THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE

  • I. R. Saidu
  • T. Suleiman
  • U. E. Akpan
Keywords: cyberspace, cybersecurity, cyberthreat, threat intelligence, data overload and privacy

Abstract

This research work was conducted to examine critically and systematically cyber threat intelligence challenges and prospects in Nigeria. It judges the value and relevance of cyber threat intelligence in the society where they are lacking in providing necessary information. Dealing with these challenges that may cause threat intelligence to be useless has become a major concern to Nigeria. The work was intended to achieve the following objectives: to examine the nature of cybersecurity in Nigeria, to analyse the cybersecurity threats that can disrupt the functioning of the country, to identify the challenges facing the Nigeria cyberspace and the conduct of a cyber threat intelligence analysis, to discuss the means by which cyber threat can be used to boost Nigeria’s National Security Policy, to make recommendations to preserve important intelligence capabilities while ensuring the protection of its critical infrastructures through the use of threat intelligence. The scope of the study was limited to the period 2009 – 2019. The research was analytical. Relevant data were collected from both primary and secondary sources of data. The data analysis used the percentage instrument and the following conclusions were drawn: that threat data overload, threat data quality, privacy and legal issues and interoperability issues are some of the challenges of cyber threat intelligence; also, the need to continually invest in research, build local cyber threat management infrastructure and enhance the ability to anticipate, detect, respond and contain information security threats is very crucial. Nigeria 

References

Ajayi, K. (2015). Intelligence Data Sources Methods and Problems. Ado - Ekiti, Ekiti: Intelligence and Security Studies Programme.

Akiyode-Lawanson, J. (2019, March 09). Cybercrime: Nigeria ranks 3rd most attacked country in Africa. Retrieved October 08, 2019, from Businessday NG: https://businessday.ng/technology/article/cybercrime-nigeria-ranks-3rd-most-attacked-country-in-africa/

Akpan, U. E. (2019). An Argumentative Review Essay on the Conceptualization and Definition of Cyber Security Synthesizing a Proprietary Definition of Cyber Security. Kaduna: Unpublished.

Aladenusi, T. (2018). 2018 Nigeria Cybersecurity Outlook [Online]. Retrieved September 25, 2019, from Deloitte Nigeria: https://www2.deloitte.com/ng/en/pages/risk/articles/2018_nigeria_cybersecurity_outlook.html#

Aladenusi, T., & Olukoju, A. (2016). 2016 Nigeria Cybersecurity Outlook. Retrieved September 26, 2019, from Deloitte Nigeria: http://www2.deloitte.com/ng/en/pages/risk/articles/2016-nigeria-cybersecurity-outlook.html

Aniche, D.C.P. (2019). General Introduction to Cybersecurity. Kaduna: Unpublished.

Bureau of Justice Statistics, U.S. Dept. of Justice. (1989). Computer Crime: Criminal Justice Resource Manual.

Buzan, B. &. (2013). Regions and powers: the structure of international security. Cambridge: Cambridge University Press.

Buzan, B., Waever, O., & Wilde, J. (2013). Security a new framework for analysis. Boulder, CO: Lynne Rienner.

CIS. (2017, April 24). What is Cyber Threat Intelligence? Retrieved September 28, 2019, from CIS: https://www.cisecurity.org/blog/what-is-cyber-threat-intelligence/

Deloitte. (2019). Cyber 101 | Deloitte SEA | Risk Advisory. Retrieved October 11, 2019, from Deloitte Singapore: https://www2.deloitte.com/sg/en/pages/risk/articles/cyber-101.html

Denardis, L. (2014). The Internet Governance Oxymoron. The Global War for Internet Governance, 1-32. DOI:10.12987/yale/9780300181357.003.0001

Digital-Guardian. (2019, July 15). What is Cyber Security? Definition, Best Practices & More. Retrieved September 28, 2019, from Digital Guardian: https://digitalguardian.com/blog/what-cyber-security

DOD, J. C. (2016). Department of Defense Dictionary of Military and Associated Terms. Washington: Joint Publication 1-02.

ENISA. (2019, September 19). National Cybersecurity Strategies. Retrieved September 28, 2019, from ENISA: https://www.enisa.europa.eu/topics/national-cyber-security-strategies

Fireeye. (2019). FireEye Threat Intelligence. [online]. Retrieved September 25, 2019, from FireEye.com: https://www.fireeye.com/solutions/cyber-threat-intelligence.html

Gercke, M. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. Geneva, Geneva, Switzerland. Retrieved October 08, 2019, from www.itu.int/ITU-D/cyb/cybersecurity/legislation.html

Hallingstad, G., & Dandurand, L. (2010). Cyber Defence Capability Framework. The Hague: NATO C3 Agency.

Hansel, M. (2013, June 27). Cyber Security Governance and the Theory of Public Goods. Retrieved from E: https://www.e-ir.info/2013/06/27/cyber-security-governance-and-the-theory-of-public-goods/

Ibikunle, F., & Eweniyi, O. (2013). Approach to Cyber Security Issues in Nigeria: Challenges and Solution. International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE), 1(1), 1-11. Retrieved September 25, 2019

Idom, A. M., & Ugal, D. B. (2016). Influence of ICT competence on cybercrimes in selected cities of the six geo-political zones in Nigeria. FULafia Journal of Humanities and Social Sciences, 1(1), 220 - 241. Retrieved September 25, 2019

Marzoni, D. (2019, January). IT Law: Lawyer: Dmitriy Marzoni: +38097-44444-55. Retrieved December 30, 2019, from Lawyer: https://www.dmlawyer.top/it-law/

Morgenthau, H. (2012). Politics among Nations: the Struggle for Power and Peace. (K. Thompson, Ed.) New Delhi: Kalyani.

Odinma, A. C. (2010). Cybercrime & Cert: Issues & Probable Policies for Nigeria. DBI Presentation.

Oforji, J. C., Udensi, E. J., & Ibegbu, K. C. (2017). Cybersecurity Challenges in Nigeria: The Way Forward. SosPoly Journal of Science & Agriculture, 2, 1-5.

Okoli, A. C. (2013). 'Rebranding Nigeria' as a Reputation Management Drive: Implications for National Image. Journal of Communication and Media Research, 5(2), 81 - 87.

Okoli, A. l., & Idom, A. M. (2018). The Internet and National Security in Nigeria: A Threat - Import Discourse. Covenant University Journal of Politics & International Affairs, 6(1), 1. Retrieved September 25, 2019

Okonigene, R. E., & Adekanle, B. (2009). Cybercrime In Nigeria. Business Intelligence Journal.

Olubayo, A. (n.d.). Cybersecurity: Africa's Next Challenge. Retrieved September 26, 2019, from Linkedin.com: http://www.linkedin.com/pulse/20140722215101-5180516-cybersecurity-africa-s-next-challenge

Olugbile, S. (2019). Overview of Nigeria Cybersecurity Readiness. Retrieved October 09, 2019, from Aficta.africa: https://aficta.africa/images/stories/roundtable/overview-of-nigeria-cybersecurity.pdf

Omale, D. J., & Idom, A. M. (2016). Fibre optics technology and cybercrimes in Calabar Metropolis, Nigeria. International Journal of Social Relevance & Concern, 4(4), 1 - 15. Retrieved September 25, 2019, from www.ijournals.in/ijsrc

ONSA, (2014). National Coordinator for Security and Counterterrorism. Nigeria: National Cyber Security Strategy.

Osho, O., & Onoja, A. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), 120 - 143. doi:001:10.5281/ZENODO.22390

PaloAlto. (2016). New from Unit 42. Retrieved October 11, 2019, from The Insider Report November 2016 - Palo Alto Networks: https://www.paloaltonetworks.com/customers/customer-newsletter/the-insider-report-november-2016

RecordedFuture. (2019). What is Threat Intelligence? Retrieved September 25, 2019, from Recorded Future: https://www.recordedfuture.com/threat-intelligence/

Roehrs, P. (2005). Weak States And Implications For Regional Security: A Case Study Of Georgian Instability And Caspian Regional Insecurity. Athens: Research Institute For European And American Studies, RIEAS.

Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019

Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019

SuperUser. (2017). Nigeria Faces Greatest Cyber Security Threat Ever In 2017. Retrieved October 11, 2019, from Stop. Think. Connect. | Nigeria: https://stopthinkconnect.ng/index.php/blog/item/23-nigeria-faces-greatest-cyber-security-threat-ever-in-2017

Techopedia.com. (n.d.). What is Cyber Defense? - Definition from Techopedia. Retrieved September 28, 2019, from Techopedia.com: https://www.techopedia.com/definition/6705/cyber-defense

Underwood, K. (2018, August 30). Cyber Threat Intelligence Leader Warns of Changing Nature of Attacks [Online]. Retrieved September 25, 2019, from AFCEA International: https://www.afcea.org/content/cyber-threat-intelligence-leader-warns-changing-nature-attacks

UNECA, U. N. (2014). Tackling the challenges of Cybersecurity in Africa. Retrieved from Tackling the challenges of cybersecurity in Africa | United Nations Economic Commission for Africa: https://www.uneca.org/publications/tackling-challenges-cybersecurity-africa

Published
2021-06-25
How to Cite
SaiduI. R., SuleimanT., & AkpanU. E. (2021). THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE. FUDMA JOURNAL OF SCIENCES, 5(1), 193 - 201. https://doi.org/10.33003/fjs-2021-0501-554

Most read articles by the same author(s)