SlideShare a Scribd company logo
Enigmatic Economy of Cybersecurity
Context and Contours in African Continent
Emerging spectre of
cybersecurity conflicts
Global
Cybersecurity
Marketplace
The Global Cybersecurity Market is projected to reach
$ 152 billion by 2025 on account of increasing threats
of cyber-attacks and data breaches faced by
organizations, which has drastically increased the
need for strong authentication techniques and
cybersecurity solution.
However, the need to adhere to the cybersecurity
standards and regulations can also hamper the
market growth over the next few years. Besides,
shortage of skilled cybersecurity professionals and
high cost of cybersecurity solutions can further
restrict the market growth since many organizations
face budget constraints, especially the SMEs.
Global
Cybercrime
Statistics
According to a widely accepted estimate, cybercrime
costs the world economy the sum of US $ 500 billion,
more than the GDP of South Africa (350.6 billion
dollars) and slightly less than that of Nigeria ( 521.8
billion dollars), the continent's largest economy.
According to estimates, cybercrime costs the Nigerian
economy the sum of US $ 500 million per annum.
According to the United Nations, cybercrime covers
any illegal behavior directed by means of electronic
operations that targets the security of computer
systems and the data processed by them.
According to Microsoft’s Digital Crimes Unit (DCU),
“there are nearly 400 million victims of cyber crime
each year. And cyber crime costs consumers 113
billion dollars a year
Global
Cybercrime
Statistics
According to Microsoft’s estimate, in 2014 about one
half of all adults connected to the Internet were
victims of cybercrime. This costs the world economy
500 billion dollars; 20% of all small and medium-sized
enterprises (SMEs) have been hit.
Cybercrime cost the South African economy an
estimated 573 million dollars. For the Nigerian
economy the cost was estimated to be 500 million
dollars, and for the Kenyan economy, 36 million dollars
Another study conducted by Deloitte and dating back
to 2011 showed that financial institutions in Kenya,
Rwanda, Uganda, Tanzania, and Zambia had sustained
losses of 245 million dollars, attributable to
cyberfraud.
Contours of Cyber
Conflicts in the
global context
State to state engagement in cyberspace
Destructive potential of cyber conflicts
Two Streams of thought :
Cyber conflicts as an important new domain of
military power that threatens to upend traditional
understanding of conflicts
Cyber conflicts as an auxiliary domain of conflict with
little strategic value in isolation from kinetic conflict
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
Transition and
Transformation of
Cybersecurity from
Geekspace to a Battlespace
Key Cybersecurity
Challenges
Lack of adequate and interoperable national and
regional frameworks
Lack of secure software and ICT based applications
Lack of appropriate national and international
organisational structures to deal with cyber incidents.
Lack of information security professionals and skills
within governments : lack of basic awareness among
users.
Lack of international cooperation between industry
experts, law enforcements, regulators, academia and
international organisations to address a global
challenge.
Asymmetric surprise
attacks perpetrated by a
weaker state against a
stronger state!
Africa in Context
Internet penetration in Africa is 39.3 %. There are
126,078,999 internet users in Nigeria. It amounts to
61.2% of the population
Lagos in Nigeria is one of the fastest growing cities in
the world. Forbes reports that mobile usage in
sub-Saharan Africa is more widespread than
electricity.
Africa has one of the youngest population in
developing countries. The median age in Africa is 19.2
years old.
According to Kaspersky Labs, there are 13,842 cyber
attacks daily in South Africa, 570 attacks every hour.
Africa in Context
Kenya reported a dramatic rise in Cybercrimes with 9
million malware attacks in just three months from
October to December 2018.
The African Union Convention also known as Malaboo
Convention has proposed legislation, regulation, and
governance strategies across Africa. Countries such
as Ghana, Kenya, and Mauritius have come forward to
embrace this framework.
Budapest Convention is widely considered as the gold
standard in this context. Only Cabo Verde, Ghana,
Mauritius, Morocco, and Senegal have incorporated it
into the national law.
Budapest
Convention
The Convention on Cybercrime, also known as the
Budapest Convention on Cybercrime or the Budapest
Convention, is the first international treaty seeking to
address Internet and computer crime by harmonizing
national laws, improving investigative techniques, and
increasing cooperation among nations.
The Budapest Convention provides for the
criminalisation of conduct, ranging from illegal access,
data and systems interference to computer-related
fraud and child pornography, procedural law tools to
make investigation of cybercrime and securing of
e-evidence in relation to any crime more effective, and
international police and judicial cooperation on
cybercrime and e-evidence.
As of September 2019, 64 states have ratified the
convention.
Additional
Protocols to the
Convention on
Cybercrime
Additional Protocol to the Convention on Cybercrime,
concerning the criminalisation of acts of a racist and
xenophobic nature committed through computer
systems is an additional protocol to the Council of
Europe Convention on Cybercrime.
This additional protocol was the subject of
negotiations in late 2001 and early 2002. Final text of
this protocol was adopted by the Council of Europe
Committee of Ministers on 7 November 2002 by the
United States Department of Justice by the United
States Department of Justice
UN Convention
Against
Transnational
Organized
Cybercrime (2000)
This treaty, also known as the Palermo Convention,
obligates state parties to enact domestic criminal
offenses that target organized criminal groups and to
adopt new frameworks for extradition, mutual legal
assistance, and law enforcement cooperation.
Although the treaty does not explicitly address cyber
crime, its provisions are highly relevant.
Conventions of the
Rights of the Child
(1989)
Article 34 of the Convention obligates state parties to
protect children from all forms of sexual exploitation and
abuse, including prostitution and pornography.
Cybercrimes in
Africa
Cybersecurity experts estimate that 80 percent of
personal computers on the African continent are
infected with viruses and other malicious software.
Statistics from various sources indicate that Africa is
very prone to cyber-related threats due to the high
number of domains coupled with very weak network
and information security.
South Africa (80 percent) has the third highest number
of cybercrime victims in the world, after Russia (92
percent) and China (84 percent).
Thirty- one percent of these attacks, categorized as
cyber espionage, have hit both large and small
businesses. Individual consumers have also become
vulnerable to viruses and other forms of cyber threats.
Impacts of
Cybercrime
Fraudulent Financial Transactions
Child kidnappings
Terrorist attacks
Loss of Tourism
Internet Infrastructure Damage
Loss of Trust
Economic Impact of
Cybersecurity
As per Norton Cybercrime Report 2012, direct financial
losses totalled an average of $197 per victim world
wide, while globally a grand $110 billion in direct
financial loss was recorded.
There is a strong correlation between cybersecurity
and economic growth.
The study by the International Data Group Connect
estimates that annually, cybercrimes cost the South
African economy $573 million, the Nigerian economy
$200 million, and the Kenyan economy $36 million.
International
Standards
ISO 27001 - Systematic approach to establishing,
implementing, operating, monitoring, reviewing,
maintaining and improving an organisation
information security
COVID -19 and
Cyberattacks
● The COVID-19 pandemic has increased use of
and reliance on the internet as people need to
work and learn from home.
● Cyberattacks have also increased worldwide
during the crisis.
● Governments can address cybersecurity in the
post-pandemic world if they work together to
adjust national frameworks, increase
international cooperation and unify awareness
campaigns.
The COVID-19 pandemic is accelerating digital
transformation and heavier reliance on digital
services. The increased adoption of telework and
distance learning due to “social distancing” have led to
a 50% increase in data traffic in some markets.
COVID -19 and
Cyberattacks
During the crisis, cyberattacks have increased
worldwide, including against critical healthcare
institutions, which have been the target of
ransomware attacks.
Private sector data reveals a 350% surge in phishing
websites since the start of the pandemic.
The United Kingdom and United States have reported
that a growing number of cyber criminals and other
malicious groups are exploiting the situation for their
own personal gain, and cyber criminals have used
stimulus packages as the subject of phishing hoaxes.
Cybersecurity
Frameworks for
Post Pandemic
Political Economy
Countries must become more agile in updating or
developing national cybersecurity strategies, as well
as legal and regulatory framework regarding
cyberspace.
These initiatives must take a multi-stakeholder
approach, including paying close attention to the
construction of incident response capacities in all
sectors. Governments cannot act alone, and the
participation of the technical community and the
private sector are essential to building effective
resilience capabilities.
Harmonizing legislation should also be a priority.
Today, the Budapest Convention is the most global
and inclusive agreement dedicated to fighting
cybercrime. It has been ratified by 55 countries, with
another 10 requesting accession.
Remember !
No one is immune to a cyber
incident or one “bad click.”
In particular, it is of utmost
importance to start teaching
children about cybersecurity.

More Related Content

PPTX
Final presentation cyber security submit copy
PDF
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
DOC
Cyber-Law and Cyber-Crime
PDF
Cyberdefense strategy - Boston Global Forum - 2017
PDF
comm16en01_dafc4
PDF
Cyber savvy (2)
PDF
Delusions of-safety-cyber-savvy-ceo
PDF
Securing Cyber Space- Eljay Robertson
Final presentation cyber security submit copy
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Cyber-Law and Cyber-Crime
Cyberdefense strategy - Boston Global Forum - 2017
comm16en01_dafc4
Cyber savvy (2)
Delusions of-safety-cyber-savvy-ceo
Securing Cyber Space- Eljay Robertson

What's hot (20)

PDF
ICOCI2013: Keynotes 1
PDF
Matt LaVigna - Cyber Security - NCFTA 2017
PDF
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
PDF
Why Digital Forensics as a Career?
DOC
Internet Security Threat
PDF
COMMON GOOD DIGITAL FRAMEWORK
PDF
Organised Crime in the Digital Age
PDF
Aon Cyber Newsletter v10
PDF
Project Cyber Dawn: Libya
PDF
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
PDF
Global Commision on Internet Governance
PDF
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
PDF
Cybersecurity
PPTX
Cyber crime
PDF
NCRIC Analysis of Cyber Security Emergency Management
DOCX
RESEARCH PAPER
PDF
Cataleya-Security-Feature_SAWC_April2016page-20-23
PDF
Symantec Intelligence Report - Oct 2015
PPTX
cyber crime
PDF
Cscu module 11 security on social networking sites
ICOCI2013: Keynotes 1
Matt LaVigna - Cyber Security - NCFTA 2017
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Why Digital Forensics as a Career?
Internet Security Threat
COMMON GOOD DIGITAL FRAMEWORK
Organised Crime in the Digital Age
Aon Cyber Newsletter v10
Project Cyber Dawn: Libya
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
Global Commision on Internet Governance
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
Cybersecurity
Cyber crime
NCRIC Analysis of Cyber Security Emergency Management
RESEARCH PAPER
Cataleya-Security-Feature_SAWC_April2016page-20-23
Symantec Intelligence Report - Oct 2015
cyber crime
Cscu module 11 security on social networking sites
Ad

Similar to Cybersecurity Context in African Continent - Way Forward (20)

DOCX
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
DOCX
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
PDF
CYBER-SECURITY TACTICS IN MITIGATING CYBER-CRIMES: A REVIEW AND PROPOSAL
PDF
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
PDF
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
PDF
CYBER-SECURITY TACTICS IN MITIGATING CYBER-CRIMES: A REVIEW AND PROPOSAL
PDF
EA&SP_GROUP_ASSIGNMENT_1.pdf
DOCX
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
DOCX
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
DOCX
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
PDF
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
DOC
Cyber law and cyber-crime
PPT
Cyber crime in the digital age
PDF
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
PDF
CTO Cybersecurity Forum 2013 Mario Maniewicz
PPTX
The Impact of Technology on the Profession
DOCX
Tarun Gaur On Hacking the Hackers Can We Turn the Tide on Cyber Crime
PDF
Cyber-Terrorism A Wicked Problem - Academic Strive
PPTX
CYBERSECURITY AND DIGITAL POLICY (1).pptx
PPTX
Cyber Crimefffggghjhgdddssdffggyuuuittttffuuuy.pptx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
CYBER-SECURITY TACTICS IN MITIGATING CYBER-CRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBER-CRIMES: A REVIEW AND PROPOSAL
EA&SP_GROUP_ASSIGNMENT_1.pdf
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Cyber law and cyber-crime
Cyber crime in the digital age
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
CTO Cybersecurity Forum 2013 Mario Maniewicz
The Impact of Technology on the Profession
Tarun Gaur On Hacking the Hackers Can We Turn the Tide on Cyber Crime
Cyber-Terrorism A Wicked Problem - Academic Strive
CYBERSECURITY AND DIGITAL POLICY (1).pptx
Cyber Crimefffggghjhgdddssdffggyuuuittttffuuuy.pptx
Ad

More from Gokul Alex (20)

PDF
Blockchain Technology in Banking Services - A Review
PDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
PDF
Digital Innovation and Dynamics of Entrepreneurship
PDF
Decentralised AI and Distributed Ledgers - An Introduction
PDF
R3Corda - Architecture Overview - Concepts and Components
PDF
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
PDF
Creative Careers for Post Pandemic Times
PDF
Imagining Intelligent Information Machines for 2020
PDF
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
PDF
A Concise Introduction to Cryptographic Concepts
PDF
Applying Blockchain Technology for Digital Transformation
PDF
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
PDF
Decentralised AI through Distributed Ledger Technologies
PDF
Cloud Security Engineering - Tools and Techniques
PDF
Quantum Computing - A History in the Making
PDF
Future of Education through Exponential and Emerging Technologies
PDF
Cloud Security - Emerging Facets and Frontiers
PPTX
Introduction to Blockchain Business Models
PDF
Blockchain and Cryptography - A Primer
PDF
Introduction to Blockchain Governance Models
Blockchain Technology in Banking Services - A Review
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
Digital Innovation and Dynamics of Entrepreneurship
Decentralised AI and Distributed Ledgers - An Introduction
R3Corda - Architecture Overview - Concepts and Components
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Creative Careers for Post Pandemic Times
Imagining Intelligent Information Machines for 2020
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
A Concise Introduction to Cryptographic Concepts
Applying Blockchain Technology for Digital Transformation
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Decentralised AI through Distributed Ledger Technologies
Cloud Security Engineering - Tools and Techniques
Quantum Computing - A History in the Making
Future of Education through Exponential and Emerging Technologies
Cloud Security - Emerging Facets and Frontiers
Introduction to Blockchain Business Models
Blockchain and Cryptography - A Primer
Introduction to Blockchain Governance Models

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Cybersecurity Context in African Continent - Way Forward

  • 1. Enigmatic Economy of Cybersecurity Context and Contours in African Continent
  • 3. Global Cybersecurity Marketplace The Global Cybersecurity Market is projected to reach $ 152 billion by 2025 on account of increasing threats of cyber-attacks and data breaches faced by organizations, which has drastically increased the need for strong authentication techniques and cybersecurity solution. However, the need to adhere to the cybersecurity standards and regulations can also hamper the market growth over the next few years. Besides, shortage of skilled cybersecurity professionals and high cost of cybersecurity solutions can further restrict the market growth since many organizations face budget constraints, especially the SMEs.
  • 4. Global Cybercrime Statistics According to a widely accepted estimate, cybercrime costs the world economy the sum of US $ 500 billion, more than the GDP of South Africa (350.6 billion dollars) and slightly less than that of Nigeria ( 521.8 billion dollars), the continent's largest economy. According to estimates, cybercrime costs the Nigerian economy the sum of US $ 500 million per annum. According to the United Nations, cybercrime covers any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. According to Microsoft’s Digital Crimes Unit (DCU), “there are nearly 400 million victims of cyber crime each year. And cyber crime costs consumers 113 billion dollars a year
  • 5. Global Cybercrime Statistics According to Microsoft’s estimate, in 2014 about one half of all adults connected to the Internet were victims of cybercrime. This costs the world economy 500 billion dollars; 20% of all small and medium-sized enterprises (SMEs) have been hit. Cybercrime cost the South African economy an estimated 573 million dollars. For the Nigerian economy the cost was estimated to be 500 million dollars, and for the Kenyan economy, 36 million dollars Another study conducted by Deloitte and dating back to 2011 showed that financial institutions in Kenya, Rwanda, Uganda, Tanzania, and Zambia had sustained losses of 245 million dollars, attributable to cyberfraud.
  • 6. Contours of Cyber Conflicts in the global context State to state engagement in cyberspace Destructive potential of cyber conflicts Two Streams of thought : Cyber conflicts as an important new domain of military power that threatens to upend traditional understanding of conflicts Cyber conflicts as an auxiliary domain of conflict with little strategic value in isolation from kinetic conflict
  • 9. Transition and Transformation of Cybersecurity from Geekspace to a Battlespace
  • 10. Key Cybersecurity Challenges Lack of adequate and interoperable national and regional frameworks Lack of secure software and ICT based applications Lack of appropriate national and international organisational structures to deal with cyber incidents. Lack of information security professionals and skills within governments : lack of basic awareness among users. Lack of international cooperation between industry experts, law enforcements, regulators, academia and international organisations to address a global challenge.
  • 11. Asymmetric surprise attacks perpetrated by a weaker state against a stronger state!
  • 12. Africa in Context Internet penetration in Africa is 39.3 %. There are 126,078,999 internet users in Nigeria. It amounts to 61.2% of the population Lagos in Nigeria is one of the fastest growing cities in the world. Forbes reports that mobile usage in sub-Saharan Africa is more widespread than electricity. Africa has one of the youngest population in developing countries. The median age in Africa is 19.2 years old. According to Kaspersky Labs, there are 13,842 cyber attacks daily in South Africa, 570 attacks every hour.
  • 13. Africa in Context Kenya reported a dramatic rise in Cybercrimes with 9 million malware attacks in just three months from October to December 2018. The African Union Convention also known as Malaboo Convention has proposed legislation, regulation, and governance strategies across Africa. Countries such as Ghana, Kenya, and Mauritius have come forward to embrace this framework. Budapest Convention is widely considered as the gold standard in this context. Only Cabo Verde, Ghana, Mauritius, Morocco, and Senegal have incorporated it into the national law.
  • 14. Budapest Convention The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. The Budapest Convention provides for the criminalisation of conduct, ranging from illegal access, data and systems interference to computer-related fraud and child pornography, procedural law tools to make investigation of cybercrime and securing of e-evidence in relation to any crime more effective, and international police and judicial cooperation on cybercrime and e-evidence. As of September 2019, 64 states have ratified the convention.
  • 15. Additional Protocols to the Convention on Cybercrime Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems is an additional protocol to the Council of Europe Convention on Cybercrime. This additional protocol was the subject of negotiations in late 2001 and early 2002. Final text of this protocol was adopted by the Council of Europe Committee of Ministers on 7 November 2002 by the United States Department of Justice by the United States Department of Justice
  • 16. UN Convention Against Transnational Organized Cybercrime (2000) This treaty, also known as the Palermo Convention, obligates state parties to enact domestic criminal offenses that target organized criminal groups and to adopt new frameworks for extradition, mutual legal assistance, and law enforcement cooperation. Although the treaty does not explicitly address cyber crime, its provisions are highly relevant.
  • 17. Conventions of the Rights of the Child (1989) Article 34 of the Convention obligates state parties to protect children from all forms of sexual exploitation and abuse, including prostitution and pornography.
  • 18. Cybercrimes in Africa Cybersecurity experts estimate that 80 percent of personal computers on the African continent are infected with viruses and other malicious software. Statistics from various sources indicate that Africa is very prone to cyber-related threats due to the high number of domains coupled with very weak network and information security. South Africa (80 percent) has the third highest number of cybercrime victims in the world, after Russia (92 percent) and China (84 percent). Thirty- one percent of these attacks, categorized as cyber espionage, have hit both large and small businesses. Individual consumers have also become vulnerable to viruses and other forms of cyber threats.
  • 19. Impacts of Cybercrime Fraudulent Financial Transactions Child kidnappings Terrorist attacks Loss of Tourism Internet Infrastructure Damage Loss of Trust
  • 20. Economic Impact of Cybersecurity As per Norton Cybercrime Report 2012, direct financial losses totalled an average of $197 per victim world wide, while globally a grand $110 billion in direct financial loss was recorded. There is a strong correlation between cybersecurity and economic growth. The study by the International Data Group Connect estimates that annually, cybercrimes cost the South African economy $573 million, the Nigerian economy $200 million, and the Kenyan economy $36 million.
  • 21. International Standards ISO 27001 - Systematic approach to establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organisation information security
  • 22. COVID -19 and Cyberattacks ● The COVID-19 pandemic has increased use of and reliance on the internet as people need to work and learn from home. ● Cyberattacks have also increased worldwide during the crisis. ● Governments can address cybersecurity in the post-pandemic world if they work together to adjust national frameworks, increase international cooperation and unify awareness campaigns. The COVID-19 pandemic is accelerating digital transformation and heavier reliance on digital services. The increased adoption of telework and distance learning due to “social distancing” have led to a 50% increase in data traffic in some markets.
  • 23. COVID -19 and Cyberattacks During the crisis, cyberattacks have increased worldwide, including against critical healthcare institutions, which have been the target of ransomware attacks. Private sector data reveals a 350% surge in phishing websites since the start of the pandemic. The United Kingdom and United States have reported that a growing number of cyber criminals and other malicious groups are exploiting the situation for their own personal gain, and cyber criminals have used stimulus packages as the subject of phishing hoaxes.
  • 24. Cybersecurity Frameworks for Post Pandemic Political Economy Countries must become more agile in updating or developing national cybersecurity strategies, as well as legal and regulatory framework regarding cyberspace. These initiatives must take a multi-stakeholder approach, including paying close attention to the construction of incident response capacities in all sectors. Governments cannot act alone, and the participation of the technical community and the private sector are essential to building effective resilience capabilities. Harmonizing legislation should also be a priority. Today, the Budapest Convention is the most global and inclusive agreement dedicated to fighting cybercrime. It has been ratified by 55 countries, with another 10 requesting accession.
  • 25. Remember ! No one is immune to a cyber incident or one “bad click.” In particular, it is of utmost importance to start teaching children about cybersecurity.