THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE
Abstract
This research work was conducted to examine critically and systematically cyber threat intelligence challenges and prospects in Nigeria. It judges the value and relevance of cyber threat intelligence in the society where they are lacking in providing necessary information. Dealing with these challenges that may cause threat intelligence to be useless has become a major concern to Nigeria. The work was intended to achieve the following objectives: to examine the nature of cybersecurity in Nigeria, to analyse the cybersecurity threats that can disrupt the functioning of the country, to identify the challenges facing the Nigeria cyberspace and the conduct of a cyber threat intelligence analysis, to discuss the means by which cyber threat can be used to boost Nigeria’s National Security Policy, to make recommendations to preserve important intelligence capabilities while ensuring the protection of its critical infrastructures through the use of threat intelligence. The scope of the study was limited to the period 2009 – 2019. The research was analytical. Relevant data were collected from both primary and secondary sources of data. The data analysis used the percentage instrument and the following conclusions were drawn: that threat data overload, threat data quality, privacy and legal issues and interoperability issues are some of the challenges of cyber threat intelligence; also, the need to continually invest in research, build local cyber threat management infrastructure and enhance the ability to anticipate, detect, respond and contain information security threats is very crucial. Nigeria
References
Ajayi, K. (2015). Intelligence Data Sources Methods and Problems. Ado - Ekiti, Ekiti: Intelligence and Security Studies Programme.
Akiyode-Lawanson, J. (2019, March 09). Cybercrime: Nigeria ranks 3rd most attacked country in Africa. Retrieved October 08, 2019, from Businessday NG: https://businessday.ng/technology/article/cybercrime-nigeria-ranks-3rd-most-attacked-country-in-africa/
Akpan, U. E. (2019). An Argumentative Review Essay on the Conceptualization and Definition of Cyber Security Synthesizing a Proprietary Definition of Cyber Security. Kaduna: Unpublished.
Aladenusi, T. (2018). 2018 Nigeria Cybersecurity Outlook [Online]. Retrieved September 25, 2019, from Deloitte Nigeria: https://www2.deloitte.com/ng/en/pages/risk/articles/2018_nigeria_cybersecurity_outlook.html#
Aladenusi, T., & Olukoju, A. (2016). 2016 Nigeria Cybersecurity Outlook. Retrieved September 26, 2019, from Deloitte Nigeria: http://www2.deloitte.com/ng/en/pages/risk/articles/2016-nigeria-cybersecurity-outlook.html
Aniche, D.C.P. (2019). General Introduction to Cybersecurity. Kaduna: Unpublished.
Bureau of Justice Statistics, U.S. Dept. of Justice. (1989). Computer Crime: Criminal Justice Resource Manual.
Buzan, B. &. (2013). Regions and powers: the structure of international security. Cambridge: Cambridge University Press.
Buzan, B., Waever, O., & Wilde, J. (2013). Security a new framework for analysis. Boulder, CO: Lynne Rienner.
CIS. (2017, April 24). What is Cyber Threat Intelligence? Retrieved September 28, 2019, from CIS: https://www.cisecurity.org/blog/what-is-cyber-threat-intelligence/
Deloitte. (2019). Cyber 101 | Deloitte SEA | Risk Advisory. Retrieved October 11, 2019, from Deloitte Singapore: https://www2.deloitte.com/sg/en/pages/risk/articles/cyber-101.html
Denardis, L. (2014). The Internet Governance Oxymoron. The Global War for Internet Governance, 1-32. DOI:10.12987/yale/9780300181357.003.0001
Digital-Guardian. (2019, July 15). What is Cyber Security? Definition, Best Practices & More. Retrieved September 28, 2019, from Digital Guardian: https://digitalguardian.com/blog/what-cyber-security
DOD, J. C. (2016). Department of Defense Dictionary of Military and Associated Terms. Washington: Joint Publication 1-02.
ENISA. (2019, September 19). National Cybersecurity Strategies. Retrieved September 28, 2019, from ENISA: https://www.enisa.europa.eu/topics/national-cyber-security-strategies
Fireeye. (2019). FireEye Threat Intelligence. [online]. Retrieved September 25, 2019, from FireEye.com: https://www.fireeye.com/solutions/cyber-threat-intelligence.html
Gercke, M. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. Geneva, Geneva, Switzerland. Retrieved October 08, 2019, from www.itu.int/ITU-D/cyb/cybersecurity/legislation.html
Hallingstad, G., & Dandurand, L. (2010). Cyber Defence Capability Framework. The Hague: NATO C3 Agency.
Hansel, M. (2013, June 27). Cyber Security Governance and the Theory of Public Goods. Retrieved from E: https://www.e-ir.info/2013/06/27/cyber-security-governance-and-the-theory-of-public-goods/
Ibikunle, F., & Eweniyi, O. (2013). Approach to Cyber Security Issues in Nigeria: Challenges and Solution. International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE), 1(1), 1-11. Retrieved September 25, 2019
Idom, A. M., & Ugal, D. B. (2016). Influence of ICT competence on cybercrimes in selected cities of the six geo-political zones in Nigeria. FULafia Journal of Humanities and Social Sciences, 1(1), 220 - 241. Retrieved September 25, 2019
Marzoni, D. (2019, January). IT Law: Lawyer: Dmitriy Marzoni: +38097-44444-55. Retrieved December 30, 2019, from Lawyer: https://www.dmlawyer.top/it-law/
Morgenthau, H. (2012). Politics among Nations: the Struggle for Power and Peace. (K. Thompson, Ed.) New Delhi: Kalyani.
Odinma, A. C. (2010). Cybercrime & Cert: Issues & Probable Policies for Nigeria. DBI Presentation.
Oforji, J. C., Udensi, E. J., & Ibegbu, K. C. (2017). Cybersecurity Challenges in Nigeria: The Way Forward. SosPoly Journal of Science & Agriculture, 2, 1-5.
Okoli, A. C. (2013). 'Rebranding Nigeria' as a Reputation Management Drive: Implications for National Image. Journal of Communication and Media Research, 5(2), 81 - 87.
Okoli, A. l., & Idom, A. M. (2018). The Internet and National Security in Nigeria: A Threat - Import Discourse. Covenant University Journal of Politics & International Affairs, 6(1), 1. Retrieved September 25, 2019
Okonigene, R. E., & Adekanle, B. (2009). Cybercrime In Nigeria. Business Intelligence Journal.
Olubayo, A. (n.d.). Cybersecurity: Africa's Next Challenge. Retrieved September 26, 2019, from Linkedin.com: http://www.linkedin.com/pulse/20140722215101-5180516-cybersecurity-africa-s-next-challenge
Olugbile, S. (2019). Overview of Nigeria Cybersecurity Readiness. Retrieved October 09, 2019, from Aficta.africa: https://aficta.africa/images/stories/roundtable/overview-of-nigeria-cybersecurity.pdf
Omale, D. J., & Idom, A. M. (2016). Fibre optics technology and cybercrimes in Calabar Metropolis, Nigeria. International Journal of Social Relevance & Concern, 4(4), 1 - 15. Retrieved September 25, 2019, from www.ijournals.in/ijsrc
ONSA, (2014). National Coordinator for Security and Counterterrorism. Nigeria: National Cyber Security Strategy.
Osho, O., & Onoja, A. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), 120 - 143. doi:001:10.5281/ZENODO.22390
PaloAlto. (2016). New from Unit 42. Retrieved October 11, 2019, from The Insider Report November 2016 - Palo Alto Networks: https://www.paloaltonetworks.com/customers/customer-newsletter/the-insider-report-november-2016
RecordedFuture. (2019). What is Threat Intelligence? Retrieved September 25, 2019, from Recorded Future: https://www.recordedfuture.com/threat-intelligence/
Roehrs, P. (2005). Weak States And Implications For Regional Security: A Case Study Of Georgian Instability And Caspian Regional Insecurity. Athens: Research Institute For European And American Studies, RIEAS.
Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019
Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019
SuperUser. (2017). Nigeria Faces Greatest Cyber Security Threat Ever In 2017. Retrieved October 11, 2019, from Stop. Think. Connect. | Nigeria: https://stopthinkconnect.ng/index.php/blog/item/23-nigeria-faces-greatest-cyber-security-threat-ever-in-2017
Techopedia.com. (n.d.). What is Cyber Defense? - Definition from Techopedia. Retrieved September 28, 2019, from Techopedia.com: https://www.techopedia.com/definition/6705/cyber-defense
Underwood, K. (2018, August 30). Cyber Threat Intelligence Leader Warns of Changing Nature of Attacks [Online]. Retrieved September 25, 2019, from AFCEA International: https://www.afcea.org/content/cyber-threat-intelligence-leader-warns-changing-nature-attacks
UNECA, U. N. (2014). Tackling the challenges of Cybersecurity in Africa. Retrieved from Tackling the challenges of cybersecurity in Africa | United Nations Economic Commission for Africa: https://www.uneca.org/publications/tackling-challenges-cybersecurity-africa
Copyright (c) 2021 FUDMA JOURNAL OF SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences