“Following the African International Counter Terrorism Meeting held in Abuja on April 22 and 23, 2024, African leaders underscored the critical necessity of enhancing support and resources for bolstering cybersecurity efforts across Africa. Additionally, they emphasized the imperative to take tangible measures to prevent terrorists and organized criminal groups from exploiting social media and similar platforms.
“In light of the imperative to fortify Nigeria’s digital landscape, ensuring both national security and economic interests are safeguarded, and in alignment with the provisions outlined in section 44(5) of the Cybercrimes Act, this office has communicated with all law enforcement agencies, regulators, businesses, and stakeholders to institute mechanisms for the comprehensive implementation and enforcement of the Cybercrimes (Prohibition, Prevention, Etc) Amendment Act 2024.
“Through this amendment, all obstacles hindering the full enactment of the Cybercrimes law have been addressed.
“As a result, a levy equivalent to 0.5 percent of the value of all electronic transactions conducted by specified businesses outlined in the Second Schedule to the Act will be levied and directed to the National Cybercrime Fund.”
Cybercrimes, also known as computer-related crimes or internet crimes, encompass a wide range of illegal activities conducted through digital means. These crimes exploit vulnerabilities in computer systems, networks, and online platforms, posing significant threats to individuals, businesses, and governments worldwide.
Common types of cybercrimes include:
- Cyberfraud: This involves fraudulent activities conducted online, such as phishing scams, identity theft, and credit card fraud. Cybercriminals often use deceptive tactics to trick individuals into divulging sensitive information or making unauthorized transactions.
- Malware Attacks: Malicious software, or malware, is designed to infiltrate computer systems and cause harm. This includes viruses, worms, ransomware, and spyware, which can compromise data security, disrupt operations, and extort victims for financial gain.
- Cyberstalking and Harassment: Online harassment, cyberbullying, and stalking involve using digital platforms to intimidate, threaten, or harass individuals. This can have serious psychological and emotional impacts on victims, and may escalate to physical harm in some cases.
- Data Breaches: Data breaches occur when unauthorized individuals gain access to sensitive information stored in databases or networks. This may include personal, financial, or proprietary data, which can be exploited for various malicious purposes, including identity theft and corporate espionage.
- Cyberterrorism: Cyberterrorists use digital platforms to carry out attacks aimed at causing widespread disruption, fear, or destruction. This includes targeting critical infrastructure, government systems, and financial institutions with the goal of destabilizing societies or advancing political agendas.
Combatting cybercrimes requires a multifaceted approach involving collaboration between governments, law enforcement agencies, cybersecurity experts, and technology companies.
This includes implementing robust security measures, raising awareness about online threats, and enacting legislation to prosecute cybercriminals.
SEE ALSO: Nigeria’s Japa Syndrome Leads to Loss of 16000 Doctors in Five Years
As technology continues to advance, cybercrimes evolve in sophistication and scale, highlighting the ongoing need for vigilance and proactive measures to protect against digital threats.
Source: LIB