AN ASSESSMENT OF CYBER SECURITY THREATS AND THE NATIONAL SECURITY QUESTION IN NIGERIA
Abstract
This paper is to assessed cyber security threats and the questions of national security in Nigeria. This was borne out of the growing cyber security threats such as kidnapping, calculated murder, theft, terrorism and other vices that has evolved in relation to the increasing use of internet solutions in the country. The paper argued that identifying the nature of cyber security threats and its effect on national security is crucial to identifying options for mitigating the cyber security threats facing the nation.
To this end, the methodology adopted for the collection, analysis and interpretation of relevant data was developed after review of the extant of literature. Specifically, the survey research design was adopted with an interview of 6 key informants from chosen security organisation using the convenience sampling method. After review of the qualitative data, the findings of the research support the conclusion that cyber security threats significantly affected national security. The same formed the basis for the recommendations of the paper.
Keywords
Full Text:
PDFReferences
Abrahamsen, R. (2005). ‘Blair’s Africa: The Politics of Securitization and Fear’.Alternatives: Global, Local, Political, 30, 55-80.
Achumba, I., Ighomereho, O., &Akpor-Robaro, M. (2013). Security challenges in Nigeria and the implications for business activities and sustainable development. Journal of Economics and Sustainable Development, 4(1), 23-29.
Adebayo, A. (2011). Democratic elections and Nigeria’s national security. Ibadan: John Archers.
Akhakpe, I. (2012). Election crisis, liberal democracy and national security in Nigeria’s fourth republic. European Scientific Journal, 8(2), 40-52.
Akinsuyi, (2009). The drawing of Information Security Legislations, What Nigerian CorporationsCan Do to Prepare. Retrieved from https://pdfs.semanticscholar.org/a060/99e8a545c94ac1e052b7b0e375b5822e40bf.pdf
Baldwin, D.A. (1997). The Concept of Security. Review of International Studies. 23(1): 5-26.
Baylis, J. and Smith, S. 2001. The Globalization of World Politics: An Introduction to International Relations. Oxford: Oxford University Press.
Baylis, J. and Smith, S. (2001). The Globalization of World Politics: An Introduction to International Relations. Oxford. Oxford University Press
Boniface et al (2014). Analyzing Issues of Cyber Threats in Nigeria. Retrieved from https://pdfs.semanticscholar.org/a060/99e8a545c94ac1e052b7b0e375b5822e40bf.pdf
Bourne, M. (2014). Understanding Security. London: Palgrave Macmillan.
Bourne, M. (2014). Understanding Security. London: Palgrave Macmillan
Brechbhl, H. Bruce, R. Dynes, S. & Johnson, E. M. (2010). Protecting Critical Information Infrastructure: Developing Cyber-security Policy. Information Technology for Development, 16(1), 83- 91.
Burgess, J. P. (2008). Non-Military Security Challenges in contemporary security and strategy.
Houndmills: Palgrave Macmillan.
Buzan, B. (1991). People, States, and Fear: An Agenda for International Security Studies in the Post-Cold War Era. New York: L. Rienner Publishers.
Chinedu R. (2018). SMEDAN Website Hacked. Retrieved from https://itedgenews.ng/2018/09/13/smedan-website-hacked/
Choo, K. R. (2011). The Cyber Threat Landscape: Challenges and Future Research Directions. Computers & Security.30: 719- 731.
Eriksson, J. Giacomello, G. (2006). The Information Revolution, Security, and International Relations: (IR) relevant Theory? International Political Science Review. 27(2), 221-244.
Geers, K. (2011). Strategic Cyber Security. NATO Cooperative Cyber Defense Centre of Excellence. Tallinn, Estonia.
Gercke, M. (2011). Understanding Cybercrime: A Guide for Developing Countries. Geneva: International Telecommunications Union (ITU). Retrieved from www.itu.int/ITU-D/cyb/cybersecurity/legislation.html
Gilbert, D. (2014). Hacktivists Hit Back at Israel After Death of Anonymous Member in West Bank. Retrieved from http://www.ibtimes.co.uk/hacktivists-hits-back-israel-after-death-anonymous-member-west-bank-1458623
Graham, J. Howard, R. and Olson, R. (2011). Cyber Security Essentials. Auerbach Publications: Taylor and Francis Group.
Guilmartin, J. F. (2013). Reflections on the Revolution in Military Affairs.The RMA Debate. Retrieved from http://www.comw.org/rma/fulltext/reflect.html#versus
Held, D., & McGrew, A. (1998). The end of the old order? Review of International Studies, 24(3), 219-242.
International Telecommunications Union (ITU). (2008). Data Networks, Open System Communications and Security: Telecommunication Security: Overview of Cyber Security. ITU-TX.1205: series X: Geneva: ITU.
Kesan, J. P. and Hayes, C. M. (2012). Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace. Harvard Journal of Law and Technology, 25(2), 417-527.
Kizza, J. M. (2014). Computer Network Security and Cyber Ethics. (4th ed). Jefferson NC: McFarland &Co Inc.
Klare, M. T. and Chandrani, Y. (1998). World Security: Challenges for a new century. (3rd ed). New York: St. Martin's Press.
Klimburg, A. (2012). National Cyber Security Framework Manual. NATO CCD COE.Talinn, Estonia.
Lewis, J. A. (2014). National Perceptions of Cyber Threats. Strategic Analysis. 38(4), 566-576.
Lin, H. (2012). ‘Some Modest Steps Towards Greater Cyber Security.’ Bulletin of the Atomic Scientists. 68(5), 2012.
McAfee.(2011). McAfee Threat Report: Fourth Quarter 2010. Retrieved from https://personalmacgeniuses.com/wp-content/uploads/rp-quarterly-threat-q4-2010.pdf
McSweeney, B. (1999). ‘Security, Identity and Interests: A Sociology of International Relations. Cambridge: Cambridge University Press.
Neuneck, G. &Alwardt, C. (2008). The Revolution in Military Affairs, its Driving Forces, Elements and Complexity: Interdisciplinary Research Group on Disarmament, Arms Control and Risk Technologies. Institute for Peace Research and Security Policy. University of Hamburg.
Nuechterlein, D. E. (1976). ‘National Interests and Foreign Policy: A Conceptual Framework for Analysis and Decision-Making.’ British Journal of International Studies. 2(3), 246-266.
Ogbonnaya, M, &Ehigiamusoe, K. (2013). Niger Delta militancy and Boko Haram insurgency: Nationalsecurity in Nigeria. Global Security Studies. 4(3), 11- 25
Oliveserah BAC (2018). 2018 eGovernment Performance Index Survey. Retrieved from https://drive.google.com/file/d/1X4_kMD8lY6BS-t87Q3sx6Gi7Am0pqzMo/view
Oriakhi, D., &Osemwengie, P. (2012). The impact of national security on foreign direct investment in Nigeria: an empirical analysis. Journal of Economics and Sustainable Development. 3(2), 18 – 44.
Peoples, C. and Vaughan-Williams, N. (2010). Critical security studies: An introduction. London: Routledge.
Reveron, D. S. (2012). Cyber Challenges and National Security: Threats, Opportunities, and Power in a Virtual World. Baltimore, MD: Georgetown University Press.
Reyes, A. (2007). Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors. Rockland: Syngress.
Rezk, D. (2010). The Revolution in Military Affairs and the Changing Nature of Warfare in the Middle East. Retrieved from http://blogs.lse.ac.uk/ideas/2010/04/the-revolution-in-military-affairs-and-the-changing-nature-of-warfare-in-the-middle-east/Accessed. 9 April 2013.
Romm, J. (1993). Defining national security: The non-military aspect. New York: Council of Foreign Relations Press.
Saleh, A. (2010). Broadening the Concept of Security: Identity and Societal Security. Geopolitics Quarterly. 6(4), 228-241.
Schreier, F. (2012). On Cyber Warfare. DCAF Horizon 2015 Working Paper. 7(2), 4-8
Serianu.(2014). ‘Kenya Cyber Security Report. Rethinking Cyber Security – An Integrated Approach: Processes, Intelligence and Monitoring.’Nairobi.
Sofaer, A. D. Clark, D. Diffie, W. (2010). Cyber Security and International Agreements. Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy.
Techopedia.(2014). Definition of Denial of Service (DoS) Attack. Retrieved from http://www.techopedia.com/definition/24841/denial-of-service-attack-dos.
United Nations Institute for Disarmament Research (UNIDR). (2013). The Cyber Index: International Security Trends and Realities. Geneva, Switzerland.
Von Solms, R. & van Niekerk, J. (2013). From Information Security to Cyber Security. Computers & Security. 10(1), 1- 6.
Weng Loo, B. F. (2005). Transforming the Strategic Landscape of Southeast Asia. Contemporary Southeast Asia. A Journal of International and Strategic Affairs. 27(3), 388-405.
Wolfers, A. (1952). National Security as an Ambiguous Symbol. Political Science Quarterly. 67(4), 481-502.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.