Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Impact of Cybercrime and Cybersecurity on the Education Community: Imperatives for CERT Solutions Professor Oliver E. Osuagwu FNCS, FCPN, FBCS-CITP, MACM, MIEEE Department of Information Mgt. Technology Federal University of Technology, Owerri Email: drosuagwu@yahoo.com Tel: 0803-710-1792 ABSTRACT This paper has painted a developing scenario of the evolution of new type of war - the internet cybercrime - which is bound to cause more destruction of greater magnitude than the two past world wars! Cybercrime is real. It is becoming more complex and continues to wreck disastrous consequences for the global economy. Cybercrime is now threatening the very existence of Information Technology critical infrastructure, the greatest human innovation after the industrial revolution. It is even causing near total collapse of the education community, particularly in Nigeria, with over 90% of criminals coming from this sector. Wrong value system has been identified as key factor encouraging cybercrime in Nigeria and the desire to get rich quick without working for it. Cyber crime is complex and committed mostly from remote locations making it difficult to police. The absence of enabling law makes policing even more difficult. This paper has proposed several recommendations including the development and deployment of US-type CERT and the National Strategy to Protect Critical Information Technology Infrastructure in the Cyberspace. The National Orientation Agency should now shift focus to national re-orientation of the psyche of the whole population and particularly the youths in post-primary and tertiary institution and to partents, towards raising crop of children with strong religious training, belief and trust in God as well as the infusion of religious training in the curriculum of our educational system at all levels. Cybersecurity awareness training should now constitute part of the school curriculum. Government-Private sector partnership should be formed to develop appropriate strategies towards cyber crime monitoring, control and prevention. This is the responsibility of all citizens - government, private sector and individuals. The paper contends that if action is not taken urgently, Nigeria will head towards self-destruct and the African continent may turn out to become a desolate colony!. KEY WORDS: cyberspace, cybercrime, e-commerce, computer crime, CERT 1 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ 1.1 Introduction Cyberspace refers to the interdependent network of information technology components that underpin many of our communications technologies in place today. This component is a crucial entity of the Nigeria’s and global economy critical infrastructure. We use cyberspace to exchange information, buy and sell products and services, and enable many online transactions across a wide range of sectors, both nationally and internationally. No nation can progress without the use of Information Technology and the cyber space. As A. M’bow, for UNESCO Scribe, rightly pointed out three decades ago: “Information Technology has opened up such tremendous vista for modern societies that any failure to master it would mean a life of permanent sub-ordination. For information technology is more than a form of power, it is a power system. The technology which it involves is not just one form of technology among others but an ability to make use of other techniques to give or refuse access to a whole range of scientific data and knowledge and thus to design new models of development”.[25]. Nigeria, nay, the African continent, cannot afford to be left behind. Therefore, a secure cyberspace is critical to the health of the Nigerian economy and to the security of the global economy. In particular, the Federal Government must address the recent and alarming rise in online fraud, identity theft, and misuse of information online. Computer crime is all crimes performed or resorted to by abuse of electronic media or other, with the purpose of influencing the functioning of computer or computer system. If the target of a crime is the computer, the computer is the tool of the crime or computer is incidental to the crime, that crime is called a computer crime! "Cybercrime”, for the purpose of this lecture, can be described as computer viruses/malware, online credit card fraud, online hacking, online harassment, online identity theft, online scams (i.e., fraudulent lotteries/employment opportunities), online sexual predation and online phishing. Thus, Freeware, software, hardware, social networking sites and absolutely everything that involves an internet cable, a PC as well as a mobile phone could be a potential agent for fraud, violence, crime and severe losses. Cybercrime has to do with criminality committed in the internet with the aid of computers or criminal activity conducted via the Internet. Cyber-security encompasses industry and government defense strategies adopted to curb cyber-criminality in the super highway. Cyber crime has dwarfed the expectations of e-commerce as a potential tool to improve Africa’s national GDP, job creation and elimination of mass poverty. E-commerce, which is totally dependent on viable internet connectivity, has been violently attacked to the extent that e-commerce has virtually come to a halt because of the activities of cyber criminals. The activities of these evil agents have been described as the worst threat to the most formidable human innovation after the Industrial Revolution. It is indeed a colossal economic catastrophe for the developing nationals of Africa. This singular act by these agents of the devil has painted Nigeria black in the eyes of the international community to the extent that electronic transactions from Nigeria are no longer respected by merchants from other parts of the world. Because of the ease of commission, the huge sums of money involved in their dragnets, the absence of a legal framework to tackle the menace, the trade has continued to be attractive to new entrants. Worst still, the absence of forensic capability by the Nigeria Police to address the malady has led many of the cybercriminals to get off the hook and consequently, has encouraged potential scholars who ought to go school to now 2 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ choose cyber crime as a preferred profession, leading to disastrous misplacement of societal values. This paper will address the impact of cyber-criminality and the antidotes provided by industry, the academic and world governments and how this has impacted on the education community of the developing nations of Africa in context with the CERT initiative of the United States. 1.2 The Nature of Crime in the Cyber Space The primary types of cybercrimes are data, network, access, and other crimes [31,32]. Cybercrimes under the title of data crimes include data interception, data modification, and data theft. Data interception is the interception of data in transmission [33] Data modification is the alteration, destruction, or erasure of data[34]. Data theft is the taking or copying of data, regardless of whether it is protected by other laws such as US copyright and privacy laws, Health Insurance Portability and Accountability Act (HIPAA), and the Gramm Leach-Bliley Act (GLBA) (Electronic Privacy Information Center, 2004; [35,36]. U.S. Department of Health and Human Services[37]. Cybercrimes regarding network access includes network interference and network sabotage. Network interference is the impeding or prevention of access of others [38]. The most common example of network interference is a distributed denial of service (DDoS) attack that floods a web site(s) or an Internet Service Provider (ISP). DDoS attacks are frequently launched from numerous computers that have been hacked to obey the commands of the perpetrator[39,40]. Network sabotage is the modification or destruction of a network or system. Network sabotage frequently occurs with ghost accounts; accounts not closed when an employee leaves a company that can give a disgruntled employee a back door into the network[41] . Cybercrimes include access crimes such as unauthorized access and virus dissemination. Unauthorized access is the hacking or destruction of a network or system[42] For example, the U.S. DOJ reported on March 1, 2006 that a federal computer security specialist within the Department of Education’s Office of Inspector General installed software on the computer of a supervisor enabling him to access its stored data at will. He later used this privileged access to view email and other electronic transactions of his supervisor then shared the information with others in his office. The accused pled guilty and was later sentenced to five years in prison and fined $250,000 [43]. Virus dissemination is the introduction of software that is harmful to a system or data therein. In 2005, the U.S. DOJ reported that a 21-year-old male of Beaverton, Oregon used more than 20,000 infected computers he had infected with a computer worm program to launch a DDoS attack against eBay in 2003. The attack caused a denial of service for legitimate users who wanted to access eBay. The perpetrator, awaiting sentencing could receive up to ten years imprisonment, a $250,000 fine or twice the gross gain or loss, and three years supervised release[44], Data and other types of cybercrimes include aiding and abetting cybercrimes and computer related forgery and fraud. Computer-related forgery is the alternation of data with the intent to represent it as authentic. Computer-related fraud is the alteration of data with the intent to derive economic benefit from its misrepresentation [45]. In February 2006, the U.S. DOJ reported that a 41-year-old male of Cleveland, Ohio obtained stolen debit card account numbers, personal identification numbers (PINs), and personal identifier information of the true account holders that he encoded on blank cards. He used the counterfeit debit 3 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ cards to obtain $384,000 in cash advances from ATM machines in the greater Cleveland area over a three-week period. The perpetrator received a sentence of 32 months in prison, three years of supervised release for bank fraud and conspiracy, and ordered to pay $300,749 restitution to the bank and $200 to the Crime Victim’s Fund[46]. 1.3 TOP 10 NATIONS PERPETRATING AND COMPLAINING OF CYBER CRIME Below are two maps showing countries perpetrating cyber crime and those complaining of the menace as provided by IC3 2006 Internet Crime Report. January 1, 2006 – December 31, 2006 by the National White Collar Crime Center and the Federal Bureau of Investigation,2007. A cursory look at the two maps shows that the USA ranked no. 1 for both perpetration and complaint scoring 60.9% for perpetration and 90.7% for complaint. This is an interesting scenario. This is not surprising though because the US is the heavest user of IT and the cyberspace. Figure 1. Map. Og Top 10 Countries by Count: Perpetrators (Number is Rank) Note. Adapted from The IC3 2006 Internet Crime Report. January 1, 2006 – December 31, 2006 by the National White Collar Crime Center and the Federal Bureau of Investigation,2007 . 4 [30] Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Figure 2. Map. Top 10 Countries by Count: Individual Complainants (Number is Rank) Note. Adapted from The IC3 2006 Internet Crime Report. January 1, 2006 – December[30] 1.4 Corporate Security Concerns Denis [30] had reported in her work on Cyber-crime’s Impact on the Work Place that the top three computer security concerns, as reported by respondents, were: (a) embezzlement 30% (92), (b) intrusion or breach of computer systems 22% (67), and (c) computer viruses and denial of service attacks 11% (33). These top three computer security concerns reflect the thinking of 63% of the organizations reporting. Figure 2 depicts in ranking order all the variables identified. 5 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Fig. 3. Ranking of computer security concerns by organizations. 1.4 Summary of Cyber Crime Classification The above descriptive discussion on the types of cyber crime can be summarized thus: Hacking: This is a term used to describe illegal intrusion into a computer system without the permission of the computer owner or user for purposes of stealing valuable information of market value. Denial of Service Attack: A criminal floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. Virus Dissemination: This involves sending malicious software that attaches itself to other software. Good examples of these include: virus, worms, Trojan horse, Time bomb, Logic Bomb, Rabbit and Bacterium etc. Software Piracy: This involves the theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products 6 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ intended to pass for the original. This can be done in many ways such as via End user copying, Hard disk loading, counterfeiting, illegal downloads from the internet. Pornography: Pornographic tactics is used by many advertisers to encourage customer’s access their website. Publishing, transmission of any material in electronic form which is lascivious or appeals to the prurient interest (nude people having live sex) is an offence is a serious crime in American Law (Section 67 of I.T. Act 2000). This has been included in the Information Technology Bill and the Cybercrime Act undergoing final reading in the Nigeria’s National Assembly. It is a very powerful predator as it is used as a tool to lure victims. IRC Crime: IRC means Internet Relay Chat. IRC servers have chat rooms in which people from anywhere in the world can come together and chat with each other. Criminals use it for meeting conspirators. Hackers use it for discussing their strategies and sharing information on techniques. Pedophiles use chat rooms to lure young children. Cyber Stalking is used to harass a woman via her telephone number which may be given to others as if she wants to befriend men. Credit Card Fraud: If your electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating as the credit card owner. These criminals can use Credit card skimmer or writer to make fake credit cards with your information and use it to withdraw your money from your accounts. Net Extortion: This involves copying the company’s confidential data in order to extort huge sum of money from the firm. Phishing: Deployed to pull out confidential information from the bank or financial institutions account holders by deceptive means. 7 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Fig. 3a Countries with phishing sites Source: eBay Fig. 3b Ten Top Phishing Sites Hosting Countries Spoofing: This involves getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network. 8 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Cyber Stalking: In this technique, lthe criminal follows the victim by sending emails, entering the chat room frequently in order to catch his victim. Cyber Defamation: This involves the criminal sending emails containing defamatory statements to all concerned of the victim or posts the defamatory matters on a website. This is usually the style deployed by disgruntled employees against their boss, ex-boy and girl friends against each order or divorced wife against their ex-husbands. Threatening: Criminals may send threatening email or contact y9ou in a chat room. This is the tactics adopted by disgruntled enemies against their boss, friend or official. Salami Attack: In this technique, the criminal makes insignificant changes in a manner that would make his action unnoticeable. For example small amount like N0.20 can be deducted from every N100 of your salary per month from the account of all the customer of a bank and deposited in his private account. Since the deductions are very small, it is unlikely to be noticed by any bank custer and accordingly reported. If he does for a long time unnoticed, he will make millions without running into the hands of the law. Sale of Narcotics: Web sites abound which offer sale and shipment of contraband drugs. They use Stegnography for hiding the messages. Nigeria’s own 419: This is a scam which starts with a bulk mailing or bulk faxing of a buch of identical letters to businessmen, professionals and other persons who tend to be wealthy. The greedy ones will fall prey to such dubious business proposal and they will be heavily duped. seller frauds is another distinct type of cyber crime such as account take over via phishing, fake Escrow sites, non-performance transactions (fake listing), fraudulent misrepresentation. 9 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ 2.0 Demography and characteristics of Cyber Criminals According to recent study by ChiChao Lai et.al [29] the demographic characteristics of cybercriminals is revealing as well as disturbing and calls for concerted effort by all to avoid an impending catastrophe. The report findings show that 81.1% were male; 45.5% had some senior high school; 63.1% acted independently; 23.7% were currently enrolled students; and 29.1% were in the 18-23 age bracket, which was the majority group. For those enrolled student cybercrime suspects, the findings show that the percentage of junior high school and senior high school student suspects constituted 69.0% (2002), 76.1% (2003) and 62.7% (2004) of cybercrime suspects in their respective years. The high rate shows that the number of currently enrolled students suspected of involvement in cybercrime is cause for concern. The following group of people are easily fall prey or perpetrate cyber-criminality: Disgruntled employees Teenagers Political Hacktivist Professional Hackers Business Rival Ex-boy or Girl friend Divorced Husband or Wife Political enemies The victims are gullible, desperados and greedy people, unskilled and inexperienced and perhaps unlucky people too can fall victim. 3.0 Security Measures in Place: Industry Security Initiatives For The Cyber Space: Firewalls, Antivirus, Anti-Malware, Pass-Wording, Encryption, Biometric Authentication Systems, Intrusion Detection and prevention Systems, etc. 3.1 Some Tested Palliative solutions in place If correctly installed, the following technologies can help to block attacks: (These will be explained further in the following pages). • Firewalls are hardware or software devices that block certain network traffic according to their security policy. • Software solutions exist to identify and remove malware and to help manage spam email. Many must be paid for but free versions are also available. • Authentication involves determining that a particular user is authorized to use a particular computer. This can include simple mechanisms such as passwords, to more complex methods using biometric technology. 10 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ • Hardware cryptography uses computer chips with cryptographic capabilities intended to protect against arrange of security threats. • Patches are programs designed by software manufacturers to fix software security flaws. Patching is often installed automatically. This reduces end-user participation and increases ease of use 3.1.1 Biometric Authentication Systems (BAS) According to Osuagwu [4] BAS refers to a brand new technology to reliably indicate whether people are actually who they say they are using traits unique to them. These traits include fingerprint patterns, the arrangement of tissue in the eye’s iris, and the timbre of a person’s voice. Factors Used To Authenticate An Individual Something a person knows Commonly a password or PIN. If the user types in the correct password or pin, access is granted. Something a person has Most commonly a physical device, referred to as a token. Tokens include self-contained devices that must be physically connected to a computer, or devices that have a small screen where an OTP is displayed, which the user must enter into an interface to be authenticated by the backend server. Something a person is Most commonly a physical character, such as a fingerprint, voice pattern, hand geometry, or pattern of veins in the user’s eye. This type of authentication is referred to as biometrics and often requires the installation of specific hardware on the system to be accessed. Table 1: FACTORS USED TO AUTHENTICATE AN INDIVIDUAL Source: FFIEC Guidance for Authentication in an Internet Banking Environment Table 2: CHARACTERISTICS OF AUTHENTICATION 11 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ TECHNOLOGIES Source: Crystal Research Associates, LLC. Fig. 4: SAMPLES OF BIOMETRIC AUTHENTICATION TECHNOLOGIES Businesses, schools, and apartment buildings are using vascular recognition for physical access control. Large organizations are also beginning to deploy the technology to manage access to their information technology infrastructure. Vein pattern recognition has been adopted to screen passengers at South Korea’s International Airport and to control access to the tarmac at several Canadian airports. Vascular recognition already has won wide acceptance in banking. More than a dozen Japanese banks and credit unions have made hundreds of ATMs featuring vascular sensors available for everyday use. In the vascular recognition systems developed by Fujitsu and TechSphere after inserting a banking card in a cash machine, the user is prompted to hold a hand near an infrared light source. The light source is paired with a charge-coupled device similar to the one used in standard digital photography. As the near-infrared light passes through the body tissue, it is reflected by the hemoglobin in the blood. This reflected light picked up by the CCD reveals an image of the blood vessels. Within a second or two, the system filters the digitized image, creates a template that it can compare with the encrypted image template associated with the authorized user, and decides whether they match. The template data can be stored either directly on the chip in a smart card or in a central database. At the commencement of a credit card transaction, you would present your smart credit card to a point-of-sale terminal. The terminal would establish secure communications channels between itself and your card via communications chips embedded in the card and with the credit card company’s central database via Ethernet. The terminal then would verify that your card has not been reported lost or stolen, by exchanging encrypted information with the card in a predetermined sequence and checking its responses against the credit card database. Early adopters of the technology chose smart card to allow customers maintain possession of their digitized records and free the service provider from having to maintain databases. Vascular pattern sensing has been preferred over fingerprint scanners because users do not have to tough the sensors in order to do transactions which are of concern in some Asian countries where hygiene is an exceptionally important cultural value. 12 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ The only criticism against BAS is the invasion of privacy [4]. Critics say that biometric data gathered for one purpose, e.g. Fingerprints taken from noncitizens who enter the US under the US VISIT program can be easily repurposed for application such as criminal identification. Proponents say that current best practices such as not storing the fingerprint or iris scan, but only its data template, are adequate for protecting personal privacy. All we know is that Biometric Authentication is here to stay and should be encouraged in Nigeria to infuse some confidence in electronic fund transfer and e-commerce delivery. Variants of BAS a. Finger Prints: This technique of biometric authentication have been used to secure commercial transactions since the days of ancient Babylon, where fingerprints have been found among the ruins on clay scale attached to business documents. Each fingerprint contains global features, which can be seen with the naked eye, and local features, also called minutia points, the tiny unique characteristics of fingerprint ridges. Fingerprint scanners can be attached to USB ports as an external peripheral or they can be embedded within device. b. Iris Scans: This technique analyze vein pattern and has the potential to be more accurate than fingerprints because the iris has about 260 degrees of freedom with regard to its vein patterns. Using an iris scanner requires aligning the eye with a coloured LED inside the camera, then moving the person’s head forward or back until the LED changes colour, signaling that the distance is correct for proper imaging. The system then makes the scan, analyzes the image, and stores the template. c. Biometric Sensors: This is the new proposal for enhancement of the existing BAS systems posited by Jain and Pankanti [16,17]. This new techniques uses fingerprint sensors and a combination of other BAS techniques could be incorporated. It is going to be economical, protect privacy, and guarantee the validity of all kinds of credit card transactions, including ones that take place at a store, over the telephone, or with an Internet-based retailer. By preventing identity thieves from entering the transaction look, credit card companies could quickly recoup their infrastructure investments and save businesses, consumers, and themselves billions of dollars annually. d. Smart Cards: A smart card is another example of an authentication method. The size of a credit card, a smart card contains a microprocessor that enables it to store and process data. To be used, a smart card must be inserted into a compatible reader attached to either a computer or some type of electronic reading device. If the smart card is recognized as valid (first factor), the customer is prompted to enter his or her pass-code (second factor) to complete the authentication process. Smart cards are difficult to duplicate and have demonstrated to be tamper resistant, 13 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ creating a relatively secure vehicle for storing sensitive data and credentials. Some limitations of smart cards are that they can only be used in the presence of a smart card reader, which has limited portability, and they require additional software to run on most computers. Illustrations of some of the typical types of smart cards are provided in Figure 1.2. Fig.5 EXAMPLES OF SMART CARDS Source: Versatile Card Technology, Inc Fig. 6: PIN PADS 3.1.2 Intrusion detection system in the market place Intrusion detection (ID) is a type of security management system for computers and networks. An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. It s used to determine if a computer network or server has experienced an unauthorized intrusion. Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions IDS inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone 14 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ attempting to break into or compromise a system. There are several ways to categorize an IDS: misuse detection vs. anomaly detection: in misuse detection, the IDS analyzes the information it gathers and compares it to large databases of attack signatures. Essentially, the IDS looks for a specific attack that has already been documented. Like a virus detection system, misuse detection software is only as good as the database of attack signatures that it uses to compare packets against. In anomaly detection, the system administrator defines the baseline, or normal, state of the network??s traffic load, breakdown, protocol, and typical packet size. The anomaly detector monitors network segments to compare their state to the normal baseline and look for anomalies. network-based vs. host-based systems: in a network-based system, or NIDS, the individual packets flowing through a network are analyzed. The NIDS can detect malicious packets that are designed to be overlooked by a firewall??s simplistic filtering rules. In a host-based system, the IDS examines at the activity on each individual computer or host. passive system vs. reactive system: in a passive system, the IDS detects a potential security breach, logs the information and signals an alert. In a reactive system, the IDS responds to the suspicious activity by logging off a user or by reprogramming the firewall to block network traffic from the suspected malicious source. Though they both relate to network security, an IDS differs from a firewall in that a firewall looks out for intrusions in order to stop them from happening. The firewall limits the access between networks in order to prevent intrusion and does not signal an attack from inside the network. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system. From the above taxonomy IDS can summarily be classified thus: Host-based IDSs – Get audit data from host audit trails. – Detect attacks against a single host Distributed IDSs – Gather audit data from multiple host and possibly the network that connects the hosts – Detect attacks involving multiple hosts Network-Based IDSs – Use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services – Detect attacks from network. 15 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Fig. 7. Example of Network-based IDS monitoring [27] Fig 8: Software Agent Requirement in IDS monitoring [27] Misuse detection – Catch the intrusions in terms of the characteristics of known attacks or system vulnerabilities. Anomaly detection – Detect any action that significantly deviates from the normal behavior 16 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ 3.1.3 1. 2. 3. INTRUSION DETECTION TECHNIQUES Define and extract the features of behavior in system Define and extract the Rules of Intrusion Apply the rules to detect the intrusion 3.1.4 Intrusion Prevention Systems An Intrusion Prevention System is a module added to a base Intrusion Detection System. This module provides the ability to perform specific tasks automatically. An IT administrator can define the actions to be taken by the IPS when the attack severity reaches a pre-determined threshold. This allows an IT administrator to specify that any attack event at the denial of service (DoS) level or greater will result in the source IP address being filtered. The filter duration can be set from 15 minutes to permanently. The advantages to Intrusion Prevention Systems are numerous: - An attacker’s ability to attack the target network can be automatically blocked any time 24x7. - The filter duration can be specified so the attacker’s IP address is not permanently blocked. - Real-time email notification can be sent to the IT administrator. - The attacker’s Upstream Network Provider can be notified immediately when an attack occurs. Fig. 9: Example of Intrusion Prevention System. IPS disconnects attackers automatically [27] Network Detection Zones Intrusion Detection/Prevention Systems are placed in different types of network environments. For simplicity sake, we have identified three types of network detection zones as shown below. Each network detection zone has unique characteristics and the IDS must be able to adapt to each zone. 17 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Fig. 10: Network Detection Zones [27] Zone A This zone is in front of the main firewall. The main characteristic of this zone is the number of attacks logged. Frequent port scanning attempts, worm attacks and other network attacks are found in this network detection zone. The IDS must have the following characteristics to operate in this zone: - Employ firewall protection on the external interface - Allow logging of all attacks while offering user selectable alert notification for critical attacks - Trigger alerts originating from both internal and external networks Zone B This zone is behind the main firewall so the number of attacks is dramatically lower than those experienced in Zone A. When the IDS triggers in this zone the threat is more serious in nature. IPS threshold settings may be tightened to lower or more sensitive levels in this zone. Zone C In this network detection zone a properly configured IDS will see fewer alerts than Zone B. The IDS and IPS threshold settings may be tightened to the lowest levels in this zone. 18 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Fig. 11: Network before Deployment of IDS[27] Fig.12: Network after deployment of IDS 3.2 SecurityMetrics Intrusion Detection Technology [27] SecurityMetrics Intrusion Detection System is comprised of a number of subsystems or modules. Each of these components performs specific features. The following illustration shows the main components 19 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Fig. 13: Security-Metrics Intrusion Detection Technology [27] All the above measures are palliative. However, the most reliable authentication and integrity system today is the biometric frontiers. This assertion was confirmed by the International Biometric Group in New York City who had forecast a quantum growth in Biometric deployment in the 21st century. It is however strongly believed that if perpetrators of cyber crime can be caught and punished, it will further diminish the motivation to commit cyber crime. A combination of BAS and Forensic Technology is likely to produce the desired solution to the cyber criminality conundrum. This brings up a new challenge - the issue of cyber crime policing and law enforcement.[1-15] 20 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ 4.0 Impact on the Education Community The negative impact of cyber criminality is devastating on the psyche of Nigerian undergraduate students particularly at the post primary school level and undergraduates in tertiary institutions. What occupies the mind of most students of the above categories is how to get rich fast. The less risky means is the cyber crime which has low policing, where criminals are difficult to arrest and prosecute and where no legal mechanism currently exists to deal with cybercrime. Criminals grab millions in one single deal and start living big. One single 419 deal via cyber crime will return a financial gain that a PhD may not earn throughout his working life. So students are no longer interested in their academics and this is worsening the eroding quality of the Nigerian education system and its attendant poor quality graduates. Have you wondered why there was mass failure in the last NECO examinations? The minds of our youths have been stolen by porgraphy in the Internet, Home TV programs that encourage nudity and prostitution make our children to find it difficult to pick their academic books and read for knowledge and future developement. Our society is crumbling to standstill and many appear ignorant of where we are heading. We are heading to doom! The future of any society lies in the ability of that society to raise responsible citizens to take over the mantle of leadership from a dying generation. The crop of children we are raising gives us no hope of successionl. We are heading to self-destruct unless urgent measures are taken NOW to avert this tragedy. Osuagwu et.at [1,2,3,28] had posited that the key motivating factors for cyber crime in Nigeria is our wrong value system. There is a negative psyche that money is the most important thing in the world. Youths observe when rogues are promoted and given high chieftaincy titles and these youths know the source of wealth of these people. They also know that in most cases people who are punished for crimes are the poor and underprivileged. The rich always go free from police net. So why be poor and be down trodden? These youths also know that most rogues have been made Traditional Rulers, given ministerial appointments once huge sum of money can be deposited into the campaign accounts of prospective governors and presidents-to-be. They know that most of these side supporters of policies who eventually get lucrative board appointments, become commissioners and ministers are indeed, to large extent, key economic saboteurs! So to them, the best option is not to continue bordering themselves about higher education but to seek quicker means of getting rich so that they can be counted among those who matter in society, drive on expensive cars and own magnificent edifices which counts for recognition!. The easiest option is 419, armed robbery, ritual murder, kidnapping and gansterism. This evil psyche could have been better controlled if there were jobs for graduates of our tertiary institutions. Cyber crime has less risk for Nigerian youths – Nigeria is yet to develop forensic capability to track them. Most Police and law enforcement officers are not computer literate. Nigeria has no law enacted and operational for cyber-criminality. Those who have made it through 419 have escaped unhurt and are enjoying their wealth. The type of money that comes through cyber crime is huge, sometimes in millions of US$. These rogues use such money which have spelt death sentence to most people who are duped to chase women, enjoy in expensive hotels and suppress the poor in society. They never care for any form of investment to promote national gross domestic product! Consequently many youths think cyber crime is a profession 21 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ and many are training to become members of the evil club! The crime has take a more devastating dimension in our Post Primary School and undergraduates of our tertiary institutions. You school children now spend most of their time on the net trying to cheat others who laboured for growth, watch nude films and do unthinkable things in the internet with any form of sensorship. Guesss the consequences, children are no longer interested in academic work. They are looking for cheap and fast means of becoming millionaires overnight. Available statistics suggest that over 90% of those involved in cyber crime are high school children and undergraduates of tertiary institution in Taiwan [29]. The extended consequencies? Kidnapping, gansterism, theft of all kinds including cyber crime, prostitution, pornography etc. The society is now unsafe. This was never envisaged would be the consequences of a technology that is the greatest human innovation after the industrial revolution! The Singularity Conundrum is now discussing on Existential Risks. Is it possible that the technology we innovated might lead to human extinction? So wither Nigeria and Africa? There is no doubt that one need no more conviction that the solution to this menace does not lie on procedural legal policing but on attending to the negative social psyche, providing good employment, family retraining of children and readjustment of social values including going back to GOD to rebuild Nigeria and Africa. Something has to be done fast before Africa becomes a desolate continent. .0 TOWARDS FINDING SOLUTION – THE US CERT INITIATIVE The cyberspace is the nervous and control system of US economy and the global community. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches and fiber optics cables that allow our critical infrastructures to work. Consequently the health and good functioning of the cyberspace if critical to national economy and security. These computer networks also control physical objects such as electrical transformers, trains, pipeline pumps, chemical vats, radars and stock markets, all of which exist beyond the cyberspace. America is the heaviest user of the cyberspace and her economy is fully dependent on the cyberspace. This explains why the US had put up a policy trust to deal with the Protection of the Cyberspace and the National Information Technology Infrastructure. CERT (short for US Computer Emergency Readiness Team) is an outshoot of this policy. CERT is the operational arm of the National Cyber Security Division (NCSD at the Department of Homeland Security (DHS). It is a public-private partnership located in the Washington DC Metropolitan area. It is the Federal Government’s cornerstone for cyber security coordination and preparedness, including implementation of the National Strategy to Secure the Cyberspace. US-CERT will include partnerships with private sector, cyber security vendors, academic, federal agencies, Information Sharing and Analysis Centrers. CERT interacts with federal agencies, industry and the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public. CERT also provides a way for citizens, businesses and other institutions to communicate and coordinate directly with the United States government about cyber security. The National Strategy to Secure the Cyberspace is part of US overall effort to protect the Nation and constitutes an implementing component of the National Strategy for Homeland Security and is complemented by a National Strategy for the Physical 5.0 22 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Protection of Critical Infrastructure and Key Assets. The reason adduced for this policy is not far-fetched – securing the cyberspace is a difficult strategic challenge that requires coordinated and focused effort from the entire society. It identifies steps that state and local governments, private companies and organizations, and individuals can take to improve the collective cyber-security. The policy highlights the role of publicprivate engagement and provides a framework for the contributions that everyone has to make to secure parts of the cyberspace. The dynamics of cyberspace requires adjustments and amendments to this strategy over time. This policy is expected to reduce America’s vulnerability to debilitating attacks against critical information infrastrures or the physical assets that support them. The key objectives are to prevent cyber attacks against America’s critical infrastructures, reduce national vulnerability to cyber attacks and minimize damage and recovery time from cyber attacks that do occur. Can Nigeria borrow a leaf from the US? Although Nigeria is yet to make IT and the cyber space the hub of business and economic activities, it is currently heading towards making the cyberspace the nervous system of her economy. Cyber threats can therefore no longer be treated with kid glove. 6.0 Summary, Conclusions and Recommendations Cyber crime is real. The internet is the nervous centre of world economy. Cybercrime is conducted remotely and anonymously to take advantage of flaws in software code. Cyber crime has created major problems and has continued to increase at institutions of higher learning, the academia. The academia is emerging as a particularly vulnerable for internet crime. Organizations and individuals have suffered losses at the hands of cybercriminals with only nine percent of such incidents reported to the security operatives. US organizations alone have estimated a loss of over $67 billion in 2005 [47]. Approximately nine out of every 10 US firms have experienced a cybercrime in [48]. In the lighting of the foregoing reports, I recommend as follows: 1. There is need for consistent training of the Nigerian Police in Cyber Crime Prevention and Forensic science for cyber crime policy and control. 2. Development of national community education and training targeted at school children and senior communities. 3. Establishment of a centralized national reporting centre such as the IC# (Internet Computer Crime Compaints Centre) in the US which is managed by the FBI which is online crime reporting centre and clearing house for cyber crime. The IC3 plays a pivotal role in detecting and reporting the identity of cyber criminals and proving information to victims of cyber crime. 4. Deployment of Biometrics and device fingerprinting supported by secure gateways and quality encryption. This strategy will assist in overcoming the anonymity of a good deal of internet activity and provide enhanced security. 23 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ 5. There is urgent need to develop a single national database to gather and compile cybercrime data. 6. The National Assembly should consider enacting a legislation that encourages incident reporting while reducing the risks associated with reporting and provide policies that provide stronger sentences for those found guilty of committing a cybercrime. 7. There is need to establish a partnership amongst the academic, law enforcement to educate the society on when and how to report cybercime incidents and cyber crime prevention. 8. Every organization should increase investment in information security to reduce the level of victimization to cybercrim. This is in addition to building computer infrastructure to prevent or minimize the impact of cybercrime. 9. Organizations should apply proactive prevention measures such as realtime content inspection, zero-hour vulnerability protection, anti-crime ware, anti-spyware, anti-phishing, anti-virus and URL filtering. 10. The Federal Government should immediately constitute CERT team in each sector and appoint a learned Committee to write Nigeria’s Strategy for protecting and securing the Cyberspace. This committee should outline major actions and initiatives for cyberspace security response such as establishment of a public-private architecture for responding to nationallevel cyber incidents, provision of the tactical and strategic analysis of cyber attacks and vulnerability assessments, encouragement of a private sector capability to share a synoptic view of the health of cyber-space, expansion of Cyber Warning and Information Network to support the role of EFCC in coordinating crisis management for cyberspace security, improvement of national incident management and coordination processes for voluntary participation in the development of national public-private continuity and contingency plans and enhancement of public-private information sharing involving cyber attacks, threats and vulnerabilities. 11. For individual protection against cybercrime, each computer user must create passwords that contain symbols and a mix of capital and lowercase letters. Passwords should be changed often. You must log on to your account frequently to ensure that there is no unusual activity. Install firewall to protect your pc and double-check to ensure that you configured it properly and that the default password is changed. The PC user must keep operating system up to date by installing new security patches available from the developer and use anti-virus software and ensure it is updated frequently. 24 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ References [1] Osuagwu O.E. (2007, 2008) Global Internet Terrorism & Fraud Pandemic: ECommerce Bottlenecks and the Challenge of Computer Forensics, M.S/PhD Dissertation, American Heritage University of Southern California, San Bernardino, California. [2] Osuagwu O.E. (2008) Software Engineering: A Pragmatic and Technical Perspective, Olliverson Industrial Publishing House, (OIPH) Owerri, Nigeria, pp.478-499 [3] Osuagwu O.E. (2008) Insight into the New Frontiers of Computer Forensics & Cyber-Criminality ( with Case Studies), OIPH, Owerri, Nigeria. [4] Osuagwu O.E. et.al. (2007) Blocking Credit Card Fraud via Biometric Authentication Systems, Proceedings of the International Conference of the Nigeria Computer Society, Concord Owerri June 2007 [5] [6] [7] [8] [9] [10] U.S. Federal Trade Commission (FTC) A U.S. FTC survey released in September 2003 www.Incardtechnologies.com Computer crime, October 2006 Number 271 Page 2 2002/03 British Crime Survey Osuagwu O.E. et.al. (2007) Blocking Credit Card Fraud via Biometric Authentication Systems, Proceedings of the International Conference of the Nigeria Computer Society, Concord Owerri June 2007 [11] http://www.webopedia.com/term/c/cyber_FORENSICS.htm http://www.iwar.org.uk/cip/resources/pcipb/cyberstrategy.htm “2003 Computer Crime and Security Survey,” Federal Bureau of Investigation, J. Edgar Hoover Building, 935 Pennsylvania Avenue, NW, Washington, D.C. 20535-0001, 2003. [12] Ken Baiman (2006). [13] Robbins, Judd,(20040) “An Explanation of Computer Forensics,” National Forensics Center, 774 Mays Blvd. #10 143, Incline Village, NV 89451, 2004 [The Computer Forensics Expert Expert Witness Network, 472 Scenic Drive, Ashland,OR] (©2004, National Forensics Center. All rights reserved), 2001. [14] Vacca, John R.(2002), The Essential Guide to Storage Area Networks, Prentice Hall, New York, 2002 [15] Alfred C. Weaver (2006) Biometric authentication, Computer Feb 2006. 25 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ [16] Anil K. Jain & Sharathchandra Pankanti (2006) A Touch of Money, IEEE Spectrum July 2006. [17] Willie D. Jones (2006) Blood Test – Vascular Patterns Provide New Means of Identification and Authentication. IEEE Spectrum [18] Federal Ministry of Justice (2004) IT Bill 2004 [19] Noblett, Michael G., Pollitt, Mark M., and presley, Lawrence A. (2002) Recovering and Examining computer Forensic Evidence, US. Department of Justice, Federal Bureau of Investigation, Forensic Science Communications, Vol. 2, No. 4 (www.Fbi.gov). [20] Nelson, Bill, Phillips, Amelia, Enfinger, Frank, and Steward, Chris (2004), Guide to Computer Forensics and Investigations Thomson, Course Technology, Boston. [21] New Technologies, Inc (Forensics-intl.com). [22] Rude, Thomas, (2000) Guidance Seizure Methodology for Computer Forensics, http://www.crazy nights.com/seizure.html. [23] Wolfe, Henry B., (2003). Computers and Security, El Servier Science, Ltd., pp. 26-28 (www.sciencedirect.com). [24] http://www.protegga.com/services.html. [25] Osuagwu O.E., Anyanwu E. (2003) Management of Information Technology at Periods of Technological Discontinuity, OIPH, Owerri, Nigeria, p.23. [26] FIB Anthrax Report (2001) [27] https://www.securitymetrics.com/docs/IDSWhitepaper.pdf [28] Osuagwu O.E. Ogiemien T & Okide S (2010) Deploying Forensics [29] Science & Technology for Resolving National Cyber-Security Challenges, International Journal of Mathematics & Technology, Azibijan, Russia, August 2010. ChiChao Lu, Wen Yuan Jen & Weiping Chang, Shihchieh Chou(2006), Journal of Computers, Vol. 1. No. 6, Sept. 2006, Academicy Publisher, USA. [30] Denise Marcia Chatam (2007) The Study on Cybercrime’s Impact in the Workplace, Campus Technology, USA. URL [31] Whitney, S. (2004, December 1). Trend turns, more purchase coverage for cybercrime. Best’s Review, 105(8):90. Oldwick, NJ: A.M. Best Co. Inc. 26 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ [32] Williams, P. (2002). Organized crime and cybercrime: Implications for business.Retrieved electronically October 15, 2007, from URL: http://www.cert.org/archive/pdf/cybercrimebusiness.pdf#search='FBI%20cyber% 20crime%20profit'. [33] Bigelow, B. V. (2005, February 3). Computer theft may put workers’ data in danger.Knight Ridder Tribune Business News. Washington, DC: Knight Ridder Tribune Information Services. ibid US copyright and privacy laws, Health Insurance Portability and Accountability Act (HIPAA), and the Gramm Leach-Bliley Act (GLBA) (Electronic Privacy Information Center, 2004 McConnell, B. W. (2001, March 6). Hearing on cybercrime, Committee on Legal Affairs and Human Rights, Parliamentary Assembly of the Council of Europe. Paris, France: McConnell International. United States Department of Health and Human Services. (2003, May). Office for Civil Rights (OCR) Privacy Brief, Summary of the HIPAA Privacy Rule, HIPAA Compliance Assistance. Retrieved electronically December 29, 2006, from URL: http://www.hhs.gov/ocr/privacysummary.rtf. Bigelow, B. V. (2005, February 3). Computer theft may put workers’ data in danger.Knight Ridder Tribune Business News. Washington, DC: Knight Ridder Tribune Information Services Evans, M. P., and Furnell, S. M. (2000). Internet-based security incidents and the potential for false alarms. Internet Research: Electronic Networking Applications and Policy, (10)3, pp. 238 – 245. Plymouth, UK: MCB University Press McNeil Solida, M. (2003, February 18). Ex-pension employee is charged. Retrieved electronically December 28, 2006, from URL:http://www.carlbrizzi.com /news/display.php3?NewsID=71 Barr, J. G. (2003, December). Monitoring employee computer usage. Retrieved electronically December 27, 2004, from URL: http://80www.faulkner.com.ezproxy.apollolibrary.com/products/securitymgt/docs /monitoring1203.htm. McConnell, B. W. (2001, March 6). Hearing on cybercrime, Committee on Legal Affairs and Human Rights, Parliamentary Assembly of the Council of Europe. Paris, France: McConnell International. United States Department of Justice. (2005, December 28). Man pleads guilty to infecting thousands of computers using worm program then launching them in denial of service attacks. Retrieved electronically April 17, 2006, from URL: http://www.cybercrime.gov/clarkPlea.htm. ibid McConnell, B. W. (2001, March 6). Hearing on cybercrime, Committee on Legal Affairs and Human Rights, Parliamentary Assembly of the Council of Europe. Paris, France: McConnell International [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] 27 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ [46] [47] [48] White, G. A., & Kern, R. W. (2006, February 28). Cleveland, Ohio man sentenced to prison for bank fraud and conspiracy. Retrieved electronically April 17, 2006, from URL: http://www.cybercrime.gov/flurySent.htm. Evers, J. (2006, January 19). Computer Crime Costs $67 Billion, FBI Says. Cnet News.com. Retrieved electronically September 30, 2006, from URL: http://news.com.com/Computer+crime+costs+67+billion%2C+FBI+says/2100734 9_3-6028946.html?tag=cd.top.\ Citrano, V. (2006, January 20). Mueller’s FBI puts computer crime losses at $32M. Retrieved electronically September 1, 2006, from URL: http://www.forbes.com/facesinthenews/2006/01/20/fbi-computersecuritycx_vc_0120autofacescan07.html?partner=vnu. 28 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ The author: Prof. Oliver E. Osuagwu Profile of Prof. O. E. Osuagwu, D.Sc, FNCS, FCPN, FBCS, MIEEE, MACM Professor Oliver Eberechi Osuagwu was born on January 12, 1952 at Umuhu Okwuato in the Aboh Mbaise Local Government Area of Imo State. Professor Osuagwu is Professor of Information Technology in the Department of Information Management Technology, Federal University of Technology, Owerri. He is Coordinator of her Post Graduate Programs in Information technology. He holds Adjunct Professorship chair in Computer Science at the Imo State University, Owerri. He is Visiting Professor of Computer Information Systems at the American Heritage University of Southern California, San Bernardino California, Adjunct Professor of Computer Science at the Department of Computer Science, Nnamdi Azikiwe University, Awka Professor Osuagwu is IP Vice-President, Vice-Chairman, Computer Professionals Registration Council of Nigeria (CPN), a Federal Government Regulatory Agency responsible for the control of IT profession in the territory of the Federal Republic of Nigeria. CPN was established by Act of Parliament No. 49 of 1993 and is under the supervision of the Federal Ministry of Education. A distinguished Professional Fellow of the Nigeria Computer Society (NCS) and the CPN, Professor Osuagwu is registered as Chartered Fellow (FBCS, CITP) of the British Computer Society; Association of 29 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Computing Machinery (MACM) and the Institute of Electrical and Electronic Engineers of the United States (MIEEE). He is also a Fellow of the Institute of Data Processing Management (FIDPM) of Nigeria and England, Fellow, Institute of Corporate Administration and Member, Chartered Institute of Administration, Nigeria (MCIA). Professor Osuagwu earned B.Sc(Computer Science – Magna Cum Laude)(1982)(Missouri), MBA(IS)(1985(Delft, Holland), PhD(CIS)(1989)(Missouri), D.Sc(AI)(2002)(Denton, N.C), M.Sc/PhD(Computer Forensics Science)(Calif.)(2008), Cert(Sys Dynamics)(MIT Cambridge, Mass.)(2007), Cert(TechNeg)(Harvard)(Cambridge,Mass)(2008), B.Sc(Mass Comm & Journ.)(2005)(Denton).. Professor Osuagwu amassed his wealth of technical, prolific, oratory and administrative experience from several institutions amongst which are: RVB now MSM, Delft University of Technology, Holland; Clayton University, St. Louis, Missouri, United Christian University, Denton, North Carolina (formerly Carolina Christian University, Thomasville, N.C), Centre for Computer Engineering-Federal University of Technology Owerri, Nigeria; American Heritage University of Southern California, San Bernardino, California, School of Journalism and Television, Berkshire England, the Massachusetts Institute of Technology and Harvard University, Boston, Massachusetts.. He was once the Chairman (Education and Manpower Development Committee) of the Nigeria Computer Society and served her National Executive Council from 2001-2005 during which period he brought about tremendous changes that positively revolutionalized the IT profession in Nigeria. He was one of the key Senior Academics that represented the NCS at the Global IT Submit held at George Washington University, USA in 2003. Professor Osuagwu has contributed immensely to the educational development and administration of many tertiary institutions in Nigeria; having worked with the University of Lagos as administrator from 1977-1979; Federal University of Technology, Yola (Ag. Director/Coordinator, IST – 1983-85), Imo State University (IDEA)(1988-89), Federal University of Technology/Centre for Computer Engineering, Owerri (1990-2005), Benue State University, Makurdi (2005-2008), Nnamdi Azikiwe University, Awka (2004-date) and Imo State University Owerri (2005-date). Professor Osuagwu nurtured the renowned Centre for Computer Engineering to full CPN tertiary accreditation in the year 2000 and is the only such ICT institution so accredited in the former Eastern Region of Nigeria. In April 2010 CCE was approved by the Federal Ministry of Education and the National Board for Technical Education (NBTE) as a National Innovation Institution under a new name – South Eastern College of Computer Engineering and Information Technology (SECCEIT). SECCEIT is to commence programs at National Innovative Diploma level in five major departments – Computer Hardware Engineering Technology, Software Engineering Technology, Network Engineering Technology, Multi-media Technology and Computer Studies as soon as the Honourable Minister of Education releases her Operating License. Admission requirement is a set by UTME (JAMB) and admission into the above programs will be through UTME. CCE is now an autonomous centre of IT excellence under the new monotechnic. 30 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ Professor Osuagwu has supervised over 1000 undergraduate projects, 250 Masters projects, has graduated 10 PhDs in Computer Science/IT and currently supervising over 50 undergraduate projects in three universities, 20 Masters and 10 PhDs at the Nnamdi Azikiwe Univrsity Awka, the University of Port-Harcourt and FUTO. He had been External Examiner (B.Sc/M.Sc in Computer Science) to Nnamdi Azikiwe University, Imo State University, University of Port Harcourt, Anambra State University, Uli, Abia State Polytechnic and Nassarawa State Polytechnic (ND/HND) Computer Science). He had been Professorial Assessor for Covenant University, Otta, University of Port Harcourt, Ebonyi State University, Abakiliki. And Ambrose Alli University, Ekpoma. He was a member of the IT professionals that reviewed the curricular for ND/HND in IT (2003), Chairman of the NBTE Critique Committee for the introduction of Computer Science in Nigeria’s Secondary School System, a prelude to the recently approved JSS scheme for examination by NECO and WAEC by the Federal Ministry of Education. He chaired the authorship of the current CPN Professional Examinations Syllabus deployed to achieve the Gazeting of CPN Professional qualification for career placement in the Civil Service Scheme of the Federation. He recently chaired the NBTE-CPN accreditation panel for the accreditation of computer science program at the Akwa Ibom State Polytechnic, Yaba College of Technology, Lagos, ECWA Institute of Computer Technology, Jos which has now graduated into a full University located in Abuja and the Federal Polytechnic, Okoh, Anambra State. He has worked for UNESCO and UNDP as International Consultant and National Consultant to NASENI (National Agency for Science and Engineering Infrastructure) for authorship of Feasibility Report for the production of Nigerian indigenous car, IT training consultant to NNPC, NEPA, Nigerian institution of Quantity Surveyors, Imo State and IT Consultant to Anyiam-Osigwe Group of Companies, Lagos. Professor Osuagwu was one of the four Judges selected to adjudge the performance of 26 Nigerian universities at the 1st Nigerian Computer Science Contest (Olumpiad) in 2007 by the National Mathematical Centre (NMC) and he pioneered the publication of the formal report in the International Journal of Computer Science and Its Applications titled “The Sorry State of Computer Science Education in Nigerian Universities” published in June 2008. Professor Osuagwu has authored 20 senior tertiary texts in diverse fields of knowledge and has published over 100 technical articles in referred competent journals, international conference proceedings and has presented over 200 workshop papers in Nigeria and overseas. A consummate and pragmatic scholar of international repute, Network, Satellite, Software Engineer, Computer Modeler and Forensics Scientist, Professor Osuagwu is indeed a fulfilled professional. He is blessed with one amiable wife – Mrs Caroline Oluchi Osuagwu (nee Chilaka), two daughters - Ihuomachi (BSc Accounting, IMSU now EEU), Uchechi (BSc Computer Science 2) and a son - Obilor - (aspiring Electrical/Electronics Engineer). With God on his side, he looks forward to his 60th birthday with enthusiasm and great confidence. 31 Impact of cybercrime and cyber-security on the education community: imperatives for CERT solutions Prof. O. E. Osuagwu: D.Sc, FNCS, FBCS, MIEEE ________________________________________________________________________ 32