{"id":8214,"date":"2021-11-26T21:55:33","date_gmt":"2021-11-26T20:55:33","guid":{"rendered":"https:\/\/globalfraudforensics.com\/fraudxpose\/?p=8214"},"modified":"2021-11-26T21:55:33","modified_gmt":"2021-11-26T20:55:33","slug":"cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state","status":"publish","type":"post","link":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/","title":{"rendered":"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE)"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1\" width=\"456\" height=\"679\" alt=\"20211126_050446.jpg\" style=\"display:inline-block\" \/><\/a> <\/p><p>Abstract<br \/>\nWith increasing access to internet and online resources in Nigeria, an exponential increase is observed in the rate of cybercrimes<br \/>\nin Nigeria. Cybercrime rates increase geometrically, hence, giving Nigeria notoriety as a nation with a highly insecure<br \/>\ncyberspace. In this Seminar Paper as a Subject Matter Expert (SME) with over 19 years wealth of knowledge and experience, I<br \/>\nwill be highlighting some of the most pressing contemporary challenges in cybersecurity as it affects the management of<br \/>\ncontemporary complex security challenges in Nigeria and to offer recommendations and solutions for the future. And as internet<br \/>\nconnectivity continues to spread, my belief is that this Seminar Paper will offer readers greater awareness of the threats of<br \/>\ntomorrow\u2014and serve to inform public debate into the next information age.<br \/>\nIntroduction<br \/>\nNigeria like several other countries across the globe is currently witnessing a surge in digital digital transformation. Many<br \/>\nactivities are now migrating to the internet especially with advent of covid-19 pandemic and the emergence of new technologies.<br \/>\nConsequently, Nigeria cyberspace has become a centre-stage for new business innovations, government functions, and social<br \/>\ninteractions. This trend has created an opportunity for the country to realign it priorities and articulates effort towards attaining<br \/>\nof national objectives. The current attributes of cyberspace also pave the requisite path for the adoption of technologies,<br \/>\ndismantling of barriers to commerce, reinforcement of economic posture and enhancement of seamless competition across<br \/>\nborders. The opportunities offered by cyberspace revolution also creates a platform for the enhancement of effective<br \/>\nsynchronization of effort of intelligence, security and defence communities towards addressing the mirage of security challenges<br \/>\nconfronting the country.<br \/>\nHowever, the increased dependence on cyberspace comes with risk that have significant national security and economic<br \/>\nimplications. The dynamic nature of cyber threats and the constantly evolving tactics of perpetrators of cybercrime pose serious<br \/>\nrisks to business, commercial and financial activities which are all now extensively reliant on cyberspace. These cyber threats<br \/>\nalso constitute hazards to everyday user of cyberspace which cut across government establishments, private sector and the<br \/>\ngeneral populace. Furthermore, these threats have the potential to compromise critical network systems leading to distortions of<br \/>\nessential services. In most cases these disruptions are created by individuals or group using arrays of malicious activities and<br \/>\nattack motivated by financial gains, anti-government or terrorist related activities thus challenging the confidentiality, integrity<br \/>\nand availability (CIA) of data in Nigerian cyber space.<br \/>\nIn a bid to address these multi-faceted cyber threats and embolden the country for efficient and progressive use of cyber domain<br \/>\nthe Federal Government of Nigeria (FGN) through the Office of National Security Adviser (ONSA), undertook several practical<br \/>\nsteps to draw the necessary cybersecurity roadmap for Nigeria. In this light, the National Cybersecurity Policy and Strategy<br \/>\n2014 was developed to provide direction for the mainstream Nigerian\u2019s National Cybersecurity Program and set the path for<br \/>\neffective coordination of activities of all relevant stakeholders across government, academia and the private sector to handle the<br \/>\ndynamism of security threats in the cyber domain. The Cybercrimes (Prohibition, Prevention etc.) Act 2015 was also developed<br \/>\nand signed into law as the legal and regulatory framework for implementation and governance of national cybersecurity in the<br \/>\ncountry. However, in view of emergent nature of cyber threats as well as constantly evolving technological and socio-economic<br \/>\nimperative that depends on cyber domain, provisions were made for the review of the national cybersecurity policy and strategy<br \/>\nevery 5years in line with global best practices. The focus was also to hinge on the significant progress in cybersecurity made by<br \/>\nthe country between 2014 and 2021 while also realigning the efforts with objectives of Nigeria\u2019s National Security Strategy<br \/>\n2019.<br \/>\nCybersecurity and Cybercrime in Nigeria<br \/>\nThe words Cybersecurity and Cybercrime are used interchangeably. Computer crime can broadly be defined as criminal activity<br \/>\ninvolving an information technology infrastructure: including illegal access or unauthorized access; illegal interception that<br \/>\ninvolves technical means of non-public transmissions of computer data to, from or within a computer system; data interference<br \/>\nthat include unauthorized damaging, deletion, deterioration, alteration or suppression of computer data; systems interference<br \/>\nthat is interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating,<br \/>\naltering or suppressing computer data; misuse of devices, forgery (ID theft), and electronic fraud. The advent of digital<br \/>\ntechnology gave birth to modern communication hard-wares, internet service and powerful computer systems to process data.<br \/>\nHence, cyberspace has provided a safe haven for internet platform, which has created geometric growth and accelerated windows<br \/>\nof opportunities for businesses and the removal of economic barriers hitherto faced by nations of the world. People from diverse<br \/>\nareas of human endeavour can now freely access and utilize the advantages offered by internet platform. However, information<br \/>\ntechnology revolution associated with the internet in Nigeria has brought about a new wave of crime. A very few criminally<br \/>\nminded youths in the country, who are mostly not educated or graduates, are stealing and committing atrocity through the aid<br \/>\nof the internet online business transactions. The internet online business services, which ordinarily supposed to be a blessing as<br \/>\nit exposes one to a lot of opportunities in various field of life is fast becoming a source of discomfort and worry due to the<br \/>\natrocity being perpetrated through it. Cybercrime has come as a surprise and a strange phenomenon that for now live with us in<br \/>\nNigeria. Computer crimes encompass a broad range of potentially illegal activities. Generally, it may be categorized into two<br \/>\nmajor groups: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or<br \/>\ndevices, the primary target of which is independent of the computer network or device. Nigeria was recently identified as the<br \/>\ninnocent and ignorant passive player in cyberspace knowledge Olympiad. The capture of Al Qaeda\u2019s operative, Muhammad<br \/>\nNaeem Noor Khan, provided the Pakistani and American Intelligence Authority with some of Al Qaeda\u2019s Internet.<\/p>\n<blockquote><p>Communication Strategy. It also identified that Nigerian Websites and Email System were used by Al Qaeda to disseminate<br \/>\ninternet information. This has once again brought up the pertinent questions of the safety and security of Nigeria\u2019s national<br \/>\ncyberspace. This paper therefore addresses issues that deals with cybercrime based on false pretence or impersonation. An area<br \/>\nthat is likely to be fertile to the cyber criminals also called \u201cyahoo boys\u201d is the stock exchange market. Proper mechanism needs<br \/>\nto be put in place to control the activities of these criminals in this area otherwise Nigeria economy may be brought down,<br \/>\nparticularly with trading on the country\u2019s stock exchange market going online. Without proper security methods in place, it is<br \/>\njust like building a house without locks. Any person can gain access. The category and nature of cybercrime in Nigeria is<br \/>\nendless. Cybercrime is a global phenomenal that is threatening the economy of nations. It is a major threat in India as it is in<br \/>\nNigeria. Punjab National Bank suffered a loss of close to Rs. 1. 39 chores when the computer recorders were manipulated to<br \/>\ncreate false debits and credits. In bank of Baroda, Rs 2.5 lakh was misappropriated through the computerized creation of false<br \/>\nbank accounts. In Mahanager Telephone Nigam Limited (MTNL) in Delhi, a junior telecom official was charged for reversing<br \/>\nelectronic telephone meter system thereby allowing some commercials export houses to make overseas calls without the charges<br \/>\nbeing directed to their telephone numbers.<br \/>\nUnderstanding Cybercrime in Nigeria<br \/>\nThe internet as an instrument to aid crime ranges from business espionage, to banking fraud, obtaining un-authorized and<br \/>\nsabotaging data in computer networks of some key organizations. Prevention of cybercrime requires the co-operation of all the<br \/>\ncitizens and not necessarily the police alone who presently lack specialists in its investigating units to deal with cybercrime. The<br \/>\neradication of this crime is crucial in view of the devastating effect on the image of Nigeria and the attendant consequence on<br \/>\nthe economy.<br \/>\nMaterials and Methods Used in Cybercrime<br \/>\nTechnology has integrated nations and the world has become a global village. The economy of most nations in the world is<br \/>\naccessible through the aid of electronic via the internet. Since the Electronic market is opened to everybody it also includes<br \/>\neavesdroppers and criminals. False pretence, finds a fertile ground in this situation. Some perpetrators of this crime usually<br \/>\nreferred to in Nigeria as \u201cyahoo boys\u201d are taking advantage of e-commerce system available on the internet to defraud<br \/>\nunsuspected victims who are mostly foreigners thousands and sometimes millions of dollars. They fraudulently represent<br \/>\nthemselves as having particular goods to sell or that they are involved in a loan scheme project. They may even pose to have<br \/>\nfinancial institution where money can be loaned out to prospective investors. In this regard, so many persons have become a<br \/>\nduped. Merchants who take orders from merchandise on credit are also facing mounting losses from rip offs. Our investigation<br \/>\nrevealed that \u201cyahoo boys\u201d also take undue advantage of some people that are looking for spouse through the aid of Internet.<br \/>\nThese criminally minded individuals usually have discussion with their victims via the internet. These criminals pretend to be<br \/>\ninterested and loving. And before the victim realizes what is happening, the criminals would have succeeded in cajoling them<br \/>\nto send some dollars to enable them to facilitate traveling documents. These criminals falsify document and tell all sort of lies<br \/>\nto get money from their victims, when their victims begin to suspect foul play, they will immediately stop interacting with them<br \/>\nand shift their target elsewhere. Cybercrime in Nigeria is difficult to prove as it lacks the traditional paper audit trail, which<br \/>\nrequires the knowledge of specialists in computer technology and internet protocols. Specific computer crimes are Spam, Fraud,<br \/>\nObscene or offensive content, Harassment, Drug trafficking, and Cyberterrorism.<br \/>\nExtant Laws to Combat Cybercrime in Nigeria- Presently, in Nigeria there is no specific law to combat cybercrime. The<br \/>\ncriminals are just operating freely without any specific law to checkmate their illicit activities. However, there are laws though<br \/>\nnot directly related to cybercrimes but in a way can to a limited extent be used to deal with this issue. These laws are: Economic<br \/>\nand Financial Crimes Commission (Establishment) ACT 2004, Nigerian Criminal Code. The activities of the \u201cYahoo boys\u201d are<br \/>\nsabotage on the economy of the country. To this extend it constitute economic crimes which Economic and Financial Crimes<br \/>\nCommission (Establishment) Act can deal with. Economic crime is defined as; \u201cthe non- violent criminal and illicit activity<br \/>\ncommitted with the objectives of earning wealth illegally either individually or in a group or organized manner thereby violating<br \/>\nexisting legislation governing the economic activities of government and its administration to includes any form of fraud,<br \/>\nnarcotic drug trafficking, money laundering embezzlement, bribery, looting and any form of corrupt malpractices, illegal arms<br \/>\ndeal, smuggling, human trafficking and child labour, oil bunkering and illegal mining, tax evasion, foreign exchange<br \/>\nmalpractices including counterfeiting of currency, theft of intellectual property and policy, open market abuse dumping of toxic<br \/>\nwastes and prohibited goods e.t.c\u201d. The other available law is the Nigeria criminal code, which can also presently be used to<br \/>\nprosecute these criminals. Most of the activities of these criminals bother on false pretences and cheating which sections 419<br \/>\nand 421 of the Nigerian Criminal Code prohibits respectively. Section 418 defines obtaining property by false pretence as<br \/>\nfollows; \u201cAny representation made by words, writing, or conduct, of a matter of fact, either past or present, which representation<br \/>\nof false in fact and which the other person making it knows to be false or does not believe to be true, is a false pretence\u201d.<br \/>\nSection 419, provides as follows; \u201cAny person who by any pretence, and with intent to defraud, obtains from any other person<br \/>\nanything capable of being stolen, or induces any other person to deliver to any person anything capable of being stolen, is guilty<br \/>\nof a felony, and is liable to imprisonment for three years\u201d. \u201cIf the thing is of the value of one thousand naira or upward, he is<br \/>\nliable to imprisonment for seven years\u201d. \u201cIt is immaterial that the thing is obtained by or its delivery is induced through the<br \/>\nmedium of contract induced by the false pretence. The offender cannot be arrested without warrant unless found committing the offence.\u201d The definition of economic crime referred to above is all embracing. It means the jurisdiction of the Commission<br \/>\ncovers a wide range of criminal activities including fraud. Fraud, the noun variant of fraudulently, is<br \/>\n(i) an action or a conduct consisting in a knowing representation made with intention that the person receiving that<br \/>\nmisrepresentation should act on it<br \/>\n(ii) the misrepresentation resulting in the action or a conduct;<br \/>\n(iii) an action or a conduct in a representation made with the intention that the person receiving that misrepresentation should<br \/>\nact on it and so on and so forth.<br \/>\nDespite the effort of the commission in this regard, it has been difficult to actually bring these boys to book in view of the<br \/>\ncomplexity of the nature of the crime and investigation that needs to be carried out for proper prosecution of a culprit o this<br \/>\ncrime. Flowing from the provision of section 419, false pretence means; knowingly obtaining another person\u2019s property by<br \/>\nmeans of a misrepresentation of facts with intends to defraud. Nigeria is a place where computer can be used to commit all sorts<br \/>\nof crimes without prosecution, as there is no law on cybercrime. The Nigerian police simply lack Internet policing capability.<br \/>\nNigerian law enforcement agencies are basically technology illiterate, they lack computer forensics training and often result to<br \/>\nconducting police raids on Internet service site mainly for the purpose of extortion. It is very common for the police to demand<br \/>\nbribe from cybercaf\u00e9 operators that owns sites where suspicious activities are taking place and look the other way. There are so<br \/>\nmany reports on Nigeria cybercrime situations that well-meaning Nigerians are no longer comfortable with anymore. These<br \/>\nreports are damaging the dignity of our country as a sovereign nation. They are humiliating and injuriously affecting our<br \/>\ninternational image, our business, our mental \u2013 psychology and even our children. However, these reports points towards the<br \/>\nfact that Nigeria is operating on a weakened technology platform and digitally illiterate environment that is in urgent need of<br \/>\nexpert solution.<br \/>\nRoot Cause of Cyber insecurity in Nigeria<br \/>\n\u2212 Poor Promotion of recruitment, training, upgrade in technical skills and development of cyber security personnel in Nigeria.<br \/>\nThis root cause results in shortage of security agents with top notch skills to trail apprehend investigate prosecute and punish<br \/>\ncyber criminals. The resultant effect of this creates a near safe haven for these cyber criminals to operate hence making the<br \/>\nNigerian cyberspace very insecure.<br \/>\n\u2212 Lack of proper feasibility by the government before implementing certain economic policies, for example the FOREX policy.<br \/>\nSome of these policies render the Nigerian business terrain unfavourable for investors hence old investments pull out or cut<br \/>\ndown on staff, while there are no new investments coming up. This causes unemployment. High rate of unemployment and<br \/>\npoverty now propel the youth to take to cybercrimes. Again, the Nigerian citizens often celebrate criminals and play sycophancy<br \/>\naround them just to get miserly peanuts from them. A common scenario where Cyber Criminals who throw money around<br \/>\nbecome mentors to these vulnerable and unemployed youth in the country hence promoting cybercrimes and rendering the<br \/>\nNigerian cyber space insecure.<br \/>\n\u2212 Sabotage by regulation and monitoring agencies render the energy sector unfunctional hence making the country unfavorable<br \/>\nto investors, this leads to high rate of unemployment in Nigeria. economy before they are implemented. them with global best<br \/>\npractices to avoid implementing economic policies that will trigger a negative ripple effect on the nation and scare investors and<br \/>\njob creators away. Sabotage by the monitoring and regulation agencies render the energy sector unfunctional Overhaul the<br \/>\nmonitoring agencies to fish out and punish the saboteurs in the energy sector. Sabotage by the elite politicians and poor funding<br \/>\nof security agencies lead to insecurity in Nigeria today. Proper funding of the law enforcement agencies to enable them do their<br \/>\njob well and keep the nation Safe, hence attract investors.<br \/>\n\u2212 Sabotage by the elite politicians and poor funding of the security agencies cause insecurity which scares investors away<br \/>\nleading to unemployment.<br \/>\nProliferation of Cyber insecurity in Nigeria<br \/>\nIn Nigeria, perpetrators of cyber-crimes engage in these activities because of the following 1. The huge financial benefits<br \/>\naccruing from cyber-crimes. 2. Cyber-crimes attracted mild punishment as provided by law. 3. Cyber-crimes are always almost<br \/>\nnot properly investigated and prosecuted in Nigeria. 4. The cyber criminals have expert knowledge of how to manipulate and<br \/>\nnavigate through computer systems, networks and devices. 5. Hitherto to passage of the cyber-crime bill of 2015, the cyber<br \/>\ncriminals had a safe haven to operate as majority of their criminal activities were not considered criminal offences 6. The law<br \/>\nenforcement agencies do not have the required expertise, technologies and techniques to thoroughly investigate and prosecute<br \/>\nthese cybercrimes.<br \/>\nImpacts of Cyber insecurity on the Nigeria State<br \/>\nHassan et al. (2012) identified reduction in competitive edge of organizations, time wastage and slow financial growth, slow<br \/>\nproduction time and increase in overhead cost, as well as defamation of the image of a nation as some effects of cybercrime.<br \/>\nOther major effects include monetary losses and loss of privacy. Some of the effects of cybercrime are briefly explained below:<br \/>\n(i) Reduction in Competitive Edge- An organization can lose its competitive advantage and suffer losses when a hacker steals its confidential information and future plans and sells it to a competitor. The time spent by IT personnel on rectifying harmful<br \/>\nincidents caused by computer criminals could have been used to earn profit for the organization.<br \/>\n(ii) Productivity Losses and Rising Cost- Cybercrime also reduces the productivity of an organization, as businesses take<br \/>\nmeasures to prevent it by securing their networks. This is time consuming and also affects productivity. In addition, to control<br \/>\nviruses and malware, organizations buy security software to reduce the chances of attacks. Computer crime therefore increases<br \/>\noverhead cost and reduces profit margins. Other effects include the consumption of computer and network resources, and the<br \/>\ncost in human time and attention of deleting unwanted messages.<br \/>\n(iii) Monetary Losses- The financial costs to economies and businesses from cyberattacks include the loss of intellectual<br \/>\nproperty, financial fraud, and damage to reputation, lower productivity, and third-party liability. Opportunity cost (lost sales,<br \/>\nlower productivity, etc.) make up a proportion of the reported cost of cyber-attacks and viruses. However, opportunity costs do<br \/>\nnot translate directly into costs to the national economy. Businesses face greater damage from financial fraud and intellectual<br \/>\nproperty theft over the Internet. Thus, where cybercrime is rife (especially relating to businesses and financial institutions) there<br \/>\nare bound to be untold financial consequences. A research report by Ponemon Institute (2016) shows that, cybercrime cost in<br \/>\nsix countries (U.S.A, Japan, Germany, U.K, Brazil and Australia) in 2016 ranged from USD$4.3 million to USD$17.3 million<br \/>\nannually. The study used a sample of 237 companies in the six countries.<br \/>\n(iv)Destroys Country\u2019s Image- One key negative effect of cybercrime is that it tarnishes a country\u2019s image. Once a country is<br \/>\nlabeled as a harbor for cybercrime activities, potential investors are cautious in investing in such countries. This has some dire<br \/>\nimplications for the nation\u2019s macroeconomic stability.<br \/>\n(v) Retards Financial Inclusion- proliferation of cybercrime in a particular country discourages financial inclusion, due to the<br \/>\nfear of being a victim of cyber-attack.<br \/>\nUnabated Cyber Terrorism and Human Security in Nigeria<br \/>\nThe advent of cyber as a weapon of warfare is rapidly gaining momentum not only in Nigeria but globally. Terrorists now<br \/>\nemploy it to monitor individuals, governments and security networks as well as to attack institutional or governmental facilities<br \/>\n(Ntamu, 2014; Onuoha, 2011; Yar, 2006). Beyond the traditional and conventional style of terrorist activism, the violent rise of<br \/>\nthe jihadist group Boko Haram in Nigeria\u2019s Northeast region has now dominated policy debates among academics and<br \/>\npolicymakers not only in Africa but beyond. Boko Haram membership which prefers to be called by the Arabic name Jama&#8217;atu<br \/>\nAhlis Sunna Lidda&#8217;awati wal-Jihad, meaning &#8220;People of the Sunnah (the practice and examples of the Prophet Muhammad&#8217;s<br \/>\nlife) for Preaching and Jihad Group&#8221; is believed to be founded by Mohammed Yusuf in the town of Maiduguri, Northeast<br \/>\nNigeria in 2002. It has since 2015 transformed to become one of the deadliest terrorist groups globally (Global Terrorism Index,<br \/>\n2016). Boko Haram which is a combination of two Hausa words boko meaning Western education\/civilization and haram<br \/>\nmeaning sin or forbidden. Thus, combined means western civilization is forbidden. It is also believed that the membership of<br \/>\nover 500,000 people who were generally disgruntled with the situation in Nigeria especially the configuration of the political<br \/>\nand economic structure was taxed one Naira daily to sustain their ideology (Adibe, 2013).<br \/>\nThe Nigerian government had claimed decimating the Boko Haram sect, but the reality is that warfare of the 21st century has<br \/>\ngone from hardware to software. The group has strategized to using not only physical weapons of warfare but unconventional<br \/>\ntactics to cramp the government. Beyond throwing bombs, taking hostages and crossing borders they now target critical national<br \/>\ninfrastructure by attacking the cyber security of Nigeria. Their adoption of cyber technology for technology integrated<br \/>\nintelligence through the use of ICT devices such as computer, internet, mobile phone, Close Circuit Television, surveillance<br \/>\ncamera, social network, biometric surveillance, data mining, satellite imagery, IP devices and other technologically driven<br \/>\nweapons is believed to have aided their collaborative efforts with others like Al Shaba of Sudan, ISIS and al Qaeda to unleash<br \/>\nterror on citizens not only in northern Nigeria but also to the neighboring Chad, Niger and Cameroon (Adam, Osah, &amp; Alao,<br \/>\n2019; Jacob &amp; Akpan, 2015; Obayuwana, 2011; Osho, Adesuyi, &amp; Shafi\u2019l, 2013). This is what Aladenusi (2015) calls<br \/>\n\u2018cyberharam\u2019.<br \/>\nThe integration of technology in the operational plan of Boko Haram has by no means aided their striking power and assisted<br \/>\nthem in the exchange of information, recruitment, ideological propagations, training and finances through electronic transfers.<br \/>\nIn addition, it has occasioned traumatic experiences on the part of the citizenry and the general belief that the government has<br \/>\nbeen incapable to curtail them. This explains why Arimat\u00e9ia da Cruz (2013) noted that apart from using internet to launch cyber\ufffeattacks against countries, terrorists possess the capacity to engage in \u201chacktivism,\u201d which is described as strategy of merging<br \/>\nhacking and activism. The implication is that the seven dimensions of human security namely economic, food, health,<br \/>\nenvironmental, personal, community and political as established by the United Nations Development Programme (UNDP) in<br \/>\n1994 might be difficult to attain as a result of terrorism by 2030 being the set target of the Sustainable Development Goals<br \/>\n(SDGs) if nothing urgent is done to reverse the trend.<br \/>\nCyber information sharing: what is it and why does it matter?<br \/>\nNo single organization or country has visibility over the entire problem space, making collaboration and information sharing<br \/>\nessential. Knowledge is power. Intelligence, carefully curated from the collection, evaluation and assessment of data from many<br \/>\nsources is fundamental to understanding the complex and dynamic threats that exist in the information age. Once only the<br \/>\npreserve of government departments and military agencies, intelligence now helps businesses and global institutions make better, data-driven decisions. It gives them the edge in formulating new plans and strategies to manage risk, and to perform<br \/>\nefficiently and effectively. Cybersecurity is defined by its multi-stakeholder ecosystem and needs to be seen from a holistic<br \/>\nviewpoint. All participants in that ecosystem need to be able to participate in building the systemic resilience of the collective<br \/>\ninfrastructure on which those stakeholders rely.<br \/>\nSeven key challenges that Nigeria and the global security community needs to address<br \/>\n1. Gaps in jurisdictions and cross-sector collaboration Even where there is relative maturity in sectors for information sharing,<br \/>\ntrust and barriers to collaboration remain between regions. In Africa, just eight countries have a national strategy on<br \/>\ncybersecurity and only 13 have a Government-Computer Emergency Response Team, which typically act as vehicles for<br \/>\nestablishing national information sharing programmes.<br \/>\n2. Skills and capabilities -The cybersecurity skills gap is well documented. In the 2020 UK Government Cybersecurity skills<br \/>\nreport, threat intelligence was listed as one of the most sought-after technical skills. Nearly one-fifth of all businesses that<br \/>\nresponded stated they had a skills gap associated with threat intelligence, which was the fourth-highest technical skill gap listed<br \/>\nafter security architecture, forensics and penetration testing. This assertion is very true in Nigeria\u2019s context.<br \/>\n3. Trust and privacy- There is a lack of trust between key players at operational and governmental levels, which needs to be<br \/>\ndeveloped to facilitate information sharing. Geopolitical drivers and fragmentation in international co-operation can affect<br \/>\npublic-sector enthusiasm for data exchange programmes. The private sector is often reluctant to share information with<br \/>\ngovernments for fear of regulatory impact, to avoid complicity in any privacy and rights violations and because they often see<br \/>\nno benefit to doing so. Cross-sector information sharing is further hampered by fears about giving competitors an advantage, as<br \/>\nwell as concerns about sharing sensitive internal data. Free cross-border information sharing is additionally complicated by the<br \/>\npossible threats to human rights protections when information is shared with states that have a weak rule of law and or a history<br \/>\nof systemically violating human rights.<br \/>\n4. Legislation, policy and data fragmentation There is a current lack of alignment and harmonization across jurisdictions \u2013 and<br \/>\nin many cases conflicting regulations in relation to the sharing of cyber information \u2013 especially with regard to concerns over<br \/>\nthe disclosure of what could be considered as sensitive proprietary information by an organization. More dramatically the trend<br \/>\ntowards data localization \u2013 where governments mandate that data on their citizens or residents can only be stored within their<br \/>\ncountry, and-or meet local privacy and security mandates before being transferred externally, can frustrate, or outright forbid,<br \/>\nthe fluid sharing of certain information.<br \/>\n5. Operational costs -To be able to effectively receive, analyse and action cyber intelligence into the full defensive posture, the<br \/>\ninstitutions of Nigerian state require investment in the right technology, staff and governance. For decision-makers and industry<br \/>\nleaders looking to reap the rewards of participating in an information-sharing ecosystem, estimating the costs and targets for<br \/>\ntangible investments is often difficult due to the array of options and lack of agreed standards from which to measure the benefits<br \/>\nof such investment. Even where information-sharing programmes are available, participation costs act as a barrier. Security<br \/>\nbudgets in countries, particularly those in developing economies, are focused only on the most immediate concerns and seldom<br \/>\na more holistic, mature strategy.<br \/>\n6. Lack of clear incentives Cybersecurity information sharing lacks traditional, positive incentives (the tangible short-term<br \/>\nprotective benefits, liability protections, insurance incentives) and negative incentives (compliance requirements, regulatory<br \/>\npressures). Organizations are often concerned about reputational damage or legal exposure for revealing the particular attacks<br \/>\nthey experienced, especially if the attacks were neither avoided nor defended as well as the firm would have wished. Without<br \/>\ntangible short-term incentives in place organizations operating within the Nigerian border are not likely to prioritize<br \/>\ncybersecurity information sharing.<br \/>\n7. Operational, interoperability and technology barriers Multiple standards, frameworks and technologies exist in relation to<br \/>\ncyber information sharing presenting a further barrier to widescale adoption. Technical standards authorities, national bodies<br \/>\nand certain sector groups implement specific solutions attuned to their environment, but more work is needed to be able to<br \/>\nprovide interoperability throughout the ecosystem to ensure cyber information-sharing practices can be harmonized. The lack<br \/>\nof harmonization not only makes interoperability difficult, but it forces privacy and other rights-based considerations to be<br \/>\nre-evaluated for each new standard and\/or framework creating additional unnecessary hurdles. While there are no-cost and<br \/>\nopen-source technologies such as MISP, The Hive, Cortex and IntelMQ, there are still significant technical resources required<br \/>\nto implement technology to create and\/or participate in cybersecurity information-sharing communities. This can reduce the<br \/>\noverheads of producing information and\/or refining others\u2019 information into actionable intelligence or allow easy integration<br \/>\nbetween threat information sharing feeds and the range of security\/investigation tools used by defenders.<br \/>\nCyberterrorism and the Protection of Critical Information Infrastructure in Nigeria: A Legal Assessment<br \/>\nThe well-being of any nation depends upon secure and resilient critical infrastructure. Government business can be brought to<br \/>\na halt if critical information infrastructures are attacked. Similarly, many private businesses may also grind to a halt if critical<br \/>\ninformation infrastructures are attacked. Critical infrastructure refers to the various systems, networks, facilities and services<br \/>\nupon which the daily life of a nation depends. One of such infrastructures is the power network that provides the nation with<br \/>\nelectricity. A major attack on a nation\u2019s power grid would shut down any country. The advent of cyber as a weapon of warfare<br \/>\nis rapidly gaining momentum the world over and Nigeria is not immune to such threats. In 2012, it was reported that there was about 60 percent increase in the attacks on Nigerian Government websites. This paper examines the concept of cyber-terrorism<br \/>\nand the possibility of terrorist organizations like the Boko Haram sect using the cyber to perpetrate terrorist acts in Nigeria. The<br \/>\npaper argues that the Cybercrimes (Prohibition, prevention) Act 2015, in its current state cannot adequately address the issue of<br \/>\ncyber-terrorism and the protection of critical national infrastructure in Nigeria. The law does not provide for a single enforcement<br \/>\ninstitution and as such the enforcement framework is chaotic. This paper suggest an amendment to the Act and to include the<br \/>\ncreation of a cyber-attack prevention agency that will be saddled with enforcement of the Act and developing the technical<br \/>\ncapacity of local technocrats to be able to manage the cyber security risks to Government and private sector critical information<br \/>\ninfrastructure.<br \/>\nCyber-terrorism in Nigeria: Is the threat real? Terrorist cells in over 60 countries have resorted to the use of cyberspace to<br \/>\nrecruit their members, spread propaganda, raise money, train more terrorist and conspire to intimidate and coerce government<br \/>\nand innocent citizens in furtherance of their political and religious objectives. Social media platforms are now avenues for the<br \/>\nterrorists\u2019 use for coordination of their illicit actions and spread of messages. Terrorists use of the internet, especially social<br \/>\nmedia to propagate messages involve a mix of social media savvy, tactical use of technology, and the nature of the internet itself<br \/>\nas an isolating yet supportive force for some people, enough to drive some to become terrorists themselves. They mostly use<br \/>\ntargeted social media campaigns by way of hash-tags to gain attention and support. The number of sites that terrorists have been<br \/>\nusing is extensive: Twitter, facebook, instagram, you tube and flickr. In August 1999, it was reported that almost every terrorist<br \/>\ngroup had established their individual websites, along with a mishmash of freedom fighters, crusaders, propagandists and<br \/>\nmercenaries. The internet serves as an appropriate haven for them to engage in conferences and debate on their premeditated<br \/>\nobjectives through the use of web forums, emails, and chat. The internet has the ability to connect not only members of same<br \/>\nterrorist organizations but also members of different groups. Al Qaeda members (which are at present the most notorious terrorist<br \/>\ngroup) have mastered the art of using the cyberspace to advance their own goals. Osama Bin laden, Isis and Boko Haram have<br \/>\nreportedly posted web pages on the internet to gain support and followers, and also in furtherance of the spreading of their<br \/>\nmessages. The headquarters of Osama Bin Ladin in Afghanistan was reported to have been equipped with computers and<br \/>\ncommunications equipment as at 1996-7. In Nigeria today, the greatest and predominant security challenge that the country is<br \/>\nfacing is terrorism. The jarna\u2019atu Ahlis Sunna Ladda Watin Wal-Jihad, a religious based Islamic fundamentalist group popularly<br \/>\nknown as Boko Haram is the harbinger of terrorism in Nigeria today. The sect which is predominantly based in the North Eastern<br \/>\npart of the country has an ideology that is averse to Western education and anything it represents. The sect also seeks an<br \/>\nenthronement of Islamic (Sharia) government in the whole of Northern Nigeria. Adherents of Boko Haram attack government<br \/>\ninstitutions, such as the police and military through armed attacks or suicide bombing. The sect was founded by Mohammed<br \/>\nYusuf in 2001. Because of its claim of wanting to establish Sharia law in Nigeria, it is sometimes referred to as Yusufiya group.<br \/>\nThe unfortunate association of Islamic religion with terrorism has been as ancient as 622\/623 AD when the religion was found.<br \/>\nIslam started by the sword through conquests made by Prophet Mohammed culminating in the Hijiriah from Medina to Mecca<br \/>\nin 623 A.D. The Boko Haram sects in Nigeria operates as a faceless group of militants who carryout coordinated surprise attacks<br \/>\non defenceless citizens by striking them at churches, markets, offices, relaxation sports etc. Usually a suicide bomber on a<br \/>\nmotorcycle, can hit its target and dies with the victims. But in June 2011, there was a significant shift in Boko Haram\u2019s targets,<br \/>\ntactics and geographic reach. The use of a suicide VBIED (vehicle-borne improvised explosive device) on the Abuja police<br \/>\nbarrack marked the first time on record a suicide attack was carried out in Nigeria.Boko Haram has international links with other<br \/>\nterrorist groups such as the Al-Qaeda in the Magherb (AQIM), Al-Shabab in Somalia. Boko Haram\u2019s evolving tactics and<br \/>\ntargeting may be the result of ties between AQIM in North Africa and Al-Shabaab in Somalia. Such cross-pollination of<br \/>\nweapons, tactics, and bomb-making expertise had increased the capabilities of the terrorist group. On June 14, 2011, AQIM<br \/>\nleader Abu Masab Ab al-wadoud, also known as Abdelmalik Droukdel, told Al Jazeera that his group would provide Boko<br \/>\nHaram with weapons, support and training. In September 2011, threats made by Boko Haram to bomb Lagos Airport prompted<br \/>\nsecurity officials to search all vehicles approaching the airport, causing major disruptions. Even more indicative of the growing<br \/>\nsophistication and threat potential of Boko Haram is the groups increased use of the internet forums. According to a September<br \/>\n28, 2011 report published by the SITE intelligence group, Boko Haram had developed an increased online presence that seems<br \/>\nto have contributed to the rapid increase in their strength. The sect has been getting tremendous support from these groups. It is<br \/>\nbecoming increasingly clear that as technology advances, the tools used by the sects in their destructive and terrorist activities<br \/>\nwill no longer be guns, and bombs but other weapons of mass destruction and attacks on critical infrastructure using the<br \/>\ncomputer.<br \/>\nSolution<br \/>\nNigeria\u2019s Approaches in Combating the Menace of Cybercrime\/Cybersecurity<br \/>\nAzazi (2011) set up a Committee on cybersecurity Legislation to access the Nigeria cyberspace. In the report submitted to the<br \/>\noffice of the National Security Adviser (NSA), the committee revealed the followings:<br \/>\n1. Nigeria lacks the structures to handle any cyber-attack emergency, with the increase in bomb attacks and growing threat of<br \/>\nattacks through computer networks.<br \/>\n2. There is no comprehensive assessment of the preparedness of the country in the event of cyber-attacks.<br \/>\n3. There is no focal point for coordinating cybersecurity in Nigeria.<br \/>\n4. There are no structures to handle any emergency cases of cyber-attacks. 5. The current legal framework is grossly inadequate for cybersecurity in Nigeria and does not support a coordinated approach<br \/>\nto developing a cybersecurity strategy. The committee further revealed that, the challenges in developing a cybersecurity<br \/>\nframework to include;<br \/>\nlack of awareness and jurisdiction overlaps among existing law enforcement agencies.<br \/>\nOthers are the absence of certification of critical national information infrastructure and the absence of systematic capacity and<br \/>\ncapability building for law enforcement agencies.<br \/>\nThe committee recommended that the office of the National Security Adviser (NSA) should initiate the amendment of the<br \/>\nNational Security Agencies Act, Cap N74 LFN 2004 to create the Directorate of Cybersecurity; liaise with the Office of the<br \/>\nAttorney General of the Federation and Minister of Justice and work with legislators to ensure the passage of the harmonised<br \/>\ncybersecurity Bill. Sorunke (2011) maintained that Nigeria at the cyberspace is under threats, with much vulnerability, many<br \/>\nloopholes in our system and with issues bothering on our payment networks. He warned that, if urgent measures were not taken<br \/>\nby businesses and government organisations deploying web-based platforms for their operations and with the increasing rate of<br \/>\ncyber insecurity in Nigeria; companies might soon be faced with high incidence of hacking, leading to loss of data critical to a<br \/>\nbusiness life and revenue. He maintained that, the high level of insecurity in the Nigeria\u2019s cyberspace might affect the cashless<br \/>\neconomy objective of the Central Bank of Nigeria. He noted that the wanton defacing of some government websites such as the<br \/>\nNiger Delta Development Corporation (NDDC), Power Holding Company of Nigeria (PHCN), etc. by a group of hackers known<br \/>\nas NaijaHacktivists; in practical terms inform how vulnerable most Nigerian organisations were in the cyberspace. From the<br \/>\nabove, it is obvious that the Nigeria\u2019s cyberspace is porous and has no form of legal protection to regulate activities in Nigeria\u2019s<br \/>\ncyberspace.<br \/>\nThe Cybercrimes (Prohibition, Prevention) Act 2015 In the wake of advancement of technology, several conventional crimes<br \/>\nwhich were hitherto only committed against per sons physically or in direct contact with the assailant or criminal has now shifted<br \/>\nto the internet where such offences can be committed over the internet with the use of the computers and without the victim<br \/>\neven getting to know or meet the offender. This ugly development amongst other factors necessitated the enactment of the<br \/>\ncybercrimes Act in Nigeria. The cybercrime Act was signed into law on May 15, 2015. The Act provides an effective, unified<br \/>\nand comprehensive, legal, regulatory and institutional framework for the prohibitions, prevention, selection, prosecution and<br \/>\npunishment of cybercrimes in Nigeria. The Act is made up of 59 sections, 8 parts and 2 schedules. The first schedule which is<br \/>\nsection 42(1) lists the members of the cybercrime Advisory council. The second schedule which is section 44(2) (a) provide for<br \/>\nbusinesses to be levied for the purpose of the cybersecurity fund. The Act covers broad spectrum of list of cybercrime offences<br \/>\npunishable with penalties and fines in part III., which includes offences against critical national information infrastructure,<br \/>\nunlawful access to computers, system interference, interception of electronic messages, e-mails, electronic money transfer,<br \/>\nTampering with critical infrastructure, willful misdirection of electronic messages, unlawful interception, computer related<br \/>\nforgery, computer related fraud, theft of electronic devices, unauthorized modification of computer systems, network data and<br \/>\nsystem interference, cyber-terrorism, fraudulent issuance of instructions, identify theft and impersonation, child pornography<br \/>\nand related offences, cyberstalking, cybersquatting, Racists and xenophobic offences, importation and fabrication of e-tools,<br \/>\nbreach of confidence by service providers, manipulations of ATM\/POS terminals, phishing, spamming, spreading of computer<br \/>\nvirus, dealing in card of another, purchase or sale of card of another, use of fraudulent device or attached e-mails and websites.<br \/>\nPart II of the Act specifically provides for the protection of Critical National Information Infrastructure, while section 18(1) of<br \/>\nPart III provides for the offence of cyber-terrorism. The section provides as follows: A person who accesses or causes to be<br \/>\naccessed any computer or computer system or network for purposes of terrorism, commits an offence and is liable to life<br \/>\nimprisonment. The Act seems elaborate, but it may not be able to effectively address the issue of cyber-terrorism and the<br \/>\nprotection of critical national information infrastructure owing to several pitfalls in the Act. First, the law does not provide for<br \/>\na single enforcement institution. Section 41 (1) vest the enforcement of the Act on the National Security Adviser while section<br \/>\n41(2) and section 52(1) and (3) vest the powers of enforcement of the Act on the Attorney-General of the Federation. This is<br \/>\ncapable of creating conflict in the enforcement of the Act. Secondly, Nigeria over the years is fond of appointing retired military<br \/>\npersonnel as National Security Adviser. Sadly enough, most of these retired military officers so appointed are actually novice<br \/>\nin cyber security which is quite different from conventional security. The Act did not spelt-out what should be the qualification<br \/>\nof the National Security Adviser. Moreover, the duties assigned to the office of the National Security Adviser by virtue of<br \/>\nsection 41(1) of the Act are too technical to be left in the hands of a National Security Adviser who may not have any knowledge<br \/>\nof Cyber-Security. The duties require someone with adequate knowledge of cyber and computer related issues.<br \/>\nThe Federal Government of Nigeria modalities for implementation of the new National Cybersecurity Policy and<br \/>\nStrategy (NCPS) 2021.<br \/>\nThe Policy and Strategy is said to be a framework that aims to strengthen cybersecurity governance and coordination and<br \/>\nfoster a trusted cyber environment that optimizes Nigeria&#8217;s cybersecurity readiness and coordination capacities towards<br \/>\naddressing the nation&#8217;s cyber risk exposure. This new policy is a review of the 2014 edition of the same, designed to realign<br \/>\nthe nation\u2019s cybersecurity efforts to effectively confront the dynamic and emergent nature of threats in the country\u2019s<br \/>\ncyberspace. With over 104 million active internet users coupled with the local innovations that have made Nigeria one of the<br \/>\nleading digitally connected countries on the continent and the prevailing challenges that come with cyber penetration, this<br \/>\nreview has become very important. Here are few things you should know about this policy: To effectively carve this policy,<br \/>\nthese seven have been identified as the major cyber threats that the country is facing- Cyber-terrorism, Cybercrime, Onlinechild abuse, Election interference, Online gender exploitation and Pandemic induced cyber threats.<br \/>\nWhat are Nigeria\u2019s cyber vulnerabilities and strengths? To ensure risk assessment, the National Cybersecurity<br \/>\nCoordination Centre (NCCC) identified some of the areas that are the weaknesses of the nation\u2019s cyberinfrastructure. The<br \/>\nCentre admits that the country relies largely on foreign ICT solutions, therefore, citing research and development and human<br \/>\nresource capacity as some of the weaknesses. Aside from these, low awareness about cybersecurity is also a limitation as<br \/>\nopposed to the fast-growing pace of cyber threats. However, the Centre stated that the local private sector is well informed and<br \/>\nproactive in the global cyber security market. Thereby, enabling multi-stake-holder\u2019s engagements in the sector.<br \/>\nWhat\u2019s the Policy Direction-The policy is hinged on protecting national security, strengthening economic development and<br \/>\nfighting corruption. This is because the security and wellbeing of citizens are equally important in the cyber and physical<br \/>\ndomains, and cybersecurity is also a critical enabler in economic progression and other national priorities. Hence the need for<br \/>\nthe 12 pillars will create the foundation of delivery and possible collaboration between stakeholders. The pillars<br \/>\nare;(a).Enhancing cyber defence capability, (b).Enhancing international cooperation, (c).Promoting a thriving digital<br \/>\neconomy,(d).Assurance monitoring and evaluation, (e).Strengthening the legal and regulatory framework, (f).Enhancing cyber<br \/>\nsecurity incident management, (g).Strengthen cybersecurity governance and coordination, (h).Fostering protection of critical<br \/>\nand national information infrastructure.<br \/>\nCritical Sectors &#8211; In fostering the protection of critical national information infrastructure, the policy identifies the following<br \/>\nas \u2018critical sectors&#8217;; (a).Water, (b).Health, (c).Education, (d).Transport, (e).Public Administration, (f).Defence and Security,<br \/>\n(g).Banking, Finance and Insurance, (h).Safety and Emergency Services, (i).Information, Communication, Science and<br \/>\nTechnology, amongst others. Aside from this, the policy explored the legal and regulatory framework of cybersecurity with<br \/>\nkeen attention to internet safety and child online protection. Also, the establishment of the National Digital Forensics<br \/>\nLaboratory under the NCCC is mentioned as one of the strategies to be implemented to enable the war against various cyber<br \/>\nthreats.<br \/>\nPractical Challenges to Prosecuting Perpetrators of Cyber-terrorism. The Prosecution of Perpetrators of Cyber-terrorism<br \/>\nis not without challenges. Some of the identified challenges affecting the effective prosecution of cyber-terrorism offenders are:<br \/>\nJurisdictional issues, Evidential issues and Extradition. These factors militating against the effective prosecution of perpetrators<br \/>\nof cyber-terrorism are treated below:<br \/>\na) Jurisdictional Issues While the world we live in is physically demarcated in boundaries and territories, the world of<br \/>\ncyberspace does not recognize any physical or political barriers or national frontiers. In plain words, cyber world is transnational,<br \/>\na global medium devoid of any territorial divisions. The unbounded nature of the internet has challenged the basis for the<br \/>\ntraditional notions of jurisdiction which are predicated on real space demarcation. Because, a page on a worldwide web can<br \/>\nreach web surfers in every state in the nation and perhaps every nation of the earth, there arises the issue of where exactly a<br \/>\nperson who has a cause of action, based upon web transaction may sue. In order for any court of law to try and punish a cyber\ufffeterrorist, such a court must be cloth with the legal authority to do so. The legal authority that empowers a court to so Act is<br \/>\nreferred to as jurisdiction. In simple words, jurisdiction is the power of a court to hear and determine a case. Jurisdiction is the<br \/>\nlegal capacity of a court to hear and determine judicial proceedings. It is the power to adjudicate concerning the subject matter<br \/>\nof the controversy. A court of Law can only exercise judicial powers when it has jurisdiction. Without jurisdiction, a court\u2019s<br \/>\njudgement will be ineffective and impotent. The determination of Jurisdiction in respect of cyber-terrorism offences could be<br \/>\ncumbersome and mostly difficult for the courts to determine. The virtual world seems to be a borderless Journey to the<br \/>\nwonderland. This has continued to cause confusion and misapplication of legal principles for the enforcement of cyber-terrorism<br \/>\nadjectival laws. For instance, in the case of R. v. Governor of Brixton Prison and Anor, Ex-parte Levin, Where one of the<br \/>\nissues for determination was whether the locus in quo of the offence was in St. Petersburg, Russia, where the computer<br \/>\ninstructions were sent, or in victim\u2019s computers in Parsippany, New Jersey in United States. The Court held that given the<br \/>\nvirtually instantaneous nature of electronic transaction, it was \u2018artificial\u2019 to regard the offence as having occurred in one place<br \/>\nor the other. Could it then have been right to say that cyber-terrorism offences lack any locus delicti; or could the offences be<br \/>\nsaid to have multiple locus delicti? Since cyber-terrorism offences are usually cross-border offences involving multiple<br \/>\nJurisdictions; which state could rightly assume Jurisdiction? These Questions have necessitated the need for various states to<br \/>\ninclude provisions conferring the national courts with extra territorial jurisdiction.<br \/>\nb) Evidential issues Criminal Prosecutions can succeed or fail based upon the evidence presented. Loss or contamination of<br \/>\nevidence in the cause of cyber-terrorism investigation is a very common and also an obvious problem which may affect the<br \/>\nveracity to be attached to the piece of evidence, or even jeopardize the entire Criminal Proceedings. The collection of data<br \/>\noutside the physical, territorial boundaries have also proven to be one of the most important issues that could also paralyse<br \/>\ncyber-terrorism investigations and any consequential prosecutions. Prosecutors of cyber-terrorist will often have problems<br \/>\ngetting access to relevant documents. Where documents are available, the courts will face special challenges in verifying whether<br \/>\nthey are authentic. Also, obtaining witness testimony is quite difficult. The process of compelling witnesses who can give direct<br \/>\ntestimony is quite cumbersome sometimes owing to the distance involved.<br \/>\nc) Extradition The prosecution of cyber-terrorists sometimes involves one state requesting the extradition of a suspect from<br \/>\nanother state. Extradition laws generally provides for a complex legal process which can take months if not years to reach its<br \/>\nconclusion. Also, many states usually refuse the extradition of their own nationals who have taken refuge in their territory, although as between states who observe absolute reciprocity of treatment in this regard, request for surrender are sometimes<br \/>\nacceded to. International Law concedes that the grant of and procedure as to extradition are most properly left to municipal law,<br \/>\nand does not, for instance, preclude states from legislating so as to refuse the surrender by them of fugitives, if it appears that<br \/>\nthe request for extradition had been made in order to prosecute the fugitive on account of race, religion, or political opinions or<br \/>\nif the fugitive may be prejudiced thereby upon eventual trial by the courts of the requesting state.<br \/>\nRecommendations<br \/>\nCybersecurity and cybercrime have emerged as a very concrete threat in Nigeria and the existing legislations in Nigeria are<br \/>\ninadequate to address its threats. On this note, the following are suggested and recommended<br \/>\n1. There should be continuous revision and remodeling of the newly signed Nigeria National Cybersecurity Policy and Strategy<br \/>\n(NCPS) 2021. Waiting for every 5 years before this is done will make Nigeria not to be abreast with the everyday dynamics and<br \/>\nhappenings in the cyberspace.<br \/>\n2. There is a need to protect all critical information infrastructures and secure computer systems and networks within Nigeria\u2019s<br \/>\ncyberspace.<br \/>\n3. The establishment of national Computer Emergency Response Team (CERT) centre for the monitoring, detention and analysis<br \/>\nof all activities within the Nigeria cyberspace and the globe at large.<br \/>\n4. The establishment of fully functional national digital forensic laboratory in the Office of the National Security Adviser<br \/>\n(ONSA). This is to avail all law enforcement and security agencies a platform for detailed investigation of cybercrimes in<br \/>\nNigeria.<br \/>\n5. There is a need for a 24\/7 emergence response website where victims can report all cases of internet fraud and cybercrime at<br \/>\nlarge and know that, it will be given attention swiftly and in a transparent manner.<br \/>\n6. The government should determine their training needs in the area of cybercrime and explore bilateral, regional and multilateral<br \/>\ncooperation mechanisms to meet those needs.<br \/>\n7. The government should heighten awareness of the dangers of cybercrime amongst the general public, including users in the<br \/>\neducation system, the law and security enforcement agencies, and the justice system on the need to prevent and combat<br \/>\ncybercrime.<br \/>\n8. The implementation of General Data Protection Regulation (GDPR) that will not have any major impact on the<br \/>\ninformation-sharing landscape, which may result in making some organizations fearful of breaching it. While there has been<br \/>\nprogress in jurisdictions such as the United States in providing greater legal clarity for cyber information sharing, more work is<br \/>\nneeded to provide the level of assurance required. Information sharing between national and supranational authorities to drive<br \/>\ncollective investigations should not be complicated thereby ensuring robust disclosure and the evidential proceedings required<br \/>\nto ensure appropriate due process and public oversight are in place.<br \/>\nConclusion<br \/>\nUntil cyber criminals in Nigeria are convinced that no matter how crafty they are or the expertise they possess, that their crimes<br \/>\ncan be forensically investigated and that they will possibly face long jail terms or huge fines, Nigerian cyber security will not<br \/>\nbe assured. It has been seen that most cyber criminals have a loose network wherein they collaborate and cooperate with one<br \/>\nanother. Unlike the real world, these criminals do not fight one another for supremacy or control. Instead they work together to<br \/>\nimprove their skills and even help out each other with new opportunities. Hence, the usual methods of fighting crime cannot be<br \/>\nused against cyber criminals. While law enforcement agencies are trying to keep pace with cyber criminals, it is proving to be<br \/>\na Herculean task. This is primarily because the methods used by cyber criminals and technology keeps changing too quickly for<br \/>\nlaw enforcement agencies to be effective. That is why commercial institutions and government organizations need to look at<br \/>\nother methods of safeguarding themselves. One of the best ways to avoid being a victim of cyber-crimes and protecting your<br \/>\nsensitive information is by making use of impenetrable security that uses a unified system of software and hardware to<br \/>\nauthenticate any information that is sent or accessed over the Internet. Secondly a formidable framework should be put in place<br \/>\nto track, detect, investigate and prosecute cyber-crimes, hence making it unsafe for cyber criminals to thrive. This is can be<br \/>\nachieved if the computer forensics investigation profession and its practice is promoted in Nigeria.Reference:<br \/>\n1. https:\/\/ndic.gov.ng\/wp-content\/uploads\/2020\/08\/NDIC-Quarterly-Vol-34-No-12-2019-Article-The-Impact\ufffeOf-Cybercrime-On-The-Nigerian-Economy-And-Banking-System.pdf<br \/>\n2. https:\/\/www.ajol.info\/index.php\/stech\/article\/view\/161143<br \/>\n3. https:\/\/www.researchgate.net\/profile\/John\ufffeOdumesi\/publication\/263967391_Combating_the_Menace_of_Cybercrime\/links\/00b4953c7613e08fbd000000\/Com<br \/>\nbating-the-Menace-of-Cybercrime.pdf<br \/>\n4. https:\/\/pdfs.semanticscholar.org\/a4f4\/5ad4647a1fe0094317393997f353cc8a18e3.pdf<br \/>\n5. https:\/\/www.ajol.info\/index.php\/stech\/article\/view\/154713<br \/>\n6. http:\/\/ctc.gov.ng\/wp-content\/uploads\/2021\/02\/NATIONAL-CYBERSECURITY-POLICY-AND-STRATEGY\ufffe2021_E-COPY_24223825.pdf<\/p><\/blockquote>\nAuthor: Abraham","protected":false},"excerpt":{"rendered":"<p>Abstract With increasing access to internet and online resources in Nigeria, an exponential increase is observed in the rate of cybercrimes in Nigeria. Cybercrime rates increase geometrically, hence, giving Nigeria notoriety as a nation with a highly insecure cyberspace. In this Seminar Paper as a Subject Matter Expert (SME) with over 19 years wealth of [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":8216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[24],"tags":[],"class_list":["post-8214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nigeria"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE) - Fraud Xpos\u00e9<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE) - Fraud Xpos\u00e9\" \/>\n<meta property=\"og:description\" content=\"Abstract With increasing access to internet and online resources in Nigeria, an exponential increase is observed in the rate of cybercrimes in Nigeria. Cybercrime rates increase geometrically, hence, giving Nigeria notoriety as a nation with a highly insecure cyberspace. In this Seminar Paper as a Subject Matter Expert (SME) with over 19 years wealth of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/\" \/>\n<meta property=\"og:site_name\" content=\"Fraud Xpos\u00e9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/fraudxpose\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-26T20:55:33+00:00\" \/>\n<meta name=\"author\" content=\"Abraham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fraudxposeng\" \/>\n<meta name=\"twitter:site\" content=\"@fraudxposeng\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abraham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"43 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/\"},\"author\":{\"name\":\"Abraham\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/person\\\/7b197b067b3572c2ece8b58899e4261a\"},\"headline\":\"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE)\",\"datePublished\":\"2021-11-26T20:55:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/\"},\"wordCount\":8607,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1\",\"articleSection\":[\"Nigeria\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/\",\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/\",\"name\":\"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE) - Fraud Xpos\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1\",\"datePublished\":\"2021-11-26T20:55:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1\",\"width\":456,\"height\":679},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#website\",\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/\",\"name\":\"Fraud Xpos\u00e9\",\"description\":\"All you need to know about fraud, forensics, security, compliance and audit issues\",\"publisher\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#organization\",\"name\":\"Fraud Xpose\",\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/FX-Logo272x147.png?fit=272%2C147&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/FX-Logo272x147.png?fit=272%2C147&ssl=1\",\"width\":272,\"height\":147,\"caption\":\"Fraud Xpose\"},\"image\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/fraudxpose\\\/\",\"https:\\\/\\\/x.com\\\/fraudxposeng\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/person\\\/7b197b067b3572c2ece8b58899e4261a\",\"name\":\"Abraham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lh6.googleusercontent.com\\\/-wn7UoTz7dEE\\\/AAAAAAAAAAI\\\/AAAAAAAAAAA\\\/AMZuuclDa13IYHLRUWluU--uolUhktOhSg\\\/s96-c\\\/photo.jpg?sz=50\",\"url\":\"https:\\\/\\\/lh6.googleusercontent.com\\\/-wn7UoTz7dEE\\\/AAAAAAAAAAI\\\/AAAAAAAAAAA\\\/AMZuuclDa13IYHLRUWluU--uolUhktOhSg\\\/s96-c\\\/photo.jpg?sz=50\",\"contentUrl\":\"https:\\\/\\\/lh6.googleusercontent.com\\\/-wn7UoTz7dEE\\\/AAAAAAAAAAI\\\/AAAAAAAAAAA\\\/AMZuuclDa13IYHLRUWluU--uolUhktOhSg\\\/s96-c\\\/photo.jpg?sz=50\",\"caption\":\"Abraham\"},\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/author\\\/abraham\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE) - Fraud Xpos\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/","og_locale":"en_US","og_type":"article","og_title":"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE) - Fraud Xpos\u00e9","og_description":"Abstract With increasing access to internet and online resources in Nigeria, an exponential increase is observed in the rate of cybercrimes in Nigeria. Cybercrime rates increase geometrically, hence, giving Nigeria notoriety as a nation with a highly insecure cyberspace. In this Seminar Paper as a Subject Matter Expert (SME) with over 19 years wealth of [&hellip;]","og_url":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/","og_site_name":"Fraud Xpos\u00e9","article_publisher":"https:\/\/facebook.com\/fraudxpose\/","article_published_time":"2021-11-26T20:55:33+00:00","author":"Abraham","twitter_card":"summary_large_image","twitter_creator":"@fraudxposeng","twitter_site":"@fraudxposeng","twitter_misc":{"Written by":"Abraham","Est. reading time":"43 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#article","isPartOf":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/"},"author":{"name":"Abraham","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/person\/7b197b067b3572c2ece8b58899e4261a"},"headline":"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE)","datePublished":"2021-11-26T20:55:33+00:00","mainEntityOfPage":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/"},"wordCount":8607,"commentCount":0,"publisher":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#organization"},"image":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1","articleSection":["Nigeria"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/","url":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/","name":"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE) - Fraud Xpos\u00e9","isPartOf":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#website"},"primaryImageOfPage":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#primaryimage"},"image":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1","datePublished":"2021-11-26T20:55:33+00:00","breadcrumb":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#primaryimage","url":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1","contentUrl":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1","width":456,"height":679},{"@type":"BreadcrumbList","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/cybersecurity-proliferation-challenges-and-solutions-a-case-study-of-the-nigeria-state\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/globalfraudforensics.com\/fraudxpose\/"},{"@type":"ListItem","position":2,"name":"CYBERSECURITY, PROLIFERATION, CHALLENGES AND SOLUTIONS (A CASE STUDY OF THE NIGERIA STATE)"}]},{"@type":"WebSite","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#website","url":"https:\/\/globalfraudforensics.com\/fraudxpose\/","name":"Fraud Xpos\u00e9","description":"All you need to know about fraud, forensics, security, compliance and audit issues","publisher":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/globalfraudforensics.com\/fraudxpose\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#organization","name":"Fraud Xpose","url":"https:\/\/globalfraudforensics.com\/fraudxpose\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2018\/04\/FX-Logo272x147.png?fit=272%2C147&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2018\/04\/FX-Logo272x147.png?fit=272%2C147&ssl=1","width":272,"height":147,"caption":"Fraud Xpose"},"image":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/fraudxpose\/","https:\/\/x.com\/fraudxposeng"]},{"@type":"Person","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/person\/7b197b067b3572c2ece8b58899e4261a","name":"Abraham","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lh6.googleusercontent.com\/-wn7UoTz7dEE\/AAAAAAAAAAI\/AAAAAAAAAAA\/AMZuuclDa13IYHLRUWluU--uolUhktOhSg\/s96-c\/photo.jpg?sz=50","url":"https:\/\/lh6.googleusercontent.com\/-wn7UoTz7dEE\/AAAAAAAAAAI\/AAAAAAAAAAA\/AMZuuclDa13IYHLRUWluU--uolUhktOhSg\/s96-c\/photo.jpg?sz=50","contentUrl":"https:\/\/lh6.googleusercontent.com\/-wn7UoTz7dEE\/AAAAAAAAAAI\/AAAAAAAAAAA\/AMZuuclDa13IYHLRUWluU--uolUhktOhSg\/s96-c\/photo.jpg?sz=50","caption":"Abraham"},"url":"https:\/\/globalfraudforensics.com\/fraudxpose\/author\/abraham\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1",456,679,false],"thumbnail":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=201%2C300&ssl=1",201,300,true],"medium_large":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1",456,679,true],"large":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1",456,679,true],"1536x1536":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1",456,679,true],"2048x2048":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2021\/11\/20211126_050446-80364CQGdUMB.jpg?fit=456%2C679&ssl=1",456,679,true]},"uagb_author_info":{"display_name":"Abraham","author_link":"https:\/\/globalfraudforensics.com\/fraudxpose\/author\/abraham\/"},"uagb_comment_info":0,"uagb_excerpt":"Abstract With increasing access to internet and online resources in Nigeria, an exponential increase is observed in the rate of cybercrimes in Nigeria. Cybercrime rates increase geometrically, hence, giving Nigeria notoriety as a nation with a highly insecure cyberspace. In this Seminar Paper as a Subject Matter Expert (SME) with over 19 years wealth of&hellip;","jetpack_shortlink":"https:\/\/wp.me\/p9QymB-28u","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/posts\/8214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/comments?post=8214"}],"version-history":[{"count":0,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/posts\/8214\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/media\/8216"}],"wp:attachment":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/media?parent=8214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/categories?post=8214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/tags?post=8214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}