Skip to main content

CONTRIBUTIONS TO BPF BY AKINREMI PETER TAIWO


How does good cybersecurity contribute to the growth of and trust in ICTs and Internet Technologies, and their ability to support the Sustainable Development Goals (SDGs)?
The rapid growth and adoption of ICTs as a key driver of the economic development would be jeopardized if measures to protect connected devices and user generated data is absent. The fear of data compromising, information theft, privacy intrusion, surveillance, unreliable software programs and applications would not allow those unconnected billion people to fully rely on the use of the internet and its related technologies therefore distant the realization of sustainable development goals.
The emergency of internet, penetration and its usage was given highest consideration with less attention to its security issues. Less attention to protecting the information and communication technologies and internet technologies would lead to high rate of disadvantages over the benefits.
 Abuse of the use of technologies would be on the increase on a daily basis as there is or little comprehensive short rules backing the usage of such technologies. Reliability and authenticity of information will be rendered useless and reduction in innovation of business services
Assessment of the CENB Phase II policy recommendations identified a few clear threats. Do you see particular policy options to help address, with particular attention to the multi-stakeholder environment, the following cybersecurity challenges?
Denial of Service attacks and other cybersecurity issues that impact the reliability and access to Internet service
The policy option to address the issues of cybersecurity should be a clear awareness of the potential impacts, rules and action to guide against such acts
Security of mobile devices, which are the vehicle of Internet growth in many countries, and fulfill critical goals such as payments
Technologies products and services should undergo through the testing stages to ensure compliance to standards and bug fixes. Also, there is a need for penetration testing at every stage of technology products and services

Potential abuse by authorities, including surveillance of Internet usage, or the use of user-provided data for different purposes than intended
In the fight to secure the online environment, authorities somehow has violated and abuse the openness of the internet and user privacy. To help address the abuse, clear formulation of a set of rules on data respect and user privacy should be enacted.

Many Internet developments do not happen in a highly coordinated way - a technology may be developed in the technical community or private sector, and used by other communities and interact in unexpected ways. Stakeholders are managing complexity.
This both shows the strength and opportunities of ICTs and Internet Technologies, but also the potential risks. New technologies may be insufficiently secure, resulting in harms when they are deployed: conversely we may adopt security requirements or measures that prevent the development, deployment, or widespread use of technologies that would generate unforeseen benefits. Where do you think lies the responsibility of each stakeholder community in helping ensure cybersecurity does not hinder future Internet development?
Joint efforts to the formulation of cybersecurity policies to protect the internet technologies and ICTs would help ensure and prevent hindrance to internet development. A periodic evaluation of cybersecurity policies, issues and forum where all stakeholders on an equal footing to address and resolve any potential changes and development. Also, a careful and sensitive approach to defining requirements and measures need be; to avoid strict measures which could jeopardize the future of internet development.
What is for you the most critical cybersecurity issue that needs solving and would benefit most from a multi-stakeholder approach within this BPF? Should any stakeholders be specifically invited in order for this issue to be addressed?
The most critical cybersecurity issues is the vulnerability of critical infrastructure and internet resources. Recent development has seen attacks on infrastructures to disrupt transmission and processes, to eavesdrop, and control while gaining access to useful information. The security of infrastructure and internet resources which ranges from hardware to software must be in every stakeholders mind as these formed the base for accessing user information.

Submitted by: Akinremi Peter Taiwo

Comments

Popular posts from this blog

9TH WEST AFRICAN INTERNET GOVERNANCE FORUM REPORT BY AKINREMI PETER TAIWO

9 TH WEST AFRICAN INTERNET GOVERNANCE FORUM, JULY 27 TH AND 28 TH , 2017, COTONOU, BENIN: Digital security for socioeconomic   development and peace in West Africa The 9 th West African Internet Governance Forum was held at Golden Tulip diplomat in Cotonou, Benin. The two (2) day event attracted stakeholders across the nations for dialog on digital security for socioeconomic development. The event recorded 418 participants with full house at the closing session The conference was opened by stakeholders with beautiful welcome addresses. But the opening remarks were made by the Minister for Ministry of Digital Economy and Commission (MENC), Benin. The conference also witnessed the report from the Internet Governance Forum (IGF) countries’ representatives such as Nigeria, Benin, Chad, Gambia, Togo, Niger, Guinea Bissau, Liberia, etc. Sessions on Security, Openness and Privacy was moderated by Jacques Houngbo, FGI Bénin. Jacques gave a brief importance of security in...

ACSIS ECMAA AWARDS 2018

Dakar – Nairobi – Geneva 14/12/2018 As part of the Africa Ecommerce weekend 2018 held in Nairobi from 10 to 14 December 2018, the African Civil Society on the Company of the largest pan-African network ICT Information organized the first contest of mobile e-commerce applications (ECMAA Awards). According to the president of ACSIS, Dr. Cissé Kane, the competition aimed to stimulate creativity and innovation among young talents, students, young graduates of our continent (and its diaspora) and promote solutions for new job opportunities through the development of e-commerce mobile application. 50 applications from 15 African countries were registered. Of the 18 pre-selected teams, 11 gathered in Nairobi to participate in the final as well as 2 teams online.  The final of the Competition took place on Friday, December 14, 2018.   The International Jury consisted of:    Mrs. Nnenna Nwakanma, Web Foundation, Nigeria, President of the Jury  M. Alyoune ...

Google Map of the Area in Cross River State affected with floods

Introduction This document describe area that normally experience flood in the part of Cross River State, Nigeria which always resulted to loss of properties and valuable material and posse great danger on the communities in term of their well being. Google Map of the Area in Cross River State affected with floods Note: The area is pin with yellow place-mark in seven locations in Cross River State, Nigeria 1.1   Hazards - Floods: The major type of hazard experience in the city or the state is majorly flood/soil erosion due to heavy downpour of rain and river overflowing due to rising of sea level which resulted into looses of lives, properties, outrageous of diseases and damages etc. 1.2   Vulnerability in term of people: The people mostly affected are the people living in the area situated in the map. It comprises of babies, adults and aged people majorly the efik, the Ejagham and the bekwara. The area includes Duke town, Eja, Ogoja, Obubra,, Odukp...