0% found this document useful (0 votes)
56 views12 pages

Cybersecurity Seminar Complete Part2

Uploaded by

braimahfk1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views12 pages

Cybersecurity Seminar Complete Part2

Uploaded by

braimahfk1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

NATIONAL OPEN UNIVERSITY OF NIGERIA

SEMINAR TOPIC:
CYBER SECURITY: THREATS AND AWARENESS OF PROTECTION

NAME:
PETER OJOR

MAT NO:
NOU221139109

DEPARTMENT:
COMPUTER SCIENCE (400L)

CENTRE:
FUGAR COMMUNITY STUDY CENTRE

JUNE, 2025

1
ABSTRACT
Cybersecurity has become one of the most critical aspects of the digital world, especially
with the rapid growth in the use of digital technologies and the internet. This seminar
examines the various threats posed by cyber-attacks and the importance of awareness
and protective measures to mitigate such threats. The paper discusses the nature of cyber
threats, their impact on individuals and organizations, the importance of cybersecurity
awareness, and the strategies used to protect digital assets. It also highlights global and
Nigerian perspectives on cybersecurity, the role of government policies, and the
importance of training and awareness campaigns. The study concludes that proactive
awareness and continuous improvement of cybersecurity measures are essential in
addressing these evolving threats.

2
INTRODUCTION

1.1 Background of study

The digital transformation in today's society has significantly altered how people

communicate, work, learn, and do business. However, this transformation also brings

increased exposure to cyber threats. With more information being digitized and more

devices being connected to the internet, the need to secure data and protect privacy

becomes more urgent. Cybersecurity involves a set of techniques and technologies

designed to protect the integrity of networks, programs, and data from attack, damage, or

unauthorized access. This section explores the evolution of cybersecurity, its significance

in the modern world, and why awareness is essential in tackling cyber threats.

Cybersecurity threats are potential dangers to digital systems, information, and

individuals, while cybersecurity awareness involves understanding these threats and

adopting protective measures. Key threats include malware, phishing, social engineering,

and insider threats, which can lead to financial loss, data breaches, and service

disruptions. Raising cybersecurity awareness involves educating individuals and

organizations on best practices, such as using strong passwords, enabling multi-factor

authentication, and being cautious of suspicious emails

1.2 Statement of Problem

In many parts of the world, including Nigeria, there is a significant lack of

cybersecurity awareness among the general public. Many individuals and small

businesses operate without adequate knowledge of potential cyber threats, leaving their

systems and data vulnerable to attacks.

3
This lack of awareness contributes to increasing incidents of cyber fraud, identity

theft, phishing scams, and other malicious activities. Compounding the problem is the

rapid pace at which technology evolves, making it difficult for users to keep up with the

necessary protective measures.

This seminar addresses these problems by exploring ways to enhance

cybersecurity awareness and recommending practical protection strategies.

1.3 Objectives

The objectives of this seminar include:

 To identify and analyze common cybersecurity threats in the digital space.

 To assess the level of cybersecurity awareness among users and organizations.

 To explore various protection and defense mechanisms against cyber threats.

 To understand the role of government policies and regulations in cybersecurity

enforcement.

 To recommend effective strategies for improving cybersecurity education and public

awareness.

4
Review of Related Literature

Research on cybersecurity has grown significantly over the past decade as the

world becomes more digitally interconnected. Smith (2022) emphasizes the increasing

sophistication of cyber-attacks and the need for improved protective measures. Ndukwe

and Okoro (2021) found that awareness and consistent training significantly reduce

vulnerabilities to cyber threats. Globally, governments and institutions are investing

heavily in cybersecurity frameworks.

In Nigeria, the Nigerian Communications Commission (NCC) and the National

Information Technology Development Agency (NITDA) have both developed awareness

programs and guidelines to mitigate cybercrime. Studies consistently show that countries

with robust cybersecurity awareness campaigns have fewer cases of successful cyber-

attacks.

2.1 Cybersecurity Threats

Cybersecurity threats are tactics and techniques used by malicious actors to

compromise, damage, or steal information from digital systems. Some common threats

include:

 Malware: Malicious software such as viruses, worms, trojans, and ransomware

designed to harm or exploit systems.

 Phishing: Fraudulent emails or messages aimed at tricking recipients into revealing

personal or financial information.

 Man-in-the-Middle Attacks: Interception of communication between two parties to

steal data.

 Denial-of-Service (DoS) Attacks: Overloading systems to render them inoperable.

5
 Insider Threats: Breaches caused by individuals within the organization, either

maliciously or negligently.

2.2 Cybersecurity Awareness

Cybersecurity awareness involves educating users about cyber threats and how to

prevent them. It empowers individuals and organizations to recognize, report, and

respond to cyber incidents. Awareness programs typically include training on secure

password practices, identifying phishing attempts, data privacy, and proper handling of

sensitive information. The more informed users are, the less likely they are to fall victim

to cyber-attacks. Organizations must foster a culture where cybersecurity is seen as

everyone's responsibility.

Awareness refers to the knowledge and practices that individuals within

organisations possess to protect sensitive information and systems from cyber threats. By

understanding the risks associated with cyber threats, employees can play a crucial role in

safeguarding their organisation's assets. Training programmes focus on equipping staff

with the necessary skills to identify and respond to potential security breaches.

By understanding the risks associated with cyber threats, employees can play a

crucial role in safeguarding their organisation's assets. Training programmes focus on

equipping staff with the necessary skills to identify and respond to potential security

breaches.

An informed workforce is the first line of defence against cyberattacks. For

instance, phishing attacks, where employees unknowingly click on malicious links or

provide sensitive information, can lead to significant data breaches

6
2.3 Why cyber security awareness is important

Cyber Security Awareness is crucial for organisations to prevent

data breaches, phishing scams, and security incidents by enhancing

their cyber security posture.

Cyber Security Awareness is crucial for organisations to prevent

data breaches, phishing scams, and security incidents by enhancing

their cyber security posture.

In the digital age, where technology plays a central role in

everyday operations, the importance of cyber security awareness

cannot be overstated. With cyber threats becoming increasingly

sophisticated, organisations need to arm their employees with the

knowledge and skills to detect and prevent potential attacks.

By conducting regular awareness training sessions, businesses

can enable their staff to identify suspicious emails, links, or messages

that could potentially lead to devastating consequences. This proactive

approach not only safeguards sensitive data but also contributes to

building a strong and resilient cyber defence strategy.

2.4 Protective Strategies

There are numerous strategies that can be implemented to protect against cyber

threats. These include both technical and procedural approaches:

 Installing and regularly updating antivirus and anti-malware software.

 Using firewalls to monitor and control incoming and outgoing network traffic.

 Implementing strong password policies and multi-factor authentication.

7
 Regularly backing up important data and storing it securely.

 Training employees on cybersecurity best practices and protocols.

 Conducting regular security audits and vulnerability assessments.

2.5 Role Of Government And Organizations

Governments and organizations play a vital role in cybersecurity protection and

public awareness. In Nigeria, the Cybercrime (Prohibition, Prevention, etc.) Act of 2015

serves as the foundational legal framework addressing cyber offenses and prescribing

penalties. Government agencies like the Nigerian Communications Commission (NCC)

and the National Information Technology Development Agency (NITDA) actively

promote digital safety through policies and awareness campaigns.

Organizations, both private and public, are also responsible for safeguarding their

networks and sensitive data. This includes deploying internal security protocols,

employee training, regular audits, and compliance with regulatory standards.

International collaborations and information sharing between organizations further

strengthen cybersecurity resilience across borders.

2.6 Challenges In Cybersecurity Awareness

Despite the progress made in promoting cybersecurity, several challenges remain:

1. Limited Training Access: Many individuals, especially in rural areas, lack

access to digital literacy programs.

2. High Cost of Infrastructure: Smaller businesses struggle to afford enterprise-

grade cybersecurity solutions.

8
3. Insufficient Professionals: There's a global shortage of skilled cybersecurity

experts.

4. Rapid Threat Evolution: Attack techniques evolve faster than awareness and

training can keep up.

5. Negligence and Poor Practices: Users often reuse passwords, ignore security

warnings, or delay software updates.

2.7 Case Studies

Case Study 1: The 2017 Wanna Cry Ransomware Attack: This global cyberattack

affected over 200,000 systems across 150 countries, including in Nigeria. The

ransomware encrypted files and demanded Bitcoin payments. It exposed weaknesses

in outdated Windows systems and emphasized the importance of timely software

updates and employee training.

Case Study 2: Nigerian Financial Institution Phishing Breach: In 2020, a major Nigerian

bank suffered a phishing attack leading to a massive customer data leak.

Investigations revealed that staff lacked proper cybersecurity training. As a result, the

bank introduced a new digital literacy program and two-factor authentication for staff

and customers.

Case Study 3: Cyber Attacks on Healthcare Systems During COVID-19: Health

organizations like the WHO faced repeated cyber intrusions aimed at stealing vaccine

research. This underscored the importance of cybersecurity in critical infrastructure

and the need for secure communication channels during global emergencies.

2.8 Future Trends In Cybersecurity

9
As digital systems become more complex, the following trends are expected to

shape the future of cybersecurity:

 Artificial Intelligence (AI) and Machine Learning (ML) will enhance threat

detection and automate responses to cyber incidents.

 Zero Trust Architecture will become the norm, requiring verification at every

access point.

 Cloud Security and IoT Protection will receive more attention as businesses rely

more on connected devices and cloud platforms.

 Cybersecurity Education Expansion will create more degree programs,

certifications, and training centers in both public and private sectors.

 Global Cybersecurity Collaboration will increase through treaties, alliances, and

multinational task forces.

10
3.1 Conclusion

In an increasingly digital world, cybersecurity is not a luxury but a necessity. The

growing threats from cybercriminals, hackers, and malicious software demand constant

vigilance and proactive measures. This seminar has reviewed the nature of these threats,

examined awareness levels, outlined protection strategies, and discussed the role of key

stakeholders. Cybersecurity must be prioritized through legislation, education,

technology, and individual responsibility to ensure a safer digital environment for all.

3.2 Recommendations

1. Introduce Cybersecurity in School Curricula: From secondary school to tertiary

levels, digital safety should be embedded into ICT courses.

2. Promote Public Awareness Campaigns: Government and private sectors should

conduct nationwide training and sensitization.

3. Subsidize Cybersecurity Tools for SMEs: Small and medium businesses should

receive grants or tax relief to acquire basic security tools.

4. Encourage Research and Innovation: More investment is needed in local

cybersecurity research and start-ups.

5. Foster International Cooperation: Cyber threats are global; international

information-sharing partnerships are essential.

11
References

Smith, J. (2022). Cybersecurity in the Digital Age. New York: TechWorld Press.

Ndukwe, A. & Okoro, T. (2021). Cybersecurity Awareness in Developing Countries.


Nigerian Journal of Technology, 45(3), 234-245.

Nigerian Communications Commission (NCC). (2023). Annual Report on Cybersecurity


Activities.

National Information Technology Development Agency (NITDA). (2022). Guidelines for


Data Protection in Nigeria.

Cybercrime (Prohibition, Prevention, etc.) Act, 2015. Federal Republic of Nigeria.

12

You might also like