Professional Documents
Culture Documents
net/publication/319878633
CITATIONS READS
5 1,759
2 authors:
All content following this page was uploaded by Ernest Tambo on 18 September 2017.
3 Department of ehealth and Telemedicine Management, Rome Business School, Rome, Italy
126
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
127
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
Table 1: Pattern of cybercrimes and mobile money frauds activities in most affected
African countries
Countr Pop GDP Instit Inte Mobil Inte Incide Estim Common Common CS and
y ulati per ution rnet e r nt ated mobile money mobile money
on capita (Ban user mone cou count cost transactions in transactions
(mill ($PPP) k) s y ntry (cases) of Africa challenges and
ion) accou (%) accou mob cyberc issues
nt nt ile rime
(%) (2016 mon ($milli
) ey on)
South 54.9 13,179 70 52 27- Yes 220,72 573 Cash in / Cash Lack of technical
Africa 5 35% ( 7 out know-how
5-7 Airtime top up/ inability to monitor
millio e-top-up and defend national
n Digital networks
Morocc 33.3 8,360 41 34.1 Yes 106,14 25 merchant rising incidence of
o 3 4 payment and cyberespionage and
Uganda 34.8 2,067 44 28.6 51%( Yes 63,234 35 bill payment cyberterrorism
5 7.7 (utilities, Malware and
millio transportation, malicious
n) school fees, applications
Egypt 92.8 12,137 14 40.2 Yes 57,204 172 hospital bills, targeted banks and
3 utility and other firms
Mauritu 1.26 20,525 82 62.7 Yes 52,974 30 media bills, e- CS unpreparedness
s commerce or and reliance on
Kenya 45.5 3,360 75 69.0 >70% Yes 27,172 175 retail service traditional fraud
3 7 (26.7 payments, detection
millio hospital bills) unpatched systems
n) Payments of and insecure
Tunisia 10.9 11,657 27 28.6 Yes 25,665 NA salary and applications
8 pension,
Nigeria 173. 5,930 44 47.9 43% Yes 20,158 50 taxation and
0 (53.9 insurance
millio payments).
n) Other bulk
Zimbab 13.0 1,953 32 41.4 Yes 19,319 35 payment
we 6 P2P/G2P and
Algeria 40.1 14,950 50 36.5 Yes 10,790 225 third-parties
and signing
partnerships
with other
players such as:
banks,
insurance
companies,
128
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
hotel booking
and travel
agencies,
filling stations,
super markets,
Microfinance
Institutions, etc
GDP- Gross domestic product, PPP- threatrepresented 32% of overall cost due to
Purchasing power parity (The global cyberattacks while it was 26% and 15% for
cybersecurity index (GCI) is a countrylevel
attacks on computer and social engineering
global ranking index on cybersecurity
readiness based on legal measures, technical respectively. We documented three are three
measures, organizational measures, capacity main types of insider threats such as the
building and international cooperation. The
malicious insiders, the exploited insiders and
GCI does not seek to determine the efficacy
or success of a particular measure, but the careless insiders, while careless insiders
simply the existence of national structures in are those who can accidentally cause
place to implement and promote
damage or delete critical information by
cybersecurity. The index has a low level of
granularity based on country captured pressing wrong key. The smallest security
cybersecurity data and transactions threat by kind of attacks was the online
commitment and preparedness, but not its fraud and scams at 8% of overall cost in
detailed capabilities or possible
vulnerabilities. The GCI ranged from 0 to 2016. Although the malicious insiders are
1.) the least frequent, they have the potential to
that the insider threat is the biggest security cause damage due to their insider access. In
concern in African organizations and contrast, the exploited insiders could provide
followed by attacks on computers and social sensitive data or password to external parties
engineering and utility theft in 2016. Insider aimed at attacking the system (Figure 1).
129
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
35
30
Percentage (%)
25
20
15
10
5
0
Figure 1: Distribution of the cyber-attacks cost per type of attacks in 2016 in Africa
130
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
25
20
Percentage (%)
15
10
Type of industry
131
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
132
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
133
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
Improving and sustaining current CS and CS intelligence and information sharing and
mobile money services capabilities requires support necessary physical, technological,
ongoing preparedness and response capacity and cyber measures. It is needed for
development, trainings and exercises (drills continuous CS public forensic tracing or
scenario) activities important to ensure sensor technologies analysis, digital, and/or
effective emergency response as well as biometric evidence within 24 hours of an
promoting prevention to recovery or attack to identify the perpetrator(s) and
restoration programs for socio-economic and prevent or gathering priorities in response to
financial activities power and growth. There a dynamic threat or future attacks follow-on
is need for Africa institutions and acts and/or swiftly develop counter-options.
governments to promote and strengthening This is important in providing timely,
134
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
135
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
136
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
networks. Cybersecurity R&D on emerging global market and share losses. Strategic CS
landscape and best practices need to and CW innovations on technologies and
reevaluate and establish contextual users tools development and implementation
security and trust capabilities from bottom- needs, and organizational management are
up improvements, device to level capital for societal benefits in Africa. This is
perspective instead of centrally-controlled, crucialin reducing cyber-attacks and
top-down actions [13,14]. Establishing and malwares threats and evolving challenges
strengthening robust, reliable and CS incidence and averting the colossal financial
resilience capabilities across all and socio-economic impact. Robust public
communities in Africa and worldwide is and private big data and cybersecurity
wealth and present multifaceted benefits to partnership and investment efforts are
prevent, protect against, mitigate, respond to crucial in defining optimal and effective CS
and recover from the public cyber-threats and ICT capabilities and requirements (e.g.:
and hazards impact over time [15]. Lastly, indicators, standards ad benchmarks)
Scaling up funding investment and integration, knowledge and skills
collective efforts should be devoted to development against CS intruders and other
establish CS surveillance, resilience mobile money threats. Building public and
indicators and benchmarks in guiding community CS communication and
evidence-based high value information and engagement resilience, readiness and
services assets, monitoring and evaluation of capability is crucial in promoting public and
effectiveness against crippling of computer community CS and CW policy and
machines, outbreak of sophisticated cyber- capabilities, awareness campaigns and
attacks and digital ransom collateral engagement and empowerment in reducing
damages worldwide. cybercrime. Evidence-based event-specific
CS laws and regulations implementation is
also needed in ensuring safe and effective
Conclusions electronic or digital commerce/transaction
cyber emergency implementation, personal
There is an urgent need to increasing data and information rights and privacy
cybersecurity capabilities and cooperation laws. As well as building trusted and reliable
by investing in building secured, reliable cyberspace and cyber-security environment
and sustained cyber space decision making including cyberforensic data sharing,
platforms and frameworks. Unleashing CS research and development agenda in guiding
leadership role and commitment is necessary effective preparedness and best practices
to establish a CS and operating platform of actions including early detection ,timely
all stakeholders including Microsoft, protection and response or countermeasures
Google, Apple, Facebook, Banks, modeling, monitoring and evaluation to
governments, and others private sectors on cybercrimes/attacks consequences on Africa
cyberattacks incidents affecting local and productivity and economic prosperity.
Author contributions
137
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012
ET conceived the idea and performed the review of modern threats and trends. Technol Health
Care; 25(1):1-10 (2017).
preliminary search and wrote the outline.
AK prepared the table. ET, AK and HFS 7. Mackey TK, Nayyar G. Digital danger: a review of
the global public health, patient safety and
provided additional contextual information
cybersecurity threats posed by illicit online
in Africa. ET thoroughly revised the pharmacies. Br Med Bull; 118(1):110-26 (2016).
manuscript. Authors read and approved the
8. Ropp R, QuammenB. Build your defense! Develop
final version. a strategic plan of action to combat cybercrime.
Health Manag Technol;36(10):8-9 (2015).
Conflict of interest
9. Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS.
Both authors have no competing interests. Cyber threats to health information systems: A
systematic review. Technol Health Care. 24(1):1-9
(2016).
Funding
10. Canetti Daphna, Gross Michael, Waismel-Manor
No funding was received Israel, Levanon Asaf, and Cohen Hagit. How
Cyberattacks Terrorize: Cortisol and Personal
References Insecurity Jump in the Wake of Cyberattacks.
Cyberpsychology, Behavior, and Social Networking;
1. Waldrop MM. How to hack the hackers: The 20(2): 72-77 (2017).
human side of cybercrime. Nature 2016,
11. Aransiola JO, Asindemade SO. Understanding
12;533(7602):164-7. cybercrime perpetrators and the strategies they
2. African Union Directorate of Information and employ in Nigeria. Cyberpsychol Behav Soc Net,
Communication, “Press Release Nº18/23rd AU 14(12):759-63 (2011).
SUMMIT, The 23rd Ordinary Session of the African
12. Yaghoobi A, Mohammadzade S, Chegini AA,
Union ends in Malabo,” press release, 30 June
Yarmohammadi Vasel M, Zoghi PaidarMR. The
2014,http://summits.au.int/en/sites/default/files/PR%
Relationship Between Attachment Styles, Self-
2018%20-%2023rd%20AU%20A...(3).pdf Monitoring and Cybercrimein Social Network Users.
3. African Union, http://au.int/en/cyber Int J High Risk Behav Addict. 5(3):e27785 (2016).
legislation(accessed 12th March 2016) 3. Draft
13. Check Hayden E. Cybercrime fight targets user
African Union Convention on the Establishment of a
error. Nature; 518(7539):282-3 (2015).
credible legal framework for cyber security in Africa.
African Union, http://au.int/en/cyberlegislation (15th 14. Ernest Tambo, Ghislaine Madjou , Christopher
March 2017) Khayeka-Wandabwa , Emmanuel N. Tekwu ,
Oluwasogo A. Olalubi, Nicolas Midzi , Louis
4. Ephram Percy Kenyanito. Africa moves towards a
Bengyella , Ahmed A. Adedeji , Jeanne Y. Ngogang.
common cyber security legal framework.
Can free open access resources strengthen
https://www.accessnow.org/africa-moves-towards-a-
knowledge-based emerging public health priorities,
common-cyber-security-legal-framework/ (accessed
policies and programs in Africa? F1000Research,
27th March 2017)
5:853 (2016).
5. Canetti D, Gross M, Waismel-Manor I, Levanon
15. Tambo Ernest, GhislaineMadjou, Yves Mbous,
A, Cohen H. How Cyberattacks Terrorize: Cortisol
Oluwasogo A Olalubi, Clarence Yah, Ahmed A
and Personal Insecurity Jump in the Wake of
Adedeji and Jeanne YonkeuNgogang. Digital health
Cyberattacks. Cyber psycho Behav Soc Netw;
implications in health systems in Africa. Eur J of
20(2):72-77 (2017). Pharmaceutical and Medical Research 2016,3(1),
6. Kruse CS, Frederick B, Jacobson T, Monticone 91-93
DK. Cybersecurity in healthcare: A systematic
138