Journal article Open Access

National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis

Osho, Oluwafemi; Onoja, Agada D.

With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.

Files (657.0 kB)
Name Size
657.0 kB Download
  • Britz, M. T. (2009). Computer Forensics and Cyber Crime. New Jersey, USA: Pearson Education.
  • Cabinet Office (2011). The UK Cyber Security Strategy. Retrieved from
  • Commonwealth Telecommunications Organization (2014). Commonwealth Approach for Developing National Cybersecurity Strategies. Retrieved August 20, 2014 from
  • Data Security Council of India (2013). Analysis of National Cyber Security Policy (NCSP – 2013). Retrieved September 25, 2014 from
  • European Network and Information Security Agency (2012). National Cyber Security Strategies - Practical Guide on Development and Execution. Retrieved August 20, 2014from
  • French Network and Information Security Agency (2011). Information Systems Defense and Security – France’s Strategy. Retrieved September 13, 2014 from security-strategy-2011
  • Goodwin, C. F., Nicholas, J. P. (2013). Developing a National Strategy for Cybersecurity. Retrieved August 17, 2014from
  • Government of Canada (2010). Canada’s Cyber Security Strategy. Retrieved August 21, 2014 from
  • Government of Kenya (2014). Cybersecurity Strategy. Retrieved September 13, 2014 from
  • Information Security Policy Council (2010). Information Security Strategy for Protecting the Nation. Retrieved September 13, 2014 from
  • Loader, B. D. and Thomas, D. (2000). Introduction. In B. D. Loader and D. Thomas (Eds.), Cyber crime: Law enforcement, surveillance and security in the information age (pp. 1 – 14). New York, USA: Routledge.
  • National Coordinator for Security and Counterterrorism (2014). National Cyber Security Strategy 2. Retrieved September 13, 2014 from security-strategy-2011.
  • Nitta, Y. (2013). Japan’s Approach towards International Strategy on Cyber Security Cooperation. Retrieved September 13, 2014 from
  • Odumesi, J. O. (2014). Combating the Menace of Cyber crime. International Journal of Computer Science and Mobile Computing, 3(6), 980 – 991.
  • Office of the National Security Adviser (2014). National Cybersecurity Policy. Retrieved August 6, 2014 from
  • Organization for Economic Cooperation and Development (2012). Cybersecurity Policy Making At A Turning Point. Retrieved September 13, 2014 from
  • Wamala, F. (2011).The ITU National Cybersecurity Strategy Guide. Retrieved from
  • Watanabe, L. (2013). France’s New Strategy: The 2013 White Paper [White paper]. Retrieved September 13, 2014 from
  • Şentürk, H., Çil, Z.C., Şeref, S. (2012). Cyber Security Analysis of Turkey. International Journal of Information Security Science, 1(4), 112-125.
All versions This version
Views 117117
Downloads 66
Data volume 3.9 MB3.9 MB
Unique views 116116
Unique downloads 55


Cite as