APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION

Frank Ibikunle, Odunayo Eweniyi

Abstract


Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It look at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some challenges of cybercrime and present practical and logical solutions to these threats.


Keywords


Cyber-space Cyber-security Cyber-crime, ICT, Internet

Full Text:

PDF HTML

References


Adebusuyi, A. (2008): The Internet and Emergence of Yahooboys sub-Culture in Nigeria, International Journal Of Cyber-Criminology, 0794-2891, Vol.2(2) 368-381, July-December

Amaka Eze, “Thisday Live”

Anderson, Ross, et al. (2012): Measuring the cost of cybercrime, 11th Workshop on the Economics of Information Security (June 2012), Retrieved from http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf

Augustine C. Odinma, MIEEE (2010): Cybercrime & Cert: Issues & Probable Policies for Nigeria, DBI Presentation, Nov 1-2.

Background Check International, “Information Technology/Cyber Security Solutions”

International Telecommunication Union, Retrieved from http://www.itu.int/en/Pages/default.aspx

Laura, A. (1995): Cyber Crime and National Security: The Role of the Penal and Procedural Law”,Research Fellow, Nigerian Institute of Advanced Legal Studies., Retrieved from http://nials-nigeria.org/pub/lauraani.pdf

Longe, O. B, Chiemeke, S. (2008): Cyber Crime and Criminality In Nigeria – What Roles Are Internet Access Points In Playing?, European Journal Of Social Sciences – Volume 6, Number 4

Major General G. G UMO (2010): Cyber Threats: Implications For Nigeria’s National Interest, Retrieved from https://docs.google.com/file/d/0B9sby6N_v5O3M2FlNWIzZjgtMDRiOS00NjI1LThmMjItNmI0Nzg5NGVlNTM2/edit?num=50&sort=name&layout=list&pli=1

Mohsin, A. (2006): Cyber Crimes And Solutions, Retrieved from http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167

Okonigene, R. E., Adekanle, B. (2009): Cybercrime In Nigeria, Business Intelligence Journal, Retrieved from http://www.saycocorporativo.com/saycoUK/BIJ/journal/Vol3No1/Article_7.pdf

Oliver, E. O. (2010): Being Lecture Delivered at DBI/George Mason University Conferenceon Cyber Security holding, Department of Information Management Technology Federal University of Technology, Owerri, 1-2 Nov.

Olumide, O. O., Victor, F. B. (2010): E-Crime in Nigeria: Trends, Tricks, and Treatment. The Pacific Journal of Science and Technology, Volume 11. Number 1. May 2010 (Spring)

Roseline, O. Moses-Òkè (2012): Cyber Capacity Without Cyber Security: A Case Study Of Nigeria’s National Policy For Information Technology (NPFIT), The Journal Of Philosophy, Science & Law Volume 12, May 30, 2012, Retrieved from www.Miami.Edu/Ethics/Jpsl

Schaeffer, B. S., et al. (2009): Cyber Crime And Cyber Security: A White Paper For Franchisors, Licensors, and Others

Strassmann, P. A. (2009): Cyber Security for the Department Of Defense, Retrieved July 10, 2011 From http://www.strassmann.com/pubs/dod/cybersecurity-draft-v1.pdf

The Economic Times. September 11, 2004. 1.

Thompson, D. (1989): Police Powers-Where’s the Evidence, Proceedings of the The Australian Computer Abuse Inaugural Conference.

www.bbc.co.uk

www.whatis.com


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2016 Frank Ibikunle, Odunayo Eweniyi

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

PRchecker.info

Creative Commons License
This work is licensed under a Creative Commons Attribution - NonCommercial - NoDerivs 4.0

ISSN 2334-847X (Printed)

ISSN 2334-8496 (Online)