SlideShare a Scribd company logo
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Workshop organised by:
By
Abdul-Hakeem Ajijola
info@consultancyss.com
@ the
Bon Hotel Grand Pela, located at Plot 649, Cadastral Zone, Durumi, Abuja.
15 June 2017
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
 Cybersecurity
 Protection of assets against
risks within, & from, the
electronic environment
 Risk Management
 An Economic Problem
CYBERSECURITY VS. CYBER-CRIME
 Cyber-Crime
 Conduct prohibited by law, with
prescribed punishment, carried out
using digital systems like
computers, electronic, ancillary
devices, processes and/ or
procedures
CYBERSECURITY VS. CYBER-CRIME
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
WHY DO PEOPLE COMMIT CYBER CRIMES
Source: http://it.toolbox.com/people/kevjudge/
Financial
Make money
fraudulently or steal
money outright
Political
Cyber War: one
nation attacking
another
Hacktivist
Personal
Enjoy the
challenge & risk
Disgruntled
current or former
employees
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
7 Principles
of
Cybercrime
• Don't get caught -- stay untraceable
• Don't Work too hard -- take the easy
path
• Follow the money
• If you can't take out the target, move
the attack to a coupled dependency of
the target -- cause confusion/
misdirection
• Always build cross jurisdictional attack
vectors
• Attack people who won't/ can't
prosecute you
• Stay below the pain threshold – e.g.
below insurance limits
UNDERSTAND BAD ACTORS TO KNOW HOW TO PUSH BACK
Source: Barry Greene www.senki.org
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
0.80% of Nigeria’s GDP is lost to cybercrime
Equivalent to Cement sector
USA Center for Strategic & International Studies & information security firm McAfee, a subsidiary of Intel, titled
“Net Losses: Estimating the Global Cost of Cybercrime; Economic impact of cybercrime II”
http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
Nigeria’s GDP estimated by “TradingEconomics.com” to be $568.51 billion in 2014.
$450 million, equivalent to N89.55 billion annual
direct losses to the Nigerian economy.
Trading Economics http://www.tradingeconomics.com/nigeria/gdp
97,984,736 used the internet on a daily basis in
November, 2015
•Nigerian Communications Commission Internet Subscriber Data
http://www.ncc.gov.ng/index.php?option=com_content&view=article&id=68&Itemid=70
45.3% of internet users in Nigeria suffered attack in
the third quarter of 2015.
•Kaspersky Lab, 2015 survey, for Third quarter 2015 IT Threat Evolution report http://bizwatchnigeria.ng/nigerias-cyber-
malware-attacks-reach-45-3-in-q3-2015/
09 Jan 2016, “Anonymous hacker collective has
started a cyber-campaign against the government of
Nigeria, accusing it of corruption, greed, & theft.”
•Catalin Cimpanu http://news.softpedia.com/news/anonymous-starts-cyberattacks-against-nigerian-government-498676.shtml
.NG STATISTICS
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Draft 419 Letter/
e-mail
Communication Exchange
419
Perpetrator
Nigeria 419 Cyber-crime – Life Cycle
E-mail Harvester
Mass-mail
Solution
Targeted victim
Response
Fake Document
Transfer of Funds
Adapted from flowchart originally produced by Femi Oyesanya & Vesper Owei
Processing/
Storage
Discard
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Volume of cybercrime-related
complaints received in West
Africa from 2013 to 2015
Volume of cybercrime-related
complaints that led to arrests in West
Africa from 2013 to 2015
Cybercrime-related Complaints Received in West Africa
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
LOCATIONS OF BUSINESS EMAIL COMPROMISE (BEC) FRAUD TARGET COMPANIES IN 2016
Research on BEC fraud (that may involve next-
level cybercriminals from West Africa) showed
that the most-targeted country was the United
States, closely followed by China.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
INDUSTRIES TARGETED BY BEC FRAUD CAMPAIGNS IN 2016
Manufacturing industry was the most
targeted by BEC fraudsters
Possibly due to the fact that manufacturing
companies typically supply resources to smaller
companies and so engage in a lot of email
conversations and transactions that may
contain invoice details.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
CYBERCRIMINAL RELATIONSHIP BREAKDOWN
The INTERPOL survey also revealed that almost half of the West African
cybercriminals profiled only knew their peers online. This characteristic is
more applicable to next-level cybercriminals, however, than Yahoo boys.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
TYPICAL ROLES SEEN IN A CYBERCRIMINAL OPERATION ACCORDING TO LAW ENFORCEMENT RESPONSES
 Leader,
 Fraud operator who actually engages
in social engineering activities,
 Financial operator who manages
monetary transactions,
 IT technician who takes care of the
operational infrastructure, and
 Money mule. The small number of
money mule arrests could be due to
the fact that many of the mules
reside outside West Africa (typically
where they are required), which
poses jurisdiction and proportionate
resource considerations for law
enforcement agencies.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
WEST AFRICAN CYBERCRIMINAL TOOLS
Email-Automation and Phishing Tools which gather target email addresses using free and
readily available tools:
“Email Extractor Lite” an
online tool hosted at evil-
brain.org.
“Bulk Email Extractor” crawls
through web pages to gather
email addresses
GSA Email Spider, which
harvests email addresses
aided by search engines.
Automate spam sending
Hack legitimate servers then
use tools such as
PHPMailer—an open source,
full-featured email-creation
and transfer class tool
Using a compromised
mailbox to send out spam
with malicious attachments
to potential victims
Set up fake domains to set
up several mailboxes for
spamming, they also use
these to set up fake company
web pages
Banking Trojans to gather
victims’ credentials.
Ice IX,22
Remote Administrative Tools
(RATs) and keyloggers like
Predator Pain and Limitless.
Ready-made malware
supports the nontechnical
cybercriminals
Avaliable from global
underground markets.
Prices, ranging from US$20
to US$100, or sometime free
with how-to guides and
troubleshooting help.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
CYBERCRIMINALS’ PREFERRED COMMUNICATION TOOLS
 Operate in tight-knit groups:
 Each group member constantly communicates with peers—
sharing targets, compromised email accounts, tools, and best
practices.
 Attack tools
are usually
restricted to
technical
communities
or only
underground
markets
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
PORTALS USED BY CYBERCRIMINALS TO TARGET VICTIMS
Portals used by cybercriminals to
target businesses
Portals used by cybercriminals to
target individuals
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
ARE WE BOUND TO SEE A WEST AFRICAN UNDERGROUND MARKET?
Yes
West African cybercriminals are clearly shifting to more
elaborate crimes, complex operations, and business
models—Business Email Compromise (BEC) and tax fraud
Armed with their social engineering expertise and
ingenuity, and augmented by tools and services
(keyloggers, RATs, crypters, counter-AV services, etc.),
West African cybercriminals are stealing large amounts of
money via crimes targeting individuals and companies
worldwide
Cybercrime in West Africa is real: Simplest attacks enabled
by very clever social engineering tactics have crippled all
types of companies, regardless of size.
A West African underground market is emerging
and stronger law enforcement actions are needed to
stop the evolution of a sophisticated market.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market”
https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
CHALLENGES: RECURRING INVESTIGATION ROADBLOCKS
Possible reasons for these challenges include:
Lack of logistical resources and cybercrime training for local
law enforcement agents
Lack of cybercrime laws in the country or region concerned
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
19-Dec-15 Federal Court of Appeal
www.courtofappeal.gov.ng Protest of to deaths of
Shiite members in Zaria during clash with Nigerian
Army
11 Jul 2014 Independent National Electoral
Commission by TeaM Nigerian Cyber Army,
https://www.facebook.com/naijacyberarmy
Support of Kidnapped Chibok Girls
6 August 2015 Fed Poly Idah
http://www.fepoda.edu.ng &
http://www.federalpolyidah.edu.ng by
Hackinthunder. Someone aggrieved with the
institution
01-Oct-14 Nigeria's House of Representatives The
warning, which has been on the page for much of
the day, ends saying "No hard feelings though this
is just a security reminder.
23-Apr-15 Globacom www.gloworld.com by The
Nigerian Cyber Hunters led by HYPER-DARK a.k.a
Brunolin The motive, & reason behind the hack is
unknown.
28-Oct-11 Economic Financial Crimes Commission
(EFCC) www.efccnigeria.org by Naija Cyber
Hacktivist “Operation: Say No To Internet
Censorship”
EXAMPLES OF DEFACED NIGERIAN WEBSITES
BETWEEN 13 APRIL 2015 & 01 FEB 2016, ZONE-H RECEIVED NOTIFICATIONS OF 3,599
BREACHES OF NIGERIA (.NG) DOMAINS OF WHICH 2,518 WEBSITES WERE DEFACED.
ZONE-H HTTP://WWW.ZONE-H.ORG/ARCHIVE/FILTER=1/FULLTEXT=1/DOMAIN=NIGERIA
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
http://ghana.gov.gh/ - http://zone-
h.org/mirror/id/23569401
http://www.mfa.gov.gh/ - http://zone-
h.org/mirror/id/23569429
http://moc.gov.gh/ - http://zone-
h.org/mirror/id/23569666
http://scholarships.gov.gh/ - http://turk-
h.org/defacement/view/560295/scholarships.gov.gh/
http://navy.mil.gh/ - http://turk-
h.org/defacement/view/560287/navy.mil.gh/
http://nss.gov.gh/ - http://zone-
h.org/mirror/id/23569393
http://nfed.gov.gh/ - http://zone-
h.org/mirror/id/23569410
http://www.motcca.gov.gh/ - http://zone-
h.org/mirror/id/23569549
http://schoolfeeding.gov.gh/ - http://turk-
h.org/defacement/view/560288/schoolfeeding.gov.gh/
http://mwrwh.gov.gh/ - http://turk-
h.org/defacement/view/560292/mwrwh.gov.gh/
http://www.gida.gov.gh/site/p_ongoing -
http://zone-h.org/mirror/id/23569660
GHANA IS NOT IMMUNE TO CYBERCRIME
National Computer Incident Response Team CIRT √ √ √
http://www.modernghana.com/news/523954/1/ghana-upbeat-against-cyber-attacks.html#
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
• Cybersecurity is Risk Management
• Strong passwords prevent most attacks
• A new device is not necessarily safe
• ALL software has security vulnerabilities
• Every website & app should use HTTPS
• Cloud is not safe: new security problems
• Software updates crucial for protection
• Hackers are not criminals per-se
• Cyberattacks & cyberterrorism are rare
• Darknet (illegal hidden) ≠ Deep web (not
indexed)
Facts About Computer Security
Source: http://gizmodo.com/9-facts-about-computer-security-that-experts-wish-you-k-1686817774
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
WHO ELSE IS USING CYBERSPACE?
– Daesh: Islamic State
– Boko Haram: Jama’atu
Ahlis-Sunnah Lid Da’awati
Wal Jihad [People involved
in Call to Islam & Jihad]
– MEND: Movement for the
Emancipation of the Niger
Delta
– FARC–EP & FARC:
Revolutionary Armed Forces
of Colombia—People's Army
– Aum Shinrikyo Japanese
doomsday cult
Values, Propaganda, Financing & Recruitment
Pentagon Manipulates Social Media for Propaganda Purposes
Source http://www.globalresearch.ca/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes/25719
Not all cyber-crimes are acts of cyber-terrorism
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
CYBER TERRORISM FRAMEWORK AS DEFINED BY YUNOS & AHMAD
Source: Reference: R. Ahmad, Z. Yunos, S. Sahib, & M. Yusoff, “Perception on Cyber Terrorism: A Focus Group Discussion Approach,” Journal of
Information Security, vol. 03, no. 03, pp. 231-237, 2012
Cyberspace
(includes the Internet,
telecommunications
networks, computer
systems, & embedded
processors & controllers)
• Borderless
 ICT/cyber
technology
 Cyber
media
 Political
 Ideological
 Social
 Economic
 Critical National Information
Infrastructure computer system
 Critical Infrastructure
 Civilian population`
 Mass
disruption
or seriously
interfere
critical
services
operation
 Cause fear,
death or
bodily injury
 Severe
economic
loss
 Unlawful
means
 Illegal acts
Cyber
Terrorism
Target
Impact
Method
of Action
Domain
Tools of
Attack
Motivation
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Que
pouvons-
nous faire
O que
podemos
fazer
‫نستطيع‬ ‫ماذا‬
‫نفعل‬ ‫ان‬
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
CYBER “THREAT” SPACE
Cyberspace is an environment that
combines
• People, Processes & Technology
Cyberspace is not borderless:
• Perceived as borderless because its
borders are seamless to the end user.
• Every country has its own cyberspace
which is defined by its national
infrastructure.
Implications:
• Threat actors carry out their activities in
an apparently seamless environment,
• National Security & Military Operatives
are constrained by issues of jurisdiction.
Nigeria through the National Cybersecurity
Policy & the National Cybersecurity
Strategy recognizes cyberspace as the 5th
domain of warfare after Land, Sea, Air &
Outer-space.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Develop, nurture &
patronize a home
grown ICT economic
sector
Generate employment
(job creation)
Increase incomes &
Government revenue
Promote Knowledge
Generation &
empowered Human
Resources
Foster confidence in
our economies & our
Broadband as well as
related ICT
infrastructure
Enable the Region to
meet it’s national
development agenda
Enhance human safety
& national wellbeing
Foster broader
adaptation of
knowledge “info-
structure” for broader
& even socio-economic
development
Reduce the cost of ICT
services by ensuring
that they carry only
what they are
designated to carry
REGIONAL STRATEGIC INTEREST
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Goals:Objectives
Critical Success
Factors
Barriers
Initiatives/ Quick wins
Priorities
Develop a Strategic Plan
 Factor and Harmonise ECOWAS Members Interests
 Consider Member States needs
 Build on ongoing initiatives in member states (Nigeria, Ghana,
Cote d’Ivoire)
 Activate ECOWAN E3C (Command, Control and Communication)
ECONOC (ECOWAS Network Operations Centre)
 Leverage Africa and South-South Resources (Tunisia, Malaysia)
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Standards &
Regulations
Activities
Outcomes
Capacity
Building
Activities
Outcomes
Accreditation
and
Examinations
Activities
Outcomes
Cooperation
(Internal,
Domestic &
International)
Activities
Outcomes
Promotion &
Awareness
Activities
Outcomes
STRATEGIC PILLARS: ACTIVITIES & OUTCOMES FOR EACH THEMATIC AREA
 Activities with Timelines & Milestones
 Outcomes & Key Performance Indicators for Monitoring &
evaluation
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
2018-2023
Business Plan
2018-2023
planned Milestones
& Key Performance
Indicators (KPIs)
Strategy & Road
Map
ECOWAS KPIs
Member States
KPIs
Ministries
Departments
Agencies and
Private Sector
KPIs
Build Strategic
Relationships with
Partners
Partner on
Awareness and
Capacity Building
Events
Networking Events
for MDA
TO DO
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Like most of the World, Nigeria is building an electronic future upon
capabilities, processes & infrastructure that we have not yet
understood how to protect.
July 2013, an Irish “Gay” Hacker took down the official website
of the Federal Republic of Nigeria www.nigeria.gov.ng in protest
an anti-gay bill that was passed by the Nigerian Senate.
05 February 2015, the President launched:
• National Cybersecurity Policy
• National Cybersecurity Strategy
On 16 May 2015, the President signed the Cybercrime
(Prohibition Prevention, etc.,) Act 2015 into law
• 50 things to know about the Nigeria Cybercrimes (Prohibition,
Prevention, Etc.,) Act, 2015
https://www.linkedin.com/pulse/article/6028503695673614336/edit?articleId=6028503695673614336&trk=pulse-art-edit_btn
“I also wish to assure the wider international community of our
readiness to cooperate & help to combat threats of ….. Cyber
crime…..” - President Muhammadu Buhari 29 May 2015
inauguration speech
NIGERIA CYBERSECURITY: THE STATE OF PLAY
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
CYBERSECURITY RESILIENCE MATURITY FRAMEWORK
Source: John Gilligan, President and Chief Operating Officer at Schafer Corporation
Maturity
Descriptor
Employment of
Security Controls
Security Tailored
to Mission
Participate in
Information
Sharing (Threat/
Vulnerability)
Response to
Cyber Threats
Resilience to
Cyber Attacks
Level 5:
Resilient
Augment CSC
Based on
Mission
Mission
Assurance
Focused
Real-time
Response to
Inputs
Anticipate
Threats
Operate
through
Sophisticated
Attacks
Level 4:
Dynamic
Augment CSC
Based on
Mission
Mission
Focused
Real-time
Response to
Inputs
Rapid Reaction
to Threats
Able to
Respond to
Sophisticated
Attacks
Level 3:
Managed
CSC Integrated
and
Continuously
Monitored
Partially
Mission
Focused
Respond to
Information
Inputs
Respond to
Attacks After
the Fact
Protection
Against
Unsophisticated
Attacks
Level 2:
Performed
Foundational
Critical Security
Controls (CSC)
Implemented
Mission
Agnostic
Inconsistent
Response to
Information
Inputs
Respond to
Attacks After
the Fact
Some
Protection
Against
Unsophisticated
Attacks
Level 1:
No
Resilience
Inconsistent
Deployment of
Security
Controls
None None No Response Susceptible to
Unsophisticated
Attacks
Step1:CriticalSecurity
Controls(CSC)
Step2:Address
Sophisticated
Attacks
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
CORE ORGANIZATIONAL STRATEGY
Source: UK Government Cyber Essentials Scheme https://www.itgovernance.co.uk/cyber-essentials-scheme
APPROACH
• Ensure your cyber security is as effective as
possible without compromising the usability
of your systems.
• Ensure you have robust business continuity
plans in place that cover your information
assets so that you can resume normal
operations as soon as possible if an attack
is successful.
Follow
International
Standards as
guides
• ISO27001: Implementation of an
Information Security Management System
(ISMS);
• ISO22301: Implementation of a Business
Continuity Management System (BCMS).
• ISO27031, Applies specifically to
information and communication technology
business continuity, and the requirements
of ISO27001 and ISO22301 are mutually
compatible.
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
20 CRITICAL CYBER SECURITY CONTROLS
Source: Centre for Internet Security https://www.cisecurity.org/controls/
Critical Cyber Security Controls
Eliminate majority of
organization's
vulnerabilities
Inventory of Authorized
and Unauthorized Devices
Inventory of Authorized
and Unauthorized
Software
Secure Configurations for
Hardware and Software
Continuous Vulnerability
Assessment and
Remediation
Controlled Use of
Administrative Privileges
Secure your entire
organization against most
pervasive threats
Maintenance, Monitoring, and Analysis of
Audit Logs
Email and Web Browser Protections
Malware Defenses
Limitation and Control of Network Ports
Data Recovery Capability
Secure Configurations for Network Devices
Boundary Defense
Data ProtectionControlled Access Based on the Need to Know
Wireless Access Control
Account Monitoring and Control
Security Skills Assessment and Appropriate
Training to Fill Gaps
Application Software Security
Incident Response and Management
Penetration Tests and Red Team Exercises
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
!THE FUTURE IS MOBILE & THE FUTURE IS NOW
Source: http://www.ncc.gov.ng/index.php?option=com_content&view=article&id=125:subscriber-statistics&catid=65:industry-
information&Itemid=73
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Heather Adkins,
director, information
security, Google
Ann Barron-DiCamillo,
director of US-CERT,
U.S. Department of
Homeland Security
Lara Nwokedi, Head of
Information Security
management First Bank
Plc.
Kathy Fithen, Chief
Privacy Officer (CPO),
Coca-Cola
Roxane Divol, General
Manager (GM) of
Symantec’s Trust
Services
Rakiya Shuaibu-
Mohammed, DD IT and
oversees Cybersecurity
CBN
Melinda Rogers, CISO,
Department of Justice
Latha Maripuri, SVP &
global CISO, News Corp.
Funke Opeke, founded
Main Street
Technologies & C.E.O.
MainOne
Julie Cullivan, senior
vice president of
business operations &
chief information
officer, FireEye
Eva Chen, CEO, Trend
Micro
Zareefa Mustapha PhD, ,
Lecturer, Baze
University
WOMEN IN IT SECURITY: POWER PLAYERS
Source: http://www.scmagazine.com/women-in-it-security-10-power-players/printarticle/421364/
Source: https://www.csc.tntech.edu/wicys/
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
Antimalware:
•"Malware are malevolent software such as viruses, worms, spyware, &
others that are designed to cause harm to computer based systems
including stealing information
•Antivirus is a software that detects & destroys computer viruses"
Data loss prevention
(DLP):
•A strategy to ensure that users do not send unauthorised information
outside a given network
DDOS Mitigation:
•A set of practices for countering distributed denial-of-service (DDoS)
attacks on Internet facing networks by protecting the target &
intermediary networks.
Disaster Recovery &
Business Continuity:
•Processes that help organizations prepare for disruptive events including
backing up data & having alternate platforms & operational sites.
Encryption:
•A process of encoding messages or information so that only those
authorized can read it
Firewall:
•Like the wall around a building/ compound a Computer/ Network Firewall
blocks unauthorized access while permitting legitimate communication
Identity Management
Access (IAM):
•Framework for the management of electronic identities
Intrusion prevention
systems (IPS):
•Monitor network and/or system activities for malicious activity
Risk & Compliance
Management:
•Ways to approach IT Governance, risk management, & compliance with
standards
Security/ Vulnerability
Management:
•The cycle of identifying, classifying, prioritising, reporting, remediating, &
mitigating computer/ network vulnerabilities
Unified Threat Management
(UTM)/ Unified Security
Management (USM):
•Comprehensive & often cost-effective set of network gateway protection
solutions
Web Filtering:
•A filtering tool that screens incoming web pages to determine if all or part
of it should be displayed
AFRICA CYBER SECURITY MARKET WORTH $0.92 BILLION IN 2015 & $2.32 BILLION BY 2020
Source: http://www.marketsandmarkets.com/PressReleases/africa-cyber-security.asp
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
West Africa must get Ready to Counter growing cybersecurity and cyber
Crime Challenges
• Education:
• Primary, Secondary, Vocational and Tertiary
• Lay Digital Society’s foundation’s:
• Positive regulation,
• Tax Incentives and
• Some Government investment in specific areas
• Create Centers of Knowledge:
• Educational and/ or Research Institutes
Year 2020 an MSME based Cybersecurity Solutions economic sub-sector
that enables a Cyber Resilient Digital Society should be in place,
principally driven by suitably empowered young knowledge workers
• Highly skilled Cybersecurity knowledge workers will constitute a
cyber-guard that the nation will leverage, in times of national cyber
emergencies
• We can succeed by working together
CONCLUSION: PROPOSITION FOR ADOPTION
Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com
for
your
attention
Merci de
votre
attention
Obrigado
pela sua
atenção
‫على‬ ‫شكرا‬
‫االهتمام‬
info@consultancyss.com

More Related Content

PDF
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PDF
Digital Threat Landscape
PDF
Modern Adversaries (Amplify Partners)
PDF
HE Mag_New Cyber Threats_ITSource
PPTX
Year of pawnage - Ian trump
PPTX
Adrian Ifrim - prezentare - Cyber Security Trends 2020
PDF
2015 Global Threat Intelligence Report Executive Summary | NTT i3
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Updated Cyber Security and Fraud Prevention Tools Tactics
Digital Threat Landscape
Modern Adversaries (Amplify Partners)
HE Mag_New Cyber Threats_ITSource
Year of pawnage - Ian trump
Adrian Ifrim - prezentare - Cyber Security Trends 2020
2015 Global Threat Intelligence Report Executive Summary | NTT i3

What's hot (20)

PDF
Ict forensics and audit bb
PPTX
Cyber Insecurity --The battle to protect data rages on as hackers find new wa...
PDF
A Joint Study by National University of Singapore and IDC
DOCX
Cybercriminals Are Lurking
PDF
State of Cyber Crime in Banking Sector Today: Threats and Solutions
PDF
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
DOCX
Cybercrime blog
PDF
Little book of cyber scams
PPTX
Data Breaches. Are you next? What does the data say?
PDF
Precious ore, precious data
PDF
BLURRING BOUNDARIES
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
PDF
2010q1 Threats Report
PPTX
Cyber war a threat to indias homeland security 2015
DOC
111cyber crimes
PDF
Cybercrime in Iraq
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PDF
Cyber security for ia and risk 150601
PDF
IMC 618 - Public Relations Campaign
PDF
Mobile malware and enterprise security v 1.2_0
Ict forensics and audit bb
Cyber Insecurity --The battle to protect data rages on as hackers find new wa...
A Joint Study by National University of Singapore and IDC
Cybercriminals Are Lurking
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Cybercrime blog
Little book of cyber scams
Data Breaches. Are you next? What does the data say?
Precious ore, precious data
BLURRING BOUNDARIES
CII Whitepaper India Cyber Risk & Resilience Review 2018
2010q1 Threats Report
Cyber war a threat to indias homeland security 2015
111cyber crimes
Cybercrime in Iraq
The 10 Fastest Growing Cyber Security Companies of 2017
Cyber security for ia and risk 150601
IMC 618 - Public Relations Campaign
Mobile malware and enterprise security v 1.2_0
Ad

Similar to ECOWAS Cybersecurity Strategy Workshop (20)

PDF
Network Security
PPTX
Understanding the new modus operandi of cybercriminals
PPTX
Cybersecurity & the Board of Directors
PPTX
7 mike-steenberg-carlos-lopera-us-bank
PDF
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
PPTX
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
PPTX
Cybercrime in Nigeria - Technology and Society
PPTX
Cybercrime in Nigeria - Technology and Society
PDF
Insecure mag-33
PDF
The Rise of Cybercrime 1970s - 2010
PDF
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
PDF
20120329 Cybercrime threats on e-world
PDF
Cybersecurity
PDF
Cyber Resilience
PPT
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PDF
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
PPT
Cyber Crime
Network Security
Understanding the new modus operandi of cybercriminals
Cybersecurity & the Board of Directors
7 mike-steenberg-carlos-lopera-us-bank
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
Insecure mag-33
The Rise of Cybercrime 1970s - 2010
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
20120329 Cybercrime threats on e-world
Cybersecurity
Cyber Resilience
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Cyber Crime
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25-Week II
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Assigned Numbers - 2025 - Bluetooth® Document
Per capita expenditure prediction using model stacking based on satellite ima...

ECOWAS Cybersecurity Strategy Workshop

  • 1. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Workshop organised by: By Abdul-Hakeem Ajijola info@consultancyss.com @ the Bon Hotel Grand Pela, located at Plot 649, Cadastral Zone, Durumi, Abuja. 15 June 2017
  • 2. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com  Cybersecurity  Protection of assets against risks within, & from, the electronic environment  Risk Management  An Economic Problem CYBERSECURITY VS. CYBER-CRIME  Cyber-Crime  Conduct prohibited by law, with prescribed punishment, carried out using digital systems like computers, electronic, ancillary devices, processes and/ or procedures CYBERSECURITY VS. CYBER-CRIME
  • 3. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com WHY DO PEOPLE COMMIT CYBER CRIMES Source: http://it.toolbox.com/people/kevjudge/ Financial Make money fraudulently or steal money outright Political Cyber War: one nation attacking another Hacktivist Personal Enjoy the challenge & risk Disgruntled current or former employees
  • 4. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com 7 Principles of Cybercrime • Don't get caught -- stay untraceable • Don't Work too hard -- take the easy path • Follow the money • If you can't take out the target, move the attack to a coupled dependency of the target -- cause confusion/ misdirection • Always build cross jurisdictional attack vectors • Attack people who won't/ can't prosecute you • Stay below the pain threshold – e.g. below insurance limits UNDERSTAND BAD ACTORS TO KNOW HOW TO PUSH BACK Source: Barry Greene www.senki.org
  • 5. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com 0.80% of Nigeria’s GDP is lost to cybercrime Equivalent to Cement sector USA Center for Strategic & International Studies & information security firm McAfee, a subsidiary of Intel, titled “Net Losses: Estimating the Global Cost of Cybercrime; Economic impact of cybercrime II” http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf Nigeria’s GDP estimated by “TradingEconomics.com” to be $568.51 billion in 2014. $450 million, equivalent to N89.55 billion annual direct losses to the Nigerian economy. Trading Economics http://www.tradingeconomics.com/nigeria/gdp 97,984,736 used the internet on a daily basis in November, 2015 •Nigerian Communications Commission Internet Subscriber Data http://www.ncc.gov.ng/index.php?option=com_content&view=article&id=68&Itemid=70 45.3% of internet users in Nigeria suffered attack in the third quarter of 2015. •Kaspersky Lab, 2015 survey, for Third quarter 2015 IT Threat Evolution report http://bizwatchnigeria.ng/nigerias-cyber- malware-attacks-reach-45-3-in-q3-2015/ 09 Jan 2016, “Anonymous hacker collective has started a cyber-campaign against the government of Nigeria, accusing it of corruption, greed, & theft.” •Catalin Cimpanu http://news.softpedia.com/news/anonymous-starts-cyberattacks-against-nigerian-government-498676.shtml .NG STATISTICS
  • 6. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Draft 419 Letter/ e-mail Communication Exchange 419 Perpetrator Nigeria 419 Cyber-crime – Life Cycle E-mail Harvester Mass-mail Solution Targeted victim Response Fake Document Transfer of Funds Adapted from flowchart originally produced by Femi Oyesanya & Vesper Owei Processing/ Storage Discard
  • 7. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf Volume of cybercrime-related complaints received in West Africa from 2013 to 2015 Volume of cybercrime-related complaints that led to arrests in West Africa from 2013 to 2015 Cybercrime-related Complaints Received in West Africa
  • 8. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
  • 9. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
  • 10. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
  • 11. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
  • 12. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf LOCATIONS OF BUSINESS EMAIL COMPROMISE (BEC) FRAUD TARGET COMPANIES IN 2016 Research on BEC fraud (that may involve next- level cybercriminals from West Africa) showed that the most-targeted country was the United States, closely followed by China.
  • 13. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf INDUSTRIES TARGETED BY BEC FRAUD CAMPAIGNS IN 2016 Manufacturing industry was the most targeted by BEC fraudsters Possibly due to the fact that manufacturing companies typically supply resources to smaller companies and so engage in a lot of email conversations and transactions that may contain invoice details.
  • 14. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf CYBERCRIMINAL RELATIONSHIP BREAKDOWN The INTERPOL survey also revealed that almost half of the West African cybercriminals profiled only knew their peers online. This characteristic is more applicable to next-level cybercriminals, however, than Yahoo boys.
  • 15. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf TYPICAL ROLES SEEN IN A CYBERCRIMINAL OPERATION ACCORDING TO LAW ENFORCEMENT RESPONSES  Leader,  Fraud operator who actually engages in social engineering activities,  Financial operator who manages monetary transactions,  IT technician who takes care of the operational infrastructure, and  Money mule. The small number of money mule arrests could be due to the fact that many of the mules reside outside West Africa (typically where they are required), which poses jurisdiction and proportionate resource considerations for law enforcement agencies.
  • 16. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf WEST AFRICAN CYBERCRIMINAL TOOLS Email-Automation and Phishing Tools which gather target email addresses using free and readily available tools: “Email Extractor Lite” an online tool hosted at evil- brain.org. “Bulk Email Extractor” crawls through web pages to gather email addresses GSA Email Spider, which harvests email addresses aided by search engines. Automate spam sending Hack legitimate servers then use tools such as PHPMailer—an open source, full-featured email-creation and transfer class tool Using a compromised mailbox to send out spam with malicious attachments to potential victims Set up fake domains to set up several mailboxes for spamming, they also use these to set up fake company web pages Banking Trojans to gather victims’ credentials. Ice IX,22 Remote Administrative Tools (RATs) and keyloggers like Predator Pain and Limitless. Ready-made malware supports the nontechnical cybercriminals Avaliable from global underground markets. Prices, ranging from US$20 to US$100, or sometime free with how-to guides and troubleshooting help.
  • 17. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf CYBERCRIMINALS’ PREFERRED COMMUNICATION TOOLS  Operate in tight-knit groups:  Each group member constantly communicates with peers— sharing targets, compromised email accounts, tools, and best practices.  Attack tools are usually restricted to technical communities or only underground markets
  • 18. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf PORTALS USED BY CYBERCRIMINALS TO TARGET VICTIMS Portals used by cybercriminals to target businesses Portals used by cybercriminals to target individuals
  • 19. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
  • 20. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf ARE WE BOUND TO SEE A WEST AFRICAN UNDERGROUND MARKET? Yes West African cybercriminals are clearly shifting to more elaborate crimes, complex operations, and business models—Business Email Compromise (BEC) and tax fraud Armed with their social engineering expertise and ingenuity, and augmented by tools and services (keyloggers, RATs, crypters, counter-AV services, etc.), West African cybercriminals are stealing large amounts of money via crimes targeting individuals and companies worldwide Cybercrime in West Africa is real: Simplest attacks enabled by very clever social engineering tactics have crippled all types of companies, regardless of size. A West African underground market is emerging and stronger law enforcement actions are needed to stop the evolution of a sophisticated market.
  • 21. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Source: INTERPOL Trend Micro survey “Cybercrime in West Africa: Poised for an Underground Market” https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf CHALLENGES: RECURRING INVESTIGATION ROADBLOCKS Possible reasons for these challenges include: Lack of logistical resources and cybercrime training for local law enforcement agents Lack of cybercrime laws in the country or region concerned
  • 22. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com 19-Dec-15 Federal Court of Appeal www.courtofappeal.gov.ng Protest of to deaths of Shiite members in Zaria during clash with Nigerian Army 11 Jul 2014 Independent National Electoral Commission by TeaM Nigerian Cyber Army, https://www.facebook.com/naijacyberarmy Support of Kidnapped Chibok Girls 6 August 2015 Fed Poly Idah http://www.fepoda.edu.ng & http://www.federalpolyidah.edu.ng by Hackinthunder. Someone aggrieved with the institution 01-Oct-14 Nigeria's House of Representatives The warning, which has been on the page for much of the day, ends saying "No hard feelings though this is just a security reminder. 23-Apr-15 Globacom www.gloworld.com by The Nigerian Cyber Hunters led by HYPER-DARK a.k.a Brunolin The motive, & reason behind the hack is unknown. 28-Oct-11 Economic Financial Crimes Commission (EFCC) www.efccnigeria.org by Naija Cyber Hacktivist “Operation: Say No To Internet Censorship” EXAMPLES OF DEFACED NIGERIAN WEBSITES BETWEEN 13 APRIL 2015 & 01 FEB 2016, ZONE-H RECEIVED NOTIFICATIONS OF 3,599 BREACHES OF NIGERIA (.NG) DOMAINS OF WHICH 2,518 WEBSITES WERE DEFACED. ZONE-H HTTP://WWW.ZONE-H.ORG/ARCHIVE/FILTER=1/FULLTEXT=1/DOMAIN=NIGERIA
  • 23. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com http://ghana.gov.gh/ - http://zone- h.org/mirror/id/23569401 http://www.mfa.gov.gh/ - http://zone- h.org/mirror/id/23569429 http://moc.gov.gh/ - http://zone- h.org/mirror/id/23569666 http://scholarships.gov.gh/ - http://turk- h.org/defacement/view/560295/scholarships.gov.gh/ http://navy.mil.gh/ - http://turk- h.org/defacement/view/560287/navy.mil.gh/ http://nss.gov.gh/ - http://zone- h.org/mirror/id/23569393 http://nfed.gov.gh/ - http://zone- h.org/mirror/id/23569410 http://www.motcca.gov.gh/ - http://zone- h.org/mirror/id/23569549 http://schoolfeeding.gov.gh/ - http://turk- h.org/defacement/view/560288/schoolfeeding.gov.gh/ http://mwrwh.gov.gh/ - http://turk- h.org/defacement/view/560292/mwrwh.gov.gh/ http://www.gida.gov.gh/site/p_ongoing - http://zone-h.org/mirror/id/23569660 GHANA IS NOT IMMUNE TO CYBERCRIME National Computer Incident Response Team CIRT √ √ √ http://www.modernghana.com/news/523954/1/ghana-upbeat-against-cyber-attacks.html#
  • 24. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com • Cybersecurity is Risk Management • Strong passwords prevent most attacks • A new device is not necessarily safe • ALL software has security vulnerabilities • Every website & app should use HTTPS • Cloud is not safe: new security problems • Software updates crucial for protection • Hackers are not criminals per-se • Cyberattacks & cyberterrorism are rare • Darknet (illegal hidden) ≠ Deep web (not indexed) Facts About Computer Security Source: http://gizmodo.com/9-facts-about-computer-security-that-experts-wish-you-k-1686817774
  • 25. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com WHO ELSE IS USING CYBERSPACE? – Daesh: Islamic State – Boko Haram: Jama’atu Ahlis-Sunnah Lid Da’awati Wal Jihad [People involved in Call to Islam & Jihad] – MEND: Movement for the Emancipation of the Niger Delta – FARC–EP & FARC: Revolutionary Armed Forces of Colombia—People's Army – Aum Shinrikyo Japanese doomsday cult Values, Propaganda, Financing & Recruitment Pentagon Manipulates Social Media for Propaganda Purposes Source http://www.globalresearch.ca/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes/25719 Not all cyber-crimes are acts of cyber-terrorism
  • 26. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com CYBER TERRORISM FRAMEWORK AS DEFINED BY YUNOS & AHMAD Source: Reference: R. Ahmad, Z. Yunos, S. Sahib, & M. Yusoff, “Perception on Cyber Terrorism: A Focus Group Discussion Approach,” Journal of Information Security, vol. 03, no. 03, pp. 231-237, 2012 Cyberspace (includes the Internet, telecommunications networks, computer systems, & embedded processors & controllers) • Borderless  ICT/cyber technology  Cyber media  Political  Ideological  Social  Economic  Critical National Information Infrastructure computer system  Critical Infrastructure  Civilian population`  Mass disruption or seriously interfere critical services operation  Cause fear, death or bodily injury  Severe economic loss  Unlawful means  Illegal acts Cyber Terrorism Target Impact Method of Action Domain Tools of Attack Motivation
  • 27. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Que pouvons- nous faire O que podemos fazer ‫نستطيع‬ ‫ماذا‬ ‫نفعل‬ ‫ان‬
  • 28. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com CYBER “THREAT” SPACE Cyberspace is an environment that combines • People, Processes & Technology Cyberspace is not borderless: • Perceived as borderless because its borders are seamless to the end user. • Every country has its own cyberspace which is defined by its national infrastructure. Implications: • Threat actors carry out their activities in an apparently seamless environment, • National Security & Military Operatives are constrained by issues of jurisdiction. Nigeria through the National Cybersecurity Policy & the National Cybersecurity Strategy recognizes cyberspace as the 5th domain of warfare after Land, Sea, Air & Outer-space.
  • 29. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Develop, nurture & patronize a home grown ICT economic sector Generate employment (job creation) Increase incomes & Government revenue Promote Knowledge Generation & empowered Human Resources Foster confidence in our economies & our Broadband as well as related ICT infrastructure Enable the Region to meet it’s national development agenda Enhance human safety & national wellbeing Foster broader adaptation of knowledge “info- structure” for broader & even socio-economic development Reduce the cost of ICT services by ensuring that they carry only what they are designated to carry REGIONAL STRATEGIC INTEREST
  • 30. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Goals:Objectives Critical Success Factors Barriers Initiatives/ Quick wins Priorities Develop a Strategic Plan  Factor and Harmonise ECOWAS Members Interests  Consider Member States needs  Build on ongoing initiatives in member states (Nigeria, Ghana, Cote d’Ivoire)  Activate ECOWAN E3C (Command, Control and Communication) ECONOC (ECOWAS Network Operations Centre)  Leverage Africa and South-South Resources (Tunisia, Malaysia)
  • 31. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Standards & Regulations Activities Outcomes Capacity Building Activities Outcomes Accreditation and Examinations Activities Outcomes Cooperation (Internal, Domestic & International) Activities Outcomes Promotion & Awareness Activities Outcomes STRATEGIC PILLARS: ACTIVITIES & OUTCOMES FOR EACH THEMATIC AREA  Activities with Timelines & Milestones  Outcomes & Key Performance Indicators for Monitoring & evaluation
  • 32. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com 2018-2023 Business Plan 2018-2023 planned Milestones & Key Performance Indicators (KPIs) Strategy & Road Map ECOWAS KPIs Member States KPIs Ministries Departments Agencies and Private Sector KPIs Build Strategic Relationships with Partners Partner on Awareness and Capacity Building Events Networking Events for MDA TO DO
  • 33. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Like most of the World, Nigeria is building an electronic future upon capabilities, processes & infrastructure that we have not yet understood how to protect. July 2013, an Irish “Gay” Hacker took down the official website of the Federal Republic of Nigeria www.nigeria.gov.ng in protest an anti-gay bill that was passed by the Nigerian Senate. 05 February 2015, the President launched: • National Cybersecurity Policy • National Cybersecurity Strategy On 16 May 2015, the President signed the Cybercrime (Prohibition Prevention, etc.,) Act 2015 into law • 50 things to know about the Nigeria Cybercrimes (Prohibition, Prevention, Etc.,) Act, 2015 https://www.linkedin.com/pulse/article/6028503695673614336/edit?articleId=6028503695673614336&trk=pulse-art-edit_btn “I also wish to assure the wider international community of our readiness to cooperate & help to combat threats of ….. Cyber crime…..” - President Muhammadu Buhari 29 May 2015 inauguration speech NIGERIA CYBERSECURITY: THE STATE OF PLAY
  • 34. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com CYBERSECURITY RESILIENCE MATURITY FRAMEWORK Source: John Gilligan, President and Chief Operating Officer at Schafer Corporation Maturity Descriptor Employment of Security Controls Security Tailored to Mission Participate in Information Sharing (Threat/ Vulnerability) Response to Cyber Threats Resilience to Cyber Attacks Level 5: Resilient Augment CSC Based on Mission Mission Assurance Focused Real-time Response to Inputs Anticipate Threats Operate through Sophisticated Attacks Level 4: Dynamic Augment CSC Based on Mission Mission Focused Real-time Response to Inputs Rapid Reaction to Threats Able to Respond to Sophisticated Attacks Level 3: Managed CSC Integrated and Continuously Monitored Partially Mission Focused Respond to Information Inputs Respond to Attacks After the Fact Protection Against Unsophisticated Attacks Level 2: Performed Foundational Critical Security Controls (CSC) Implemented Mission Agnostic Inconsistent Response to Information Inputs Respond to Attacks After the Fact Some Protection Against Unsophisticated Attacks Level 1: No Resilience Inconsistent Deployment of Security Controls None None No Response Susceptible to Unsophisticated Attacks Step1:CriticalSecurity Controls(CSC) Step2:Address Sophisticated Attacks
  • 35. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com CORE ORGANIZATIONAL STRATEGY Source: UK Government Cyber Essentials Scheme https://www.itgovernance.co.uk/cyber-essentials-scheme APPROACH • Ensure your cyber security is as effective as possible without compromising the usability of your systems. • Ensure you have robust business continuity plans in place that cover your information assets so that you can resume normal operations as soon as possible if an attack is successful. Follow International Standards as guides • ISO27001: Implementation of an Information Security Management System (ISMS); • ISO22301: Implementation of a Business Continuity Management System (BCMS). • ISO27031, Applies specifically to information and communication technology business continuity, and the requirements of ISO27001 and ISO22301 are mutually compatible.
  • 36. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com 20 CRITICAL CYBER SECURITY CONTROLS Source: Centre for Internet Security https://www.cisecurity.org/controls/ Critical Cyber Security Controls Eliminate majority of organization's vulnerabilities Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation Controlled Use of Administrative Privileges Secure your entire organization against most pervasive threats Maintenance, Monitoring, and Analysis of Audit Logs Email and Web Browser Protections Malware Defenses Limitation and Control of Network Ports Data Recovery Capability Secure Configurations for Network Devices Boundary Defense Data ProtectionControlled Access Based on the Need to Know Wireless Access Control Account Monitoring and Control Security Skills Assessment and Appropriate Training to Fill Gaps Application Software Security Incident Response and Management Penetration Tests and Red Team Exercises
  • 37. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com !THE FUTURE IS MOBILE & THE FUTURE IS NOW Source: http://www.ncc.gov.ng/index.php?option=com_content&view=article&id=125:subscriber-statistics&catid=65:industry- information&Itemid=73
  • 38. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Heather Adkins, director, information security, Google Ann Barron-DiCamillo, director of US-CERT, U.S. Department of Homeland Security Lara Nwokedi, Head of Information Security management First Bank Plc. Kathy Fithen, Chief Privacy Officer (CPO), Coca-Cola Roxane Divol, General Manager (GM) of Symantec’s Trust Services Rakiya Shuaibu- Mohammed, DD IT and oversees Cybersecurity CBN Melinda Rogers, CISO, Department of Justice Latha Maripuri, SVP & global CISO, News Corp. Funke Opeke, founded Main Street Technologies & C.E.O. MainOne Julie Cullivan, senior vice president of business operations & chief information officer, FireEye Eva Chen, CEO, Trend Micro Zareefa Mustapha PhD, , Lecturer, Baze University WOMEN IN IT SECURITY: POWER PLAYERS Source: http://www.scmagazine.com/women-in-it-security-10-power-players/printarticle/421364/ Source: https://www.csc.tntech.edu/wicys/
  • 39. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com Antimalware: •"Malware are malevolent software such as viruses, worms, spyware, & others that are designed to cause harm to computer based systems including stealing information •Antivirus is a software that detects & destroys computer viruses" Data loss prevention (DLP): •A strategy to ensure that users do not send unauthorised information outside a given network DDOS Mitigation: •A set of practices for countering distributed denial-of-service (DDoS) attacks on Internet facing networks by protecting the target & intermediary networks. Disaster Recovery & Business Continuity: •Processes that help organizations prepare for disruptive events including backing up data & having alternate platforms & operational sites. Encryption: •A process of encoding messages or information so that only those authorized can read it Firewall: •Like the wall around a building/ compound a Computer/ Network Firewall blocks unauthorized access while permitting legitimate communication Identity Management Access (IAM): •Framework for the management of electronic identities Intrusion prevention systems (IPS): •Monitor network and/or system activities for malicious activity Risk & Compliance Management: •Ways to approach IT Governance, risk management, & compliance with standards Security/ Vulnerability Management: •The cycle of identifying, classifying, prioritising, reporting, remediating, & mitigating computer/ network vulnerabilities Unified Threat Management (UTM)/ Unified Security Management (USM): •Comprehensive & often cost-effective set of network gateway protection solutions Web Filtering: •A filtering tool that screens incoming web pages to determine if all or part of it should be displayed AFRICA CYBER SECURITY MARKET WORTH $0.92 BILLION IN 2015 & $2.32 BILLION BY 2020 Source: http://www.marketsandmarkets.com/PressReleases/africa-cyber-security.asp
  • 40. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com West Africa must get Ready to Counter growing cybersecurity and cyber Crime Challenges • Education: • Primary, Secondary, Vocational and Tertiary • Lay Digital Society’s foundation’s: • Positive regulation, • Tax Incentives and • Some Government investment in specific areas • Create Centers of Knowledge: • Educational and/ or Research Institutes Year 2020 an MSME based Cybersecurity Solutions economic sub-sector that enables a Cyber Resilient Digital Society should be in place, principally driven by suitably empowered young knowledge workers • Highly skilled Cybersecurity knowledge workers will constitute a cyber-guard that the nation will leverage, in times of national cyber emergencies • We can succeed by working together CONCLUSION: PROPOSITION FOR ADOPTION
  • 41. Abdul-Hakeem Ajijola (.AhA) info@consultancyss.com for your attention Merci de votre attention Obrigado pela sua atenção ‫على‬ ‫شكرا‬ ‫االهتمام‬ info@consultancyss.com

Editor's Notes

  • #2: 19/07/2017
  • #23: Between 13 April 2015 & 01 Feb 2016, Zone-H notes that it received notifications of 3,599 breaches of websites with Nigeria (.ng) domains of which 2,518 were defaced. Examples of defacements include: 09 Jan 2016, Embassy of Nigeria in Saudi Arabia, http://nigeria.org.sa/ defaced. The hackers left a message condemning the United States, Saudi Arabia, Israel, & the United Kingdom as well as criticizing them for the execution of the Shia Sheikh Namar. 19-Dec-15, Federal Court of Appeal www.courtofappeal.gov.ng in protest of the deaths of Shiite members in Zaria during clash with Nigerian Army. 11 Jul 2014, Independent National Electoral Commission by TeaM Nigerian Cyber Army, https://www.facebook.com/naijacyberarmy Support of Kidnapped Chibok Girls. 01-Oct-14 Nigeria's House of Representatives http://www.nassnig.org was defaced by Osaretin Michael Omoruyi, who goes by the monica "Haxor Ositilife Leet" & posted "Haxor Ositilife Leet was here. Patch your security or the next time we come [it's] gonna be rough." & later the warning, which was on the page for much of that day, ends saying "No hard feelings though this is just a security reminder. 08-Jul-13, Federal Ministry of Information, www.nigeria.gov.ng by Paddyhack, Irish “Gay” Hacker Activist (Hacktivist) campaign themed #OpNigeria in protest an anti-gay bill that was passed by the Nigerian Senate. 28-Oct-11, Economic Financial Crimes Commission (EFCC), www.efccnigeria.org by Naija Cyber Hacktivist “Operation: Say No to Internet Censorship.” Zone-H http://www.zone-h.org/archive/filter=1/fulltext=1/domain=Nigeria
  • #26: 19/07/2017
  • #28: 19/07/2017
  • #30: We must understand what are our National Strategic interests? Develop, nurture & patronize a home grown ICT economic sector Generate employment (job creation) Enhance human safety & national wellbeing Foster confidence in our economy & our Broadband as well as related ICT infrastructure Reduce the cost of ICT services by ensuring that they carry only what they are designated to carry
  • #38: 19/07/2017
  • #41: The Proposition for Adoption by you today & inclusion in your communique is: By the year 2020 an MSME based Cybersecurity Solutions economic sub-sector should be in place principally driven by suitably empowered knowledge workers below 35 years of age. These highly skilled & empowered Cybersecurity knowledge workers will constitute a cyber-guard that the nation will leverage, in times of national cyber emergencies. We can succeed by working together.
  • #42: 19/07/2017