealth, particularly from Africa, with Global
    experts. The event will examine eight critical aspects of Cyber
    security:

       Protecting Government networks
       Protecting banking networks
       International Cooperation
       Protection of children online
       Security in the Cloud
       SPAM
       Identity theft and data protection
       Privacy on the Net
Cyber security Initiatives in Africa
   Mauritius adopted a holistic approach in ensuring
    cyber security as the country views ICT as a pillar of
    national development and plans to make the country a
    national ICT hub.
   The country’s National Information Security Strategic
    Plan is a part of the National Information
    Communication Technologies Strategic Plan 2007 –
    2011 and Mauritius has set up a comprehensive legal
    framework along with an implementation and
    institutional framework.
   Enforcement has been improved with the setting up of
    the Police Cyber crime unit in 2000 and the CERT-Mu
    in 2008.
Cyber security Initiatives in Africa
   The cyber security taskforce of East African
    Communications Organization (EACO) consisting of
    ICT Regulators and Operators of Kenya Uganda and
    Tanzania, Rwanda and Burundi, was formed in 2008
    to coordinate the development and of a cyber security
    management framework for the EACO region.

   It is tasked with establishment of national CERTs,
    coordinating responses to cyber security incidents at
    the regional level; establishing regional and
    international partnership; and providing Regional
    Cyber security Incident Reports annually to the EACO
    member countries.
Cyber security Initiatives in Africa

   Managing Cyber security in the EACO member
    countries is hampered by the lack of policy, legal and
    regulatory frameworks; lack of national security
    management frameworks; and limited cyber security
    awareness among other factors
Conclusions/Recommendations
   African governments are demonstrating increased
    awareness of cyber security issues, but existing
    capability to deter, monitor or pursue cyber security is
    relatively low. Efforts to promote cyber security should
    focus on the following:
   Create awareness and build capacity of key decision-
    makers to implement robust Cybersecurity
    frameworks
   Help identify resilient technical measures, appropriate
    organizational structures and strong laws and
    regulations
   Facilitate partnerships between different stakeholders
    to facilitate the flow of information, expertise and
    resources
   Promote international cooperation
Conclusions/Recommendations
    Efforts to promote cyber security in Africa should
      specifically target the following:

     Capacity Building
     International Cooperation
     Security for Mobile communications
      Establishment of Policy and Legal frameworks
      Protection of children online
      Security in the Cloud
      Identity theft and data protection
      Privacy on the Net
Thank You!!!

Prof Raymond Akwule
President, Digital Bridge Institute
 rakwule@dbieducation.org
 rakwule@yahoo.com




                                      16
Cybercrime and Cyber Security in the
           Information Society
   Types of Cybercrime
       Auction Fraud
       Auction Fraud — Romania
       Counterfeit Cashier's Check
       Credit Card Fraud
       Debt Elimination
       Parcel Courier Email Scheme
       Employment/Business Opportunities
       Escrow Services Fraud
       Identity Theft
       Internet Extortion
       Investment Fraud
       Lotteries
       Nigerian Letter or "419"
       Phishing/Spoofing
       Ponzi/Pyramid
       Reshipping
       Spam
       Third Party Receiver of Funds
       Telecom Fraud
Top Ten Countries (Cyber Crime
Perpetrators)
   2008
   1. United States 66.1%
   2. United Kingdom 10.5%
   3. Nigeria 7.5%
   4. Canada 3.1%
   5. China 1.6%
   6. South Africa 0.7%
   7. Ghana 0.6%
   8. Spain 0.6%
   9. Italy 0.5%
   10. Romania 0.5%
   2010
   1. United States 91.2%
   2. Canada 1.5%
   3. United Kingdom 1.0%
   4. Australia 0.7%
   5. India 0.5%
   6. South Africa 0.2%
   7. Germany 0.2%
   8. Mexico 0.2%
   9. France 0.2%
   10. Philippines 0.2%
                                 18
   FBI Reports

More Related Content

What's hot

[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017dotZADNA
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...Health IT Conference – iHT2
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sectorSeqrite
 

What's hot (20)

[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Cyber security
Cyber securityCyber security
Cyber security
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 

Similar to The Realities and Challenges of Cyber Crime and Cyber Security in Africa

Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceMoses Kemibaro
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023KharimMchatta
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 

Similar to The Realities and Challenges of Cyber Crime and Cyber Security in Africa (20)

Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

The Realities and Challenges of Cyber Crime and Cyber Security in Africa

  • 1. The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber Security and Global Affairs With focus on International Cyber Security Governance, Human Factors, Policies and Technologies DBH, Budapest, Hungary May 31 to Jun 2, 2011
  • 2. The Dilemma of the Information Society  The benefits of the Information Society are well known …  But the Information society has also created the new problems of Cyber Crime and Cyber Security
  • 3. Cybercrime and Cyber Security in the Information Society  Definition  Cybercrime -- all criminal offences which are committed with the aid of, or targeted at, communication devices in a network. This can be for example the Internet, the telephone line or the mobile network.
  • 4. Cybercrime and Cyber Security in the Information Society Why are Cyber Crimes on the Rise? 1. They are easy to learn how to commit; 2. They require few resources relative to the potential damage caused; 3. They can be committed in a jurisdiction without being physically present in it; 4. They are often not clearly illegal.
  • 5. Issues and Challenges of Cyber security in Africa  Internet penetration is still relatively low but it is growing in Africa  Broadband penetration is very low  Mobile Telecommunications is growing exponentially
  • 6. Issues and Challenges of Cyber Security in African  Increasingly more Cybercrimes are perpetrated through mobile phones  Social networking is on the rise and increasingly cybercrimes are perpetrated through the social networks (facebook, etc)  Cyber criminals target people inside and outside their national boundaries
  • 7. Issues and Challenges of Cyber Security in African  Cloud computing is just being introduced into the continent but it has met with a lot of skepticism.  Uncertainty about cloud security is evident in a Global Risk Survey by IBM’s Institute for Business Value, with 77% of respondents believing cloud made protecting privacy more difficult and 50% expressing worries about data breach or loss. In a further IBM survey 66% cite security as their top concern when considering cloud.  The good news is that enterprises and governments around the world are addressing cloud’s privacy, authentication and security issues, and turning the promise of cloud computing into reality .
  • 8. Cyber Security Initiatives in Africa  The United Nations Economic Commission for Africa (UNECA) is addressing cyber security within the framework of African Information Society Initiative (AISI). It advocates coherent and coordinated continental and regional approach to cyber security, as well as enhanced consideration of the issue in national ICT and Information Society strategies and action plans.
  • 9. Cyber security Initiatives in Africa  According to the UNECA, African governments are demonstrating increased awareness of cyber security issues, but existing capability to deter, monitor or pursue cyber security is relatively low. The UNECA cyber security initiative is implemented in cooperation with the African Union in order to arrive at harmonized legal framework, and especially with guidelines on: Cyber crime; Personal data protection; Electronic transactions; e-Signature / Certification; Cyber security.
  • 10. Cyber security Initiatives for Africa  CTOs Cyber security Forum 2011 aims to build on the achievements made in 2010 by encouraging a discourse on Cyber security between principal policy makers and ICT regulators from across the Commonwealth, particularly from Africa, with Global experts. The event will examine eight critical aspects of Cyber security:  Protecting Government networks  Protecting banking networks  International Cooperation  Protection of children online  Security in the Cloud  SPAM  Identity theft and data protection  Privacy on the Net
  • 11. Cyber security Initiatives in Africa  Mauritius adopted a holistic approach in ensuring cyber security as the country views ICT as a pillar of national development and plans to make the country a national ICT hub.  The country’s National Information Security Strategic Plan is a part of the National Information Communication Technologies Strategic Plan 2007 – 2011 and Mauritius has set up a comprehensive legal framework along with an implementation and institutional framework.  Enforcement has been improved with the setting up of the Police Cyber crime unit in 2000 and the CERT-Mu in 2008.
  • 12. Cyber security Initiatives in Africa  The cyber security taskforce of East African Communications Organization (EACO) consisting of ICT Regulators and Operators of Kenya Uganda and Tanzania, Rwanda and Burundi, was formed in 2008 to coordinate the development and of a cyber security management framework for the EACO region.  It is tasked with establishment of national CERTs, coordinating responses to cyber security incidents at the regional level; establishing regional and international partnership; and providing Regional Cyber security Incident Reports annually to the EACO member countries.
  • 13. Cyber security Initiatives in Africa  Managing Cyber security in the EACO member countries is hampered by the lack of policy, legal and regulatory frameworks; lack of national security management frameworks; and limited cyber security awareness among other factors
  • 14. Conclusions/Recommendations  African governments are demonstrating increased awareness of cyber security issues, but existing capability to deter, monitor or pursue cyber security is relatively low. Efforts to promote cyber security should focus on the following:  Create awareness and build capacity of key decision- makers to implement robust Cybersecurity frameworks  Help identify resilient technical measures, appropriate organizational structures and strong laws and regulations  Facilitate partnerships between different stakeholders to facilitate the flow of information, expertise and resources  Promote international cooperation
  • 15. Conclusions/Recommendations Efforts to promote cyber security in Africa should specifically target the following:  Capacity Building  International Cooperation  Security for Mobile communications  Establishment of Policy and Legal frameworks  Protection of children online  Security in the Cloud  Identity theft and data protection  Privacy on the Net
  • 16. Thank You!!! Prof Raymond Akwule President, Digital Bridge Institute  rakwule@dbieducation.org  rakwule@yahoo.com 16
  • 17. Cybercrime and Cyber Security in the Information Society  Types of Cybercrime  Auction Fraud  Auction Fraud — Romania  Counterfeit Cashier's Check  Credit Card Fraud  Debt Elimination  Parcel Courier Email Scheme  Employment/Business Opportunities  Escrow Services Fraud  Identity Theft  Internet Extortion  Investment Fraud  Lotteries  Nigerian Letter or "419"  Phishing/Spoofing  Ponzi/Pyramid  Reshipping  Spam  Third Party Receiver of Funds  Telecom Fraud
  • 18. Top Ten Countries (Cyber Crime Perpetrators)  2008  1. United States 66.1%  2. United Kingdom 10.5%  3. Nigeria 7.5%  4. Canada 3.1%  5. China 1.6%  6. South Africa 0.7%  7. Ghana 0.6%  8. Spain 0.6%  9. Italy 0.5%  10. Romania 0.5%  2010  1. United States 91.2%  2. Canada 1.5%  3. United Kingdom 1.0%  4. Australia 0.7%  5. India 0.5%  6. South Africa 0.2%  7. Germany 0.2%  8. Mexico 0.2%  9. France 0.2%  10. Philippines 0.2% 18  FBI Reports