Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

8win Joins Forces with Leicester City Football Club in New Global Partnership

2026-01-22

Holiday Retail momentum and Business Travel Growth Drive National Economic Activity, Visa Consulting & Analytics Reports

2026-01-22

Leading Altcoin to Buy for Solana-Powered Banking Digitap ($TAP) Overtakes $1.49 SUI

2026-01-22
Facebook X (Twitter) Instagram
Trending
  • 8win Joins Forces with Leicester City Football Club in New Global Partnership
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Opinion»Is Cyberspace the Latest Conflict Frontier on the African Continent?
Opinion

Is Cyberspace the Latest Conflict Frontier on the African Continent?

Gugu LourieBy Gugu Lourie2017-03-011 Comment5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link
by Ken Obura

In August 2012, terrorist group, Boko Haram, reportedly hacked into Nigeria’s secret service and acquired private data on current and former personnel. The Conversation

In April 2016, a group calling itself “Anonymous” was able to hack into the database of the Kenyan Ministry of Foreign Affairs and steal sensitive data.

More recently, a number of South African companies’ systems were infiltrated by cyberattackers and data held for ransom. The firms included Johnny Bags food manufacturers, DSV Global and Gebers & Partners.

These incidents illustrate the risks that the use of cyberspace poses to the African continent in the 21st Century.

To counter these risks, Africa has rolled out several initiatives. These include the adoption of an African Union convention on cyber security and personal data protection and an initiative to harmonise and ICT policy in sub-Saharan Africa.

A number of countries have also taken initiatives at the local level to address cyber security threats. For example, Kenya has created the National Computer Incident Response Team Coordination Centre to offer technical services. Similarly, Ethiopia has created an agency to improve its cyber resilience.

But cyber security systems in both the private and the public sectors are still below average in many countries. A 2016 cyber security report, for example, shows that most Africa-based businesses and government online services have weak security features.

These low levels of security, combined with increasing connectivity, make Africa’s cyberspace one of the most vulnerable to attack.

The new frontier of attack

Cyberspace is the latest domain within which human beings operate. The others are land, sea, airspace and outer space. Unlike the other domains, cyberspace has unique features that make it an attractive frontier of attack.

First, it’s situated within the networks of computing devices that are now connected by the internet. Because the internet has global reach, attackers are able to roam cyberspace freely and attack computing systems in locations that would be impossible to access physically.

Second, no passport is required to enter the cyberspace. This makes it possible for attackers to mask their identity, impersonate others and cheat their way into protected systems.

Third, cyberspace facilitates communication between networked computing devices through electronic messages. This makes attacks speedier than conventional warfare.

Finally, cyberspace networks use a decentralised network architecture. This enables attackers to continue functioning even when one network router is blocked or disabled.

More importantly, with the growth in computing technology, essential services of most states are now integrated into the cyberspace networks. This makes the cyberspace a strategic medium of attack.

Cyberattacks on the rise

The United Nations describes cyber attacks as those involving illegal behaviour that targets the security of computer systems and the data processed by them. These take various forms that include;

  • Malware injection, which is the installation of malware (viruses, spyware, trojans or worms) into cyberspace with malicious intent.
  • Phishing, which is a request for data from what looks like a trusted source. The aim is to trick users into providing sensitive information, or clicking on a malicious link.
  • Hacking, which involves figuring out the password of a system’s platform so as to gain access into the system.
  • Denial of Service, which involves flooding a system’s network with traffic and spam data. The objective is to overload it and make it slow or unresponsive.

These cyber attacks happen through information exchange without physical contact between the attacker and the victim. So, at the individual level, direct physical harm is almost non-existent. The harm is mostly emotional, psychological and reputational. Of course, in some cases, cyberspace communications can result in actual physical harm. For example, a victim of cyber bullying may be pushed to commit suicide or a hacker may use the gained data to track a victim and commit rape or murder. But these cases are isolated and indirect.

But when the attacks are targeted at state or institutional systems, they have the potential to harm society in new and critical ways.

The attacks can, for example, corrupt electoral systems or derail automated trains. They could also bring down electric grids, collapse traffic control systems, scramble financial data, explode oil refineries, and cause aeroplanes to fly out of control.

The 2007 attack against Estonia, the 2016 attack on Ukraine’s power grid and the recent claims of hacks of the US Democratic National Committee database, are illustrative of the devastating harm that a cyber attack can cause on modern society.

These realities of cyber attacks are especially stark in developing countries, like in Africa, where the technology and skills necessary to fend off such attacks are lacking.

Securing the cyberspace

Given the importance that the cyberspace network plays in the life of modern African society, the imperative of securing this domain cannot be gainsaid.

The International Telecommunications Union estimates that one in five Africans is now connected to cyberspace.

An overview by the United Nations also reveals that the supply of essential services in many African countries now relies on the cyberspace network.

However, a survey of 21 African countries conducted by UN Economic Commission for Africa found that while many countries had proposed legislation, the level of deployment of security systems to combat cyber crime was low.

One practical way of countering cyber attacks is to ring the vulnerable systems with a protective firewall. This would also entail the use of end-to-end encryption to ensure that data is always protected.

It is also imperative that the users of computing devices be educated on the need to only use licensed operating systems, to create strong passwords, and to ignore suspicious messages and links.

Legislation should also be in place to identify and criminalise harmful cyber behaviour and to assign responsibilities to the various cyberspace actors including cyberspace intermediaries like internet service providers.

  • Ken Obura, Advocate, Lecturer, University of Nairobi
  • This article was originally published on The Conversation. Read the original article.

malware technology
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie

Related Posts

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

The Productivity Myth That’s Costing South Africa Talent

2026-01-21

The Boardroom Challenge: Governing AI, Data And Digital

2026-01-20

Ransomware: What It Is And Why It’s Your Problem

2026-01-19

Can Taxpayers Lose By Challenging SARS?

2026-01-16

Science Is Best Communicated Through Identity And Culture – How Researchers Are Ensuring STEM Serves Their Communities

2026-01-16

Could ChatGPT Convince You To Buy Something?

2026-01-15

Trust Is The New Currency Of The Digital Economy

2026-01-12

Why Financial Crime Risk Demands Regulation And How Africa Is Leading The Way

2026-01-12

1 Comment

  1. Eva on 2021-11-02 14:25

    Greetings! Very useful advice in this particular post! It’s the little changes which will make the largest changes. Thanks a lot for sharing!|

    Reply
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Directing The Dual Workforce In The Age of AI Agents

We will be the last generation to work with all-human workforces. This is not a…

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12

How SA’s Largest Wholesale Network is Paving the Way for a Connected, Agile Future

2025-12-02
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

The EX60: A Volvo That Talks Back

2026-01-20

Over R270M In Phuthuma Nathi Dividends Remain Unclaimed

2025-11-27

Africa’s Next Voice Revolution, When 5G Meets AI

2025-11-21

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

8win Joins Forces with Leicester City Football Club in New Global Partnership

2026-01-22

Holiday Retail momentum and Business Travel Growth Drive National Economic Activity, Visa Consulting & Analytics Reports

2026-01-22

Leading Altcoin to Buy for Solana-Powered Banking Digitap ($TAP) Overtakes $1.49 SUI

2026-01-22
Recent Posts
  • 8win Joins Forces with Leicester City Football Club in New Global Partnership
  • Holiday Retail momentum and Business Travel Growth Drive National Economic Activity, Visa Consulting & Analytics Reports
  • Leading Altcoin to Buy for Solana-Powered Banking Digitap ($TAP) Overtakes $1.49 SUI
  • Digitap ($TAP) vs. $1.89 XRP: Why this Crypto Presale is Up 250% and Scaling
  • Solana Price Prediction: Will SOL Reclaim $300 By Years End As Memecoins Look Set To Explode On The SOL Ecosystem
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.