Skip to main content

CONTRIBUTIONS TO BPF BY AKINREMI PETER TAIWO


How does good cybersecurity contribute to the growth of and trust in ICTs and Internet Technologies, and their ability to support the Sustainable Development Goals (SDGs)?
The rapid growth and adoption of ICTs as a key driver of the economic development would be jeopardized if measures to protect connected devices and user generated data is absent. The fear of data compromising, information theft, privacy intrusion, surveillance, unreliable software programs and applications would not allow those unconnected billion people to fully rely on the use of the internet and its related technologies therefore distant the realization of sustainable development goals.
The emergency of internet, penetration and its usage was given highest consideration with less attention to its security issues. Less attention to protecting the information and communication technologies and internet technologies would lead to high rate of disadvantages over the benefits.
 Abuse of the use of technologies would be on the increase on a daily basis as there is or little comprehensive short rules backing the usage of such technologies. Reliability and authenticity of information will be rendered useless and reduction in innovation of business services
Assessment of the CENB Phase II policy recommendations identified a few clear threats. Do you see particular policy options to help address, with particular attention to the multi-stakeholder environment, the following cybersecurity challenges?
Denial of Service attacks and other cybersecurity issues that impact the reliability and access to Internet service
The policy option to address the issues of cybersecurity should be a clear awareness of the potential impacts, rules and action to guide against such acts
Security of mobile devices, which are the vehicle of Internet growth in many countries, and fulfill critical goals such as payments
Technologies products and services should undergo through the testing stages to ensure compliance to standards and bug fixes. Also, there is a need for penetration testing at every stage of technology products and services

Potential abuse by authorities, including surveillance of Internet usage, or the use of user-provided data for different purposes than intended
In the fight to secure the online environment, authorities somehow has violated and abuse the openness of the internet and user privacy. To help address the abuse, clear formulation of a set of rules on data respect and user privacy should be enacted.

Many Internet developments do not happen in a highly coordinated way - a technology may be developed in the technical community or private sector, and used by other communities and interact in unexpected ways. Stakeholders are managing complexity.
This both shows the strength and opportunities of ICTs and Internet Technologies, but also the potential risks. New technologies may be insufficiently secure, resulting in harms when they are deployed: conversely we may adopt security requirements or measures that prevent the development, deployment, or widespread use of technologies that would generate unforeseen benefits. Where do you think lies the responsibility of each stakeholder community in helping ensure cybersecurity does not hinder future Internet development?
Joint efforts to the formulation of cybersecurity policies to protect the internet technologies and ICTs would help ensure and prevent hindrance to internet development. A periodic evaluation of cybersecurity policies, issues and forum where all stakeholders on an equal footing to address and resolve any potential changes and development. Also, a careful and sensitive approach to defining requirements and measures need be; to avoid strict measures which could jeopardize the future of internet development.
What is for you the most critical cybersecurity issue that needs solving and would benefit most from a multi-stakeholder approach within this BPF? Should any stakeholders be specifically invited in order for this issue to be addressed?
The most critical cybersecurity issues is the vulnerability of critical infrastructure and internet resources. Recent development has seen attacks on infrastructures to disrupt transmission and processes, to eavesdrop, and control while gaining access to useful information. The security of infrastructure and internet resources which ranges from hardware to software must be in every stakeholders mind as these formed the base for accessing user information.

Submitted by: Akinremi Peter Taiwo

Comments

Popular posts from this blog

PROPOSAL FOR INFRASTRUCTURE DEVELOPMENT: TELEMEDICNE IN CROSS RIVER STATE, NIGERIA

Akinremi Peter Taiwo The embracement of information and communication technology had contributed greatly to the development of Nigeria as a whole. ICT infrastructure can be said to be the overall name used to describe all communications hardware and software someone uses as individual, in organization to get work done.  ICT infrastructures are technological tools and resources used to communicate, disseminate, store and manage information effectively.(infoxchange.net) In Nigeria, there are various ICT services which are unfolding as a result of invention of internet and the embracement of information and communication technology by the Government. The development of this great nation depends on the deployment of ICT infrastructure which will lead to various opportunities on her development. Recently, the Government of Cross river state signed  a contract worth N1.1 billion naira to MTN Communication Limited, Nigeria  for  broadband  infrastructure in calabar ( www.crrossrivers

SESSION REPORT ON DIGITAL INCLUSION IN AFRICA AS THE MOST IMPORTANT RIGHT DURING THE INTERNET FREEDOM FORUM, 2018 IN ABUJA BY AKINREMI PETER TAIWO, ACSIS WEST COORDINATOR.

The session seeks to identify the barriers to greater digital inclusion and recommend ways of overcoming these obstacles towards empowering Africans with the transforming power of ICTs. Tope Ogundipe, the Director of Programs with Paradigm Initiative moderated the session. She reflected on the 21% internet penetration in Africa, a figure that reflects the underdevelopment on a continent with a population of around 1.2billion. On the panel were Chioma Agwuegbo from CC Consulting Services (Nigeria), Akinremi Peter Taiwo, a West Africa Coordinator of African Civil Society (Nigeria), Olajumoke Adekeye, a statistician (Nigeria) and Poncelet Ileleji from The Gambia. Chioma, the first speaker listed three key factors that must be met before access would become a priority for the human kind which are Food, Shelter and Clothing. She further looked at how poverty has handicap many Africans in the area of affordability of computers and internet access. Peter, who was the second speaker

FLOOD COULD CAUSE NIGERIA POTENTIAL DAMAGES

FLOOD COULD CAUSE NIGERIA POTENTIAL DAMAGES   Well, little effort has been put in place in order to help combat the unforeseen flood disaster. Among this is awareness to help people prevent these challenges, building of channel for water passage, drainage and evacuating the living and building along the water path. Despite the effort putting in place people still show nonchalant attitude toward flood awareness program. I would still say that if Nigeria experiences more rainfall that is beyond that of 2012, many lives and property worth millions will be destroy as a result of nonchalant attitude of the people, small size of drainage system and low quality of material for building drainage system and inaction of the leaders. The Heavy rain fall experienced by Nigerian cities early 2012 killed 363 and rendered useless over 2,100,000 people as of November, 2012(Reuters, 2012) The cities such as Lagos, Ibadan (oke-ayo and Eleyele), Plateau, Jos, Cross River, Borno, Benue, Kogi, E