Abstract
Cybersecurity involves protection of computer systems from theft, damage, or manipulation to the hardware, software, or the data contained on them. A limitless cyberspace, little to no boundaries, and eroding national borders is making Africa vulnerable to cyber threats and potential harms. Cybersecurity represents serious economic and national security challenges, which need to be properly defined and contextualized.
- Brewster, T. An NSA cyber weapon might be behind a massive global ransomware outbreak. Forbes. (May 12, 2017); https://www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion.Google Scholar
- Nigerian Communications Commission. Effects of cybercrime on foreign direct investment and national development. 2016; https://www.ncc.gov.ng/documents/735-nmis-effects-cybercrime-foreign-direct-investment/file.Google Scholar
- Serianu. Cyber security skills gap. Africa Cyber Security Report - Kenya. Serianu. 2018; https://www.serianu.com/downloads/KenyaCyberSecurityReport2018.pdf.Google Scholar
- PwC. Pulling fraud out of the shadows. Global Economic Crime and Fraud Survey 2018. 2018; https://www.pwc.com/gx/en/forensics/global-economic-crime-and-fraud-survey-2018.pdf.Google Scholar
- Central Bank of Kenya. The Year of Resilience. Annual Reports and Financial Statements 2017/2018. 2018.Google Scholar
- Communications Authority of Kenya. 1.5 Million new mobile subscriptions listed in three months to March 2019. (July 2, 2019); https://ca.go.ke/1-5-million-new-mobile-subscriptions-listed-in-three-months-to-march-2019.Google Scholar
Index Terms
- Cyber security in Africa: The boring technology story that matters
Recommendations
Government regulations in cyber security: Framework, standards and recommendations
AbstractCyber security refers to the protection of Internet-connected systems, such as hardware, software as well as data (information) from cyber attacks (adversaries). A cyber security regulation is needed in order to protect information ...
Highlights- We list and discuss the cyber attacks, security requirements and measures. We then discuss the cyber security incident management framework and its various ...
Security analysis for cyber-physical systems against stealthy cyber attacks
CERIAS '13: Proceedings of the 14th Annual Information Security SymposiumSecurity of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific ...
Comments