CYBERSECURITY DYNAMICS IN NIGERIAN BANKING: TRENDS AND STRATEGIES REVIEW
This paper provides an in-depth review of the cybersecurity dynamics within the Nigerian banking sector, emphasizing recent trends and strategic approaches to address emerging challenges. As a review paper, it synthesizes existing literature, reports, and case studies to offer a comprehensive understanding of the current cybersecurity landscape in Nigerian banks. The focus is on identifying the predominant cyber threats, analyzing the sector's response strategies, and evaluating the effectiveness of these measures in the context of Nigeria's unique socio-economic and regulatory environment. Our analysis reveals a notable escalation in cyber threats, particularly phishing, ransomware, and insider attacks, which have been intensified by the rapid digital transformation in banking services. The review identifies key factors contributing to these challenges, such as the increasing sophistication of cybercriminals, the digital literacy gap among customers, and the evolving nature of cyber threats. It also examines the strategic responses of Nigerian banks, including the adoption of advanced security technologies, enhanced staff training, and collaboration with government and international cybersecurity bodies.The paper concludes that Nigerian banks have made significant strides in fortifying their cybersecurity defenses. However, it also highlights the need for more robust regulatory frameworks, increased customer awareness initiatives, and a shift towards more integrated and proactive cybersecurity strategies. The findings of this review underscore the critical need for continuous evolution and investment in cybersecurity measures to effectively counter the dynamic and complex nature of cyber threats in the Nigerian banking sector.
Keywords: Cybersecurity, Cybersecurity Dynamics, Nigerian Banking Sector, Digital Transformation, Cyber Threats, Phishing Attacks, Ransomware, Insider Threats, Regulatory Framework, Central Bank of Nigeria (CBN), Compliance Challenges, Security Technologies, Cybersecurity Awareness, Artificial Intelligence (AI), Machine Learning (ML), Blockchain Technology.
How to Cite
Copyright (c) 2024 Oluwatosin Reis, Johnson Sunday Oliha, Femi Osasona, Ogugua Chimezie Obi
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.Fair East Publishing has chosen to apply for the Creative Common Attribution Noncommercial 4.0 Licence (CC BY) license on our published work. Authors who wish to publish their manuscript in our journal agree on the following terms:
1. Authors retain the copyright and grant us (Fair East Publishing and its subsidiary journals) the right for first publication with the work licensed under a Creative Commons Attribution (CC BY) License which permits others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal. Under this license, author retains the ownership of the copyright of their content, but anyone is allowed to download, reuse, reprint, modify, distribute, and/or copy the contents as long as the original authors and source are cited. No permission is required from the publishers or authors.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (for example, publishing it as a book or submitting it to an institutional repository), with an acknowledgment of its initial publication in Fair East Publishing owned journals.
3. We encourage our authors/contributors to post their work online (such as posting it on their website or some institutional repositories) prior to and during the submission process since it produces scholarly exchange and greater and earlier citation of published work.