0% found this document useful (0 votes)
103 views7 pages

VICBHE Module 10-Newsletter No 8 June 1 2025

The VICBHE Module 10 Newsletter discusses the dual role of Artificial Intelligence (AI) in cybersecurity, highlighting its potential as both a protector and a threat. It emphasizes the importance of using AI for defense against cyber attacks while also acknowledging that cybercriminals are leveraging AI for more sophisticated attacks. The newsletter also provides practical cybersecurity tips and updates on upcoming training and discussions related to ethical hacking and AI's role in cybersecurity.

Uploaded by

ahmed.rb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views7 pages

VICBHE Module 10-Newsletter No 8 June 1 2025

The VICBHE Module 10 Newsletter discusses the dual role of Artificial Intelligence (AI) in cybersecurity, highlighting its potential as both a protector and a threat. It emphasizes the importance of using AI for defense against cyber attacks while also acknowledging that cybercriminals are leveraging AI for more sophisticated attacks. The newsletter also provides practical cybersecurity tips and updates on upcoming training and discussions related to ethical hacking and AI's role in cybersecurity.

Uploaded by

ahmed.rb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Please read to the end and

share with others

VICBHE Module 10 Newsletter No. 8, June 1, 2025


Artificial Intelligence in the Middle: Friend or Foe in Cyber
Security
Towards the end of 2014, VICBHE delivered a three-month training on the “ABC of Artificial
Intelligence in Higher Education”. We shook the world with a 4,093-page Handbook in three
volumes as one of the several tangible and intangible outputs of the training. VICBHE graduates
of the Module are now deploying AI for teaching, research and community service to improve
efficiency and effectiveness of their institutions and as individuals. Our Module 8 graduates are
the catalysts for the development of policies on AI for their universities, polytechnics and
colleges of education. Now in the middle of Module 10 training on cyber security, AI is reminding
us to transfer knowledge from what we learned in Module 8. What is the transfer about?

Imagine you are having a private conversation with a friend, and suddenly, without you knowing,
someone sneaks in and starts listening (the amebo kind). That eavesdropper is not just curious,
it is also smart, quick, and nearly invisible. In the digital world, we call this a “Man-in-the-
Middle” (MitM) attack. But here is a twist: what if the intruder is not human — but Artificial
Intelligence? Welcome to the world where AI plays both hero and villain in cyber security. Let us
break it down.

In simple terms and as you will recall from video lesson Nos 1 and 2, a Man-in-the-Middle attack
happens when a hacker secretly intercepts and possibly alters communication between two
parties. You think you are chatting safely with your bank or logging into your email, but someone
else is sitting quietly between you and the website, soaking up your passwords, personal
information, and more. In today’s digital age, a quiet war is being waged. It is not a war with
bombs or bullets, but with algorithms, code, and an invisible intelligence that never sleeps. At
the centre of this silent battlefield is something that sounds like science fiction but is very real:
Artificial Intelligence (AI) acting as a man in the middle — sometimes as a protector, other times
as an intruder.

Thankfully, AI is not just being used by the bad guys. It is also becoming one of our most
powerful tools for defence. Across the world, cybersecurity professionals are training AI
systems to spot intrusions before they happen, to learn from each attack, and to respond faster
than any human team could. These intelligent systems monitor traffic on networks 24/7,
identifying anomalies — tiny changes in behaviour that could signal an intrusion. If a user logs in
from Nigeria in the morning and then from New York an hour later, AI might flag it. If a bank
transfer is suddenly made to a new country, AI might stop it mid-flight. In many cases, users are
unaware that an attack was even attempted, because the AI shield acted quickly and quietly.

AI is also playing a critical role in encryption, the art of locking digital data so that only the
intended recipient can read it. Smarter AI systems are developing better ways to scramble and
protect data, making it far more difficult for a MitM to make sense of intercepted messages. It is
VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 1
like building stronger, more complicated safes while also installing alarm systems that detect
burglars before they even reach the door. AI is like a super-smart assistant that can learn
patterns, recognise faces, drive cars, or even write poetry. But in cyber security, it is a double-
edged sword. Let us see how AI works on both sides of the fence.

First, AI can be a villain. As Dr. Benjamin Onuorah informed us in his live lecture last week
Monday, cyber criminals are now using AI to power their attacks. It enables faster hacking. AI
can scan thousands of networks in minutes, finding weak spots far faster than a human. It is
also a master “phisher”. AI can craft emails that look like they are from your boss or bank —
tricking even the careful ones among us. In a MitM setup, AI can sit quietly, watching encrypted
messages and even trying to predict or decode them. Some attackers use AI to mimic voices
and faces — making fake phone calls or video messages seem frighteningly real. In short, AI in
the wrong hands becomes a spy that never sleeps. Traditional malware required human input,
but AI-driven malware evolves on its own. These viruses learn and adapt in real-time, changing
their attack patterns to bypass firewalls and security software

Yet, for every innovation in defence, there is an equal and opposite evolution in offense.
Remember Isaac Newton’s Third Law of Motion? Cybercriminals are increasingly weaponising
AI to bypass security measures. Phishing scams, once easy to spot due to clumsy language,
now use AI-generated text that mimics human communication flawlessly. Deepfake audio and
video (as Module 8 participants learned practically) can trick biometric security systems, while
AI-driven bots execute brute-force attacks at speeds no human hacker could match. This arms
race has turned cyber security into a silent war of algorithms. Attackers use AI to find
vulnerabilities, while defenders deploy it to seal breaches before they’re exploited. The
battleground is no longer just human versus human—it is machine versus machine, with each
side constantly adapting to outmanoeuvre the other.

AI can also be a hero. It can be used for detecting threats early. AI-powered systems can watch
over networks 24/7 and raise alarms when they spot anything unusual. AI helps improve the way
we lock our digital doors, making it harder for intruders to get in. It can predict where the next
attack might come from and prepare a defence — like a smart general in a battlefield. When AI
detects that someone is trying to sneak in between a connection, it can shut the gate
immediately.

AI serves as a digital watchman who never sleeps, scrutinising every byte of data that flows
through a network. It detects anomalies—unusual login attempts, suspicious file transfers, or
unexpected spikes in traffic—with a precision that human analysts might miss. When it spots
something amiss, it does not wait for a human to sound the alarm. Instead, it can automatically
isolate compromised systems, block malicious IP addresses, or even deploy countermeasures
to neutralize threats before they escalate. Beyond mere detection, AI excels at prediction. By
analysing vast amounts of historical attack data, machine learning models can forecast where
and how the next breach might occur. Financial institutions, for example, now use AI to spot
fraudulent transactions in milliseconds, while corporations rely on it to flag phishing emails that
mimic the writing styles of trusted colleagues. The technology does not just defend; it learns
from every encounter, growing smarter with each attempted intrusion.

Should We Be Worried? Yes — and no. Like every powerful tool, AI depends on who uses it. If
used wrongly, it can cause great harm. But with the right safeguards, policies, and skilled
cybersecurity professionals, AI becomes a strong shield. Artificial Intelligence is here to stay. As
we enjoy its benefits — from smart homes to digital assistants — we must also stay alert to its
risks. In the world of cybersecurity, AI is the new “man in the middle.” Whether it is protecting
you or spying on you depends on who controls it. At the end of the day, technology is only part of
VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 2
the story. Human beings remain the biggest risk — and the greatest defence. No AI can stop a
user from clicking a suspicious link or using “password123” for their bank account. Education,
awareness, and good digital hygiene are just as important as firewalls and encryption.

Weekly Test No. 5-Best Performance, Still Not Relenting


On behalf of VICBHE Management I congratulate you on the stellar performance in Weekly Test
No. 5. Again, just as you did in the previous week, 600/600 was just flowing like water (see Fig.
1). Please keep up the trend.

Figure 1: Distribution of scores for Weekly Test 3

Video Lesson No. 6- Ethical Hacking Using Zenmap/Nmap by


Peter A. Okebukola
This week’s video lesson is 35 minutes long, mostly practicals. It provides a guide to using
Zenmap/Nmap for ethical hacking. Watch it here.

Practical No. 6- Nmap in ethical hacking


Practical No. 6 takes you into the sweet world of ethical hacking with Zenmap. You will get the
video guide towards the end of video Lesson 6 (click here). You can submit on the VICBHE app
whenever you finish, noting that the deadline for submission is Saturday at 6:00 p.m.
Remember to submit only after you are satisfied with your report. The helpdesk will not be
available to purge the system of a draft you submitted in error. The template for your report is:

VICBHE Module 10 Practical 6 Report Template

VICBHE Module 10 Practical 6


Registration No:
Surname:
First Name

VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 3


Practical 6: Nmap scan report
Authority to ethically scan received from (Name
and Date)
Date:
Target:
Scan Type:
Nmap Command Used:
Scan Summary
• Host Status: [Up/Down]
• Operating System: [Detected OS]
• Total Open Ports: [Number of Open Ports]

Ports & Services

Port Protocol State Service Version

Topological map

Vulnerabilities & Security Findings


Summarise from report from ChatGPT or any other AI tool you find convenient to use.

• Detected Vulnerabilities: [List Common Vulnerabilities and Exposures]


• Firewall & Security Measures: [Detected Firewalls, IDS/IPS]
VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 4
Recommendations
Summarise from report from ChatGPT or any other AI tool you find convenient to use.

Conclusion
[Summarise key findings, risks, and next steps.]

This Week at VICBHE


Sunday June 01
FREE
Monday June 02 Live Lectures No. 6: Time: 2:00 to 3:00 p.m. Unit 6: Ethical
Hacking with
Zoom link: Click here
Nmap/Zenmap by
Peter A. Okebukola
Host: Dr. Adetola Akanbiemu- VICBHE Institute
Librarian Click here to watch
the video.
Chairman: Professor Ogbonnaya Onwudike, VC,
Rhema University, Aba

Co-Chairman: Professor Adenike Boyo, DVC, Lagos


State University

• Topic 1: Towards a Revised National Policy


on Cybersecurity for Nigeria (15 minutes)
• Speaker: Dr. Adekunle Oladejo,
Cybersecurity expert, ACEITSE-LASU

• Topic 2: Towards Ghana’s National Policy on


Cyber Security (15 minutes)
• Speaker: Dr. Felicia Nkrumah, Association
of African Universities, Accra

Plenary Discussion: 25 minutes

Tuesday June 03
FREE
Wednesday June 04 Discussion Forum No. 6

Opens 8:00 a.m. Closes at 10:00 a.m.


Topic: AI can outpace hackers in defending
against cyber attacks. Discuss any four points.

(Maximum 250 words). Any word in excess will be


penalised by deduction of 20 marks. Marking
scheme: Listing of the four points and expatiation of
the four. Ensure you list the points first and then

VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 5


expatiate. Each correct point listed 5 marks 5 X 4 =
20; Each point expatiated 20 marks 20 X 4=80
Total=100.

Thursday June 05 FREE


Friday June 06 FREE
Saturday June 07 Week 6 Test Submission of
practical (6:00 p.m.)

Test for this Week (Saturday, June 7, 2025)


Time: 5:00 to 5:45 p.m.
Number of items=60 multiple-choice
Time allowed: 35 minutes
Content covered: Newsletter 8; Video Lesson 6, and Live Lectures 6
Link to the examination room: Click here

Questions from Participants


• Participant: “My Network was slower. hence i was locked out at exactly 6 while
uploading. i attached my practical report 5. Kindly assist.”

o Response from VICBHE: What a huge pity. Unfortunately, no submission


outside the VICBHE app will be processed. We recommend your submitting long
before the deadline so as not to be caught up in the last-minute network glitch.

• Participant: “I ran out of data and sought assistance to submit my practical. I missed it
by one minute. Can you please assist me? I have worked on this practical for one week. I
am very sorry.”

o Response from VICBHE: We are sorry to see you go through so much trouble.
Please take heart and do your best to keep within submission deadlines for all
tasks.

• Participant: “I have been unable to access my vicbhe app on my laptop since the
beginning of this module 10 vicbhe training on cyber security. Each time I try to submit or
upload my practical assignments, I get an error 403 message displayed on my laptop
and unable to continue with the page. Please, what can I do?”

o Response from VICBHE: What a pity! Please try using another laptop until you
get yours fixed.

Cyber security tips for the week- Staying Safe in an AI-Driven


Cyber World
• Use Strong Encryption: Always ensure communications are encrypted using up-to-
date protocols to make interception and decryption harder for attackers.

VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 6


• Enable Multi-Factor Authentication: This adds an extra layer of security, making it
more difficult for attackers to hijack sessions even if they intercept credentials.
• Educate and Train: Regular training helps users recognise AI-powered phishing and
vishing attempts, which are becoming increasingly sophisticated.
• Adopt AI-Powered Security Tools: Modern cyber security solutions that leverage AI for
real-time monitoring, anomaly detection, and automated response are essential for
defending against advanced MITM attacks.

Update on the earlier announcement regarding Break


Please recall that we approved Monday June 9 to 12 as break. It has now been officially
announced that Friday, June 6 and Monday June 9 will be Sallah holidays. June 12 is another
holiday. VICBHE management has approved June 5 to 9 as break for Sallah; and June 12 as
holiday and implement our activities for other days. You deserve this break!

Helpdesk/Technical Officers

If you need help, send an email/ SMS to your Group helpdesk/technical support officer.

PLEA: Emails should NOT be sent to me directly but to the HelpDesk/Technical


Officers who are trained to process requests/feedback and escalate when
necessary.

Serial Name of Technical Telephone Email address NB: Please copy all
number on Support Staff number emails to
the
admission
list
1-900 Buhari Segun 08059570507 [email protected]

901-1800 Gazalli 07035375751 [email protected]


Muhammad pokebukola@yahoo.
Nuraddeen com
waalsadesina@gma
1801-2700 Emmanuel Jatau 07034667166 [email protected] il.com
2701-3600 Abdulkadir Hauwa 08038889935 [email protected] [email protected]
om
3600-4653 Gbenga Atteh 08030441024 [email protected]

Have a great week and God bless.

Peter A. Okebukola, OFR


Director/Facilitator-General

VICBHE Module 10 Newsletter No.8, Sunday, June 1, 2025, page 7

You might also like