(919) 746-5011

©2017 BY CYBER LIONS SECURITY, LLC. PROUDLY CREATED WITH WIX.COM

Cyber Lions Security, LLC

Welcome to my blog page. Here you will find all sorts of information about my work as a Information Technology Consultant. I provide all my followers with today's complex cyber security problems and variable solutions to mitigate the attacks. I mostly use information as tools to arm my clients, guide and support their needs so they can  succeed in this vulnerable cyber world and competitive marketplace.  

This Article is on the readiness by 3rd world countries to fight Cyber War.

Is Nigeria Prepared to Fight The Cyber War?


As Nigerian democracy is holding ground, the essence for her to grow economically has been evident, considering the infrastructure development in both the governmental, public and private sectors. For these developments to sustain, and Nigeria to compete in the world market and participate effectively on the lanes of Super Highway, she must totally embrace the evolving 21st Century Economic Standard based on information technology.


Although the advancement in information technology is incumbent to real economic development, which is fundamental in building strong, vibrant and strong nation, one has to visualize the inevitable dangers and security issues to participants in Cyber world. Most Nigerians will be wondering what they have to do with cyber crime, but, I want to use this opportunity to inform anyone who uses the Internet, mobile phones or any other communication device over the air wave, that he or she is exposed to Cyber Crime.


Cyber security is one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Based on the current cyber crimes, such as, identity theft, DOS (denial-of-service) cyber-attacks and other cyber crimes all over the Internet and key infrastructures, it is evident that the potential economic and strategic consequences of cyber-attacks are very great. Especially worrisome are the cyber-attacks that would hijack systems with false information in order to discredit the systems or do lasting physical damage. At a corporate level, attacks of this kind have the potential to create liabilities and losses large enough to bankrupt most companies. At a national level, attacks of this kind, directed at critical government infrastructures, airports, military command intelligence, railways and key infrastructures, have the potential to cause hundreds of billions of naira, and can cause thousands of deaths.

Example of the eminent consequences of cyber attacks known as WannaCry, (Ransomeware) was just witnessed by major companies in both Europe, UK, France and the U.S. The impact set havoc through its part by hijacking computer operations of victims such as, hospitals in the UK, FedEX in the U.S, Petrol stations in China and Renault factory in France. The attackers were demanding payment of ransome from their victims before they could release their enterprise computer network operations to normalcy. Although Microsoft has previously patched that vulnerability in their windows operation systems, but the hackers where able to find a backdoor to get into the system and hijacked their operations. This is a testimony of the current threats that computer operations face every second in today’s inter of things. 


If you are interested, check out some of the attack scenarios that would produce the most devastating consequences now being outlined on hackers web sites and at hacker's conventions. The overall patterns of cyber intrusion campaigns suggest that a number of potentially hostile groups and nation states are actively acquiring the capability to carry out such attacks. 
Notwithstanding the huge amount of financial and human investment nations are making to wage the cyber war, there are still many ways in which criminal organizations could reap huge profits from highly destructive attacks. What this means is that Nigerian government, corporations and Nigerian citizens need to be informed urgently, not just of their technical vulnerabilities, but of the economic and strategic consequences if those vulnerabilities are exploited. It is only by basing our cyber-defenses on a comprehensive assessment of cyber-attack consequences that we, as a nation, can make sure those defenses are sensible and adequate. Lesson learned from an attack is incumbent to mitigating the next attacks.


By Engr. Chijioke E. Ozoeneh, M.Sc.MSISE, DIA-cndt.
Chief Cyber Security Engineer/Consultant, 
Founder & CEO, Cyber Lions Security, INC. USA & Nigeria

 

July 1, 2019

            The first technology that has major impacts on both the law enforcement, people and

government is the gaming technology. Since 2008, DHS S&T and the law enforcement

community combined efforts to find solutions...

May 10, 2018

According to Cisco, Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal busines...

May 1, 2018

To keep a WLAN environment secure, it’s important to stay on top of new wireless vulnerabilities which can be achieved by regularly performing a vulnerability assessment on your wireless network. This provides leverage over the enterprise that enables you to identify a...

April 26, 2017

BOYD:

     In the recent years, the discussion around bring your own device (BYOD) policies has

been often focused on topics such as the opportunity, risk and security implications of using

personal devices and user apps in the business context. The danger of in...

January 10, 2017

My cyber security advice to any IT team I have ever work with is to always plan for the worst  but hope for the best. To some it might sound realistic and to others it might also sound superstitious. We know that It’s too late to start to deal with a cyber attack once...

Please reload

Featured Posts

According to Cisco, Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed...

The Practice of Cyber Security is based on People, Processes, and Controls Technology.

May 10, 2018

1/3
Please reload

Recent Posts
Please reload

Archive
Please reload

Search By Tags