Автор: Adekunle Emmanuel Makanjuola, Mary Mojirade Ayantunji
Организация: Federal College of Education; Lead City University


Ключевые слова: Cybersecurity, Holistic Approach, Nigeria, Digital Security, Capacity Building
Аннотация. Given Nigeria's growing reliance on technology, it is imperative that the country take a comprehensive approach in order to strengthen its cybersecurity posture. This article provides an analysis of the current vulnerabilities, focusing on the limitations of the regulatory frameworks that are now in place, the degrees of public awareness, and the protection from vital infrastructure. As a result, it is recommended that a multi-pronged plan be proposed in order to solve these difficulties. The establishment of a comprehensive cybersecurity law, the implementation of national awareness campaigns and the incorporation of cybersecurity education into curriculums, the execution of vulnerability assessments and the enforcement of stricter protocols for critical infrastructure sectors, the investment in capacity building programmes to develop a skilled cybersecurity workforce, and the promotion of international cooperation to share best practices and threat intelligence are all included. Through the implementation of these interrelated measures, Nigeria is able to considerably boost its cybersecurity defences and develop a digital environment that is safer for its residents and enterprises.


GSMA (2024). The Mobile Economy Sub-Saharan Africa 2024.
Jumia 2023. Jumia Group Financial Statements 2023.
Pricewaterhouse Coopers Nigeria (PwC Nigeria) 2023. Nigeria Fintech Report 2023.
Nigerian Data Protection Commission (NDPC) (2023) Nigerian Cybersecurity Report 2023.
Cyber Security Experts of Nigeria (CSEAN) 2024. National Cyber Threat Forecast 2024.
Nigeria Data Protection Bureau (NDPB) 2022. Annual Report 2022.
Atlantic Council 2022. Securing the Energy Transition against Cyber Threats: Report of the Atlantic Council Task Force on Cybersecurity and the Energy Transition.
Chernov, D., & Sornette, D. 2020. Critical risks of different economic sectors. Based on the Analysis of More Than, 500. Switzerland: Springer Cham
Sibe, R. T., & Kaunert, C. 2024. Cyber Crime in Nigeria - Reviewing the Problems. In Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria (pp. 19-55). Cham: Springer Nature Switzerland
Hu, M. 2024. National Security and Federalizing Data Privacy Infrastructure for AI Governance. William & Mary Law School Research Paper, (09-488)
Akongburo, R. A., Boshe, P., Dei-Tutu, S. A., & Hennemann, M. (Eds.). 2024. African Data Protection Laws: Regulation, Policy, and Practice (Vol. 3). Walter de Gruyter GmbH & Co KG
Katagiri, N. 2024. Why Soft Measures Are Too Soft: International Law and Norms. In How Liberal Democracies Defend Their Cyber Networks from Hackers: Strategies of Deterrence (pp. 77-94). Cham: Springer Nature Switzerland
Essien, E. S., & Edun, E. E. 2024. Digitalizing cyber security for data management in higher education: Implication for Educational Management in Nigeria. International Journal of Education and National Development, 2(1), 70-78
Adewopo, V., Azumah, S. W., Yakubu, M. A., Gyamfi, E. K., Ozer, M., & Elsayed, N. 2024. A Comprehensive Analytical Review on Cybercrime in West Africa. arXiv preprint arXiv:2402.01649.
Kuteesa, K. N., Akpuokwe, C. U., & Udeh, C. A. 2024. Theoretical perspectives on digital divide and ICT access: comparative study of rural communities in Africa and the United States. Computer Science & IT Research Journal, 5(4), 839-849
Aliyu, A. A. 2024. A Multi-Pronged Framework for a Cyber-Secure Nigeria. Scientific and Practical Cyber Security Journal (SPCSJ) 8(1): 69 – 75 ISSN 2587-4667
Usama, M., Ullah, U., & Sajid, A. 2024. Cyber Attacks against Intelligent Transportation Systems. In Cyber Security for Next-Generation Computing Technologies (pp. 190-230). CRC Press
Hiller, J., Kisska‐Schulze, K., & Shackelford, S. 2024. Cybersecurity carrots and sticks. American Business Law Journal, 61(1), 5-29
Rasel, M. 2024. Synergizing Cyber Threat Intelligence Sharing and Risk Assessment for Enhanced Government Cybersecurity: A Holistic Approach. Journal Environmental Sciences and Technology, 3(1), 649-673