APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION
Keywords:Cyber-space Cyber-security Cyber-crime, ICT, Internet
Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It look at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some challenges of cybercrime and present practical and logical solutions to these threats.
Adebusuyi, A. (2008): The Internet and Emergence of Yahooboys sub-Culture in Nigeria, International Journal Of Cyber-Criminology, 0794-2891, Vol.2(2) 368-381, July-December
Amaka Eze, “Thisday Live”
Anderson, Ross, et al. (2012): Measuring the cost of cybercrime, 11th Workshop on the Economics of Information Security (June 2012), Retrieved from http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
Augustine C. Odinma, MIEEE (2010): Cybercrime & Cert: Issues & Probable Policies for Nigeria, DBI Presentation, Nov 1-2.
Background Check International, “Information Technology/Cyber Security Solutions”
International Telecommunication Union, Retrieved from http://www.itu.int/en/Pages/default.aspx
Laura, A. (1995): Cyber Crime and National Security: The Role of the Penal and Procedural Law”,Research Fellow, Nigerian Institute of Advanced Legal Studies., Retrieved from http://nials-nigeria.org/pub/lauraani.pdf
Longe, O. B, Chiemeke, S. (2008): Cyber Crime and Criminality In Nigeria – What Roles Are Internet Access Points In Playing?, European Journal Of Social Sciences – Volume 6, Number 4
Major General G. G UMO (2010): Cyber Threats: Implications For Nigeria’s National Interest, Retrieved from https://docs.google.com/file/d/0B9sby6N_v5O3M2FlNWIzZjgtMDRiOS00NjI1LThmMjItNmI0Nzg5NGVlNTM2/edit?num=50&sort=name&layout=list&pli=1
Mohsin, A. (2006): Cyber Crimes And Solutions, Retrieved from http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167
Okonigene, R. E., Adekanle, B. (2009): Cybercrime In Nigeria, Business Intelligence Journal, Retrieved from http://www.saycocorporativo.com/saycoUK/BIJ/journal/Vol3No1/Article_7.pdf
Oliver, E. O. (2010): Being Lecture Delivered at DBI/George Mason University Conferenceon Cyber Security holding, Department of Information Management Technology Federal University of Technology, Owerri, 1-2 Nov.
Olumide, O. O.,Victor, F. B. (2010): E-Crime in Nigeria: Trends, Tricks, and Treatment. The Pacific Journal of Science and Technology, Volume 11. Number 1. May 2010 (Spring)
Roseline, O. Moses-Òkè (2012): Cyber Capacity Without Cyber Security: A Case Study OfNigeria’s National Policy For Information Technology (NPFIT), The Journal Of Philosophy, Science & Law Volume 12, May 30, 2012, Retrieved from www.Miami.Edu/Ethics/Jpsl
Schaeffer, B. S., et al. (2009): Cyber Crime And Cyber Security: A White Paper For Franchisors, Licensors, and Others
Strassmann, P. A. (2009): Cyber Security for the Department Of Defense, Retrieved July 10, 2011 From http://www.strassmann.com/pubs/dod/cybersecurity-draft-v1.pdf
The Economic Times. September 11, 2004. 1.
Thompson, D. (1989): Police Powers-Where’s the Evidence, Proceedings of the The Australian Computer Abuse Inaugural Conference.
How to Cite
Copyright (c) 2013
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.