We have been looking at cyberattacks generally in the last few articles. Firstly, we started with the attacker’s motive, which reveals the general motives behind any form of cybercrime. Then…
Category: Uncategorized
Before a cyberattack, there must be planning. As long as cyber-attacks remain a crime where attribution is a major concern, planning will always be a necessary phase. It is in…
Cyber-attacks have continued to be one of the world’s most difficult challenges to solve. Solving it may not the problem but solving it without a corresponding negative reaction is the…
The ICT sector of Nigeria has been allowed to grow without any form of government interference. It has been able to not only grow but added to the list of…
Corruption has been a challenge in Nigeria’s history. It has made many to discredit our system and product. Our human capital is not recognized within the confines of the country…
As people begin to make new resolutions and the year is starting to take shape, the internet users must ensure they are also taking necessary precautions to prevent becoming a…
Currency control and regulation are as important to the government as the cry of a newly born child. While the government wants to be able to stand, they also want…
The Nigeria signed National Cybersecurity Policy & Strategy (NCPS) document has been a document of discussion. While the generality of the document is a necessity many believe that it may…
The Nigeria National Cybersecurity Policies & strategy has not only mandated sectoral development of Cyber Security Incident Response Team (CSIRT), it has also given room for private organizations to develop…
The world may have been relegated to a state of un-orderliness where any business can carry out any activity without fear of the negative effect the operation will have on…