Start Date

October 2018

End Date

October 2018

Location

KC 460

Abstract

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for personal financial gains. This existential threat has been growing in bounds and leaps over the past few years that the news media has been awash with cyber-attacks from African countries including Nigeria, South Africa, Ghana, Zimbabwe, and a host of other African nations. There have been several academic research and articles published on the African cyber-criminal activities by several authors; most of which are in silos and in non-subject specific databases everywhere. Our sponsored summer long project therefore re-analyzed the African style cyber- attacks culminating in the creation of an Access based database that captured the pertinent data about the reported cases through the use of secondary data sources.

Share

COinS
 
Oct 20th, 1:00 PM Oct 20th, 1:25 PM

Capturing the Existential Cyber Security Threats from the Sub-Saharan Africa Zone through Literature Database

KC 460

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for personal financial gains. This existential threat has been growing in bounds and leaps over the past few years that the news media has been awash with cyber-attacks from African countries including Nigeria, South Africa, Ghana, Zimbabwe, and a host of other African nations. There have been several academic research and articles published on the African cyber-criminal activities by several authors; most of which are in silos and in non-subject specific databases everywhere. Our sponsored summer long project therefore re-analyzed the African style cyber- attacks culminating in the creation of an Access based database that captured the pertinent data about the reported cases through the use of secondary data sources.

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.