Skip to main content

CONTRIBUTIONS TO BPF BY AKINREMI PETER TAIWO


How does good cybersecurity contribute to the growth of and trust in ICTs and Internet Technologies, and their ability to support the Sustainable Development Goals (SDGs)?
The rapid growth and adoption of ICTs as a key driver of the economic development would be jeopardized if measures to protect connected devices and user generated data is absent. The fear of data compromising, information theft, privacy intrusion, surveillance, unreliable software programs and applications would not allow those unconnected billion people to fully rely on the use of the internet and its related technologies therefore distant the realization of sustainable development goals.
The emergency of internet, penetration and its usage was given highest consideration with less attention to its security issues. Less attention to protecting the information and communication technologies and internet technologies would lead to high rate of disadvantages over the benefits.
 Abuse of the use of technologies would be on the increase on a daily basis as there is or little comprehensive short rules backing the usage of such technologies. Reliability and authenticity of information will be rendered useless and reduction in innovation of business services
Assessment of the CENB Phase II policy recommendations identified a few clear threats. Do you see particular policy options to help address, with particular attention to the multi-stakeholder environment, the following cybersecurity challenges?
Denial of Service attacks and other cybersecurity issues that impact the reliability and access to Internet service
The policy option to address the issues of cybersecurity should be a clear awareness of the potential impacts, rules and action to guide against such acts
Security of mobile devices, which are the vehicle of Internet growth in many countries, and fulfill critical goals such as payments
Technologies products and services should undergo through the testing stages to ensure compliance to standards and bug fixes. Also, there is a need for penetration testing at every stage of technology products and services

Potential abuse by authorities, including surveillance of Internet usage, or the use of user-provided data for different purposes than intended
In the fight to secure the online environment, authorities somehow has violated and abuse the openness of the internet and user privacy. To help address the abuse, clear formulation of a set of rules on data respect and user privacy should be enacted.

Many Internet developments do not happen in a highly coordinated way - a technology may be developed in the technical community or private sector, and used by other communities and interact in unexpected ways. Stakeholders are managing complexity.
This both shows the strength and opportunities of ICTs and Internet Technologies, but also the potential risks. New technologies may be insufficiently secure, resulting in harms when they are deployed: conversely we may adopt security requirements or measures that prevent the development, deployment, or widespread use of technologies that would generate unforeseen benefits. Where do you think lies the responsibility of each stakeholder community in helping ensure cybersecurity does not hinder future Internet development?
Joint efforts to the formulation of cybersecurity policies to protect the internet technologies and ICTs would help ensure and prevent hindrance to internet development. A periodic evaluation of cybersecurity policies, issues and forum where all stakeholders on an equal footing to address and resolve any potential changes and development. Also, a careful and sensitive approach to defining requirements and measures need be; to avoid strict measures which could jeopardize the future of internet development.
What is for you the most critical cybersecurity issue that needs solving and would benefit most from a multi-stakeholder approach within this BPF? Should any stakeholders be specifically invited in order for this issue to be addressed?
The most critical cybersecurity issues is the vulnerability of critical infrastructure and internet resources. Recent development has seen attacks on infrastructures to disrupt transmission and processes, to eavesdrop, and control while gaining access to useful information. The security of infrastructure and internet resources which ranges from hardware to software must be in every stakeholders mind as these formed the base for accessing user information.

Submitted by: Akinremi Peter Taiwo

Comments

Popular posts from this blog

PROPOSAL FOR INFRASTRUCTURE DEVELOPMENT: TELEMEDICNE IN CROSS RIVER STATE, NIGERIA

Akinremi Peter Taiwo The embracement of information and communication technology had contributed greatly to the development of Nigeria as a whole. ICT infrastructure can be said to be the overall name used to describe all communications hardware and software someone uses as individual, in organization to get work done.  ICT infrastructures are technological tools and resources used to communicate, disseminate, store and manage information effectively.(infoxchange.net) In Nigeria, there are various ICT services which are unfolding as a result of invention of internet and the embracement of information and communication technology by the Government. The development of this great nation depends on the deployment of ICT infrastructure which will lead to various opportunities on her development. Recently, the Government of Cross river state signed  a contract worth N1.1 billion naira to MTN Communication Limited, Nigeria  for  broadband  infrastructure in ca...

FLOOD COULD CAUSE NIGERIA POTENTIAL DAMAGES

FLOOD COULD CAUSE NIGERIA POTENTIAL DAMAGES   Well, little effort has been put in place in order to help combat the unforeseen flood disaster. Among this is awareness to help people prevent these challenges, building of channel for water passage, drainage and evacuating the living and building along the water path. Despite the effort putting in place people still show nonchalant attitude toward flood awareness program. I would still say that if Nigeria experiences more rainfall that is beyond that of 2012, many lives and property worth millions will be destroy as a result of nonchalant attitude of the people, small size of drainage system and low quality of material for building drainage system and inaction of the leaders. The Heavy rain fall experienced by Nigerian cities early 2012 killed 363 and rendered useless over 2,100,000 people as of November, 2012(Reuters, 2012) The cities such as Lagos, Ibadan (oke-ayo and Eleyele), Plateau, Jos, Cross River, Borno, Benue, Kog...

9TH WEST AFRICAN INTERNET GOVERNANCE FORUM REPORT BY AKINREMI PETER TAIWO

9 TH WEST AFRICAN INTERNET GOVERNANCE FORUM, JULY 27 TH AND 28 TH , 2017, COTONOU, BENIN: Digital security for socioeconomic   development and peace in West Africa The 9 th West African Internet Governance Forum was held at Golden Tulip diplomat in Cotonou, Benin. The two (2) day event attracted stakeholders across the nations for dialog on digital security for socioeconomic development. The event recorded 418 participants with full house at the closing session The conference was opened by stakeholders with beautiful welcome addresses. But the opening remarks were made by the Minister for Ministry of Digital Economy and Commission (MENC), Benin. The conference also witnessed the report from the Internet Governance Forum (IGF) countries’ representatives such as Nigeria, Benin, Chad, Gambia, Togo, Niger, Guinea Bissau, Liberia, etc. Sessions on Security, Openness and Privacy was moderated by Jacques Houngbo, FGI BĂ©nin. Jacques gave a brief importance of security in...