Journal article Open Access

National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis

Osho, Oluwafemi; Onoja, Agada D.

Abstract
With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.

Files (657.0 kB)
Name Size
OshoOnoja2015vol9issue1.pdf
md5:581cea00699ae93b4ca085486c2d760c
657.0 kB Download
  • Britz, M. T. (2009). Computer Forensics and Cyber Crime. New Jersey, USA: Pearson Education.
  • Cabinet Office (2011). The UK Cyber Security Strategy. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
  • Commonwealth Telecommunications Organization (2014). Commonwealth Approach for Developing National Cybersecurity Strategies. Retrieved August 20, 2014 from www.cto.int/priority-areas/cybersecurity/national-cybersecurity-strategies.
  • Data Security Council of India (2013). Analysis of National Cyber Security Policy (NCSP – 2013). Retrieved September 25, 2014 from http://dsci.in/search/node/1474.
  • European Network and Information Security Agency (2012). National Cyber Security Strategies - Practical Guide on Development and Execution. Retrieved August 20, 2014from www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncss/national-cyber-security-strategies-an-implementation-guide.
  • French Network and Information Security Agency (2011). Information Systems Defense and Security – France’s Strategy. Retrieved September 13, 2014 from http://www.enisa.europa.eu/media/news-items/french-cyber security-strategy-2011
  • Goodwin, C. F., Nicholas, J. P. (2013). Developing a National Strategy for Cybersecurity. Retrieved August 17, 2014from www.microsoft.com/security/cybersecurity/resources.aspx.
  • Government of Canada (2010). Canada’s Cyber Security Strategy. Retrieved August 21, 2014 from www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-sctr-strtgy/index-eng.aspx
  • Government of Kenya (2014). Cybersecurity Strategy. Retrieved September 13, 2014 from http://www.icta.go.ke/wp-content/uploads/2014/03/GOK-national-cybersecurity-strategy.pdf.
  • Information Security Policy Council (2010). Information Security Strategy for Protecting the Nation. Retrieved September 13, 2014 from www.nisc.go.jp/eng/pdf/New_Strategy_English.pdf.
  • Loader, B. D. and Thomas, D. (2000). Introduction. In B. D. Loader and D. Thomas (Eds.), Cyber crime: Law enforcement, surveillance and security in the information age (pp. 1 – 14). New York, USA: Routledge.
  • National Coordinator for Security and Counterterrorism (2014). National Cyber Security Strategy 2. Retrieved September 13, 2014 from http://www.enisa.europa.eu/media/news-items/dutch-cyber security-strategy-2011.
  • Nitta, Y. (2013). Japan’s Approach towards International Strategy on Cyber Security Cooperation. Retrieved September 13, 2014 from http://lsgs.georgetown.edu/sites/lsgs/files/Japan_edited%20v2.pdf_for_printout.pdf
  • Odumesi, J. O. (2014). Combating the Menace of Cyber crime. International Journal of Computer Science and Mobile Computing, 3(6), 980 – 991.
  • Office of the National Security Adviser (2014). National Cybersecurity Policy. Retrieved August 6, 2014 from http://www.cybersecuritynigeria.org.ng/ncsf/index.php/downloadable-docs.
  • Organization for Economic Cooperation and Development (2012). Cybersecurity Policy Making At A Turning Point. Retrieved September 13, 2014 from www.oecd.org/sti/ieconomy/cybersecurity%20policy%20making.pdf.
  • Wamala, F. (2011).The ITU National Cybersecurity Strategy Guide. Retrieved from http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf.
  • Watanabe, L. (2013). France’s New Strategy: The 2013 White Paper [White paper]. Retrieved September 13, 2014 from http://www.css.ethz.ch/publications/pdfs/CSS-Analysis-139-EN.pdf.
  • Şentürk, H., Çil, Z.C., Şeref, S. (2012). Cyber Security Analysis of Turkey. International Journal of Information Security Science, 1(4), 112-125.

Share

Cite as