A computer science expert, Prof. Rasheed Jimoh, has called for the introduction of cybersecurity specialized programs in Nigerian universities to address rising incidences of cybercrimes in the country.
Jimoh who is a Professor in the Department of Computer Science, University of Ilorin made the call in Ilorin during his paper presentation at the Unilorin 239th Inaugural Lecture titled: “Deconstructing the Crawling Mindsets: Combating Security Challenges of Net-Centric Computing.” Jimoh said having cybersecurity programs in the universities would help the country to build the capacity to fight cybercrimes.
He also urged the Federal Government to support the use of biometric technology in public places to check cybercrime activities in the country.
According to him, the use of fingerprint authentication for all educational processes within the university system will prevent cases of impersonation and campus insecurity.
Importance of biometrics
While noting that the biometric algorithm selects the distinctive characteristics of each fingerprint, encrypts this data, and saves it as a template, he said:
- “Students’ biometrics can easily be collected from the Joint Admission and Matriculation Board, JAMB’s Central Admission Processing System (CAPS). We must understand the reality that integration of ICT within a Net-Centric computing environment for seamless operations is not contestable unless we settle for crawling at a jet age with serious implications of not catching up with our competitors and the rest of the world.
- “Thus, crawling in the digital era when the rest of the world is moving at a very fast pace, can never be an acceptable option.”
The Prof. added that the option left for the country was to wake up to the calls and find a way of eliminating or reducing the cybersecurity challenges associated with operations in the emerging Net-Centric computing environment.
This, he said, was through the adoption of information security management ethics and standards coupled with the implementation of suitable cybersecurity techniques.
He noted that these techniques are capable of achieving reliable authentication, security risk mitigation, secured sharing of information and resources, intrusion-free operations, and integrity-proven cyber activities.
The don said sophisticated authentication methods should be encouraged to guarantee the security of both card and cardless financial transactions, to prevent all associated financial frauds. He urged the government to double its efforts and provide funds for aggressive sensitization on the need for cultural adaptation to the emerging digital era.