CHALLENGES AND WAY OUT OF CYBER SECURITY
Abstract
Cyber-space is a platform where you can process, receive and send information. It includes phone
set, computer system, network, information stored on the network, network devices, all this
constitute what is being called Cyber space. This cyber space is not secure, and the process to
make it secure is known as Cyber Security. Cyber-crime refers to the series of organized crime
attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of
technical infrastructure development. Google, Wikipedia and Bing to mention a few, give
detailed answers to millions of questions every day. Cyberspace is a world that contains just
about anything one is searching for. With the advent of these advancements in information
accessibility and the advantages and applications of the internet comes an exponentially growing
disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats
concerning it now need to be taken more seriously. This paper attempts to provide an overview of
Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cybercrime and its eradication. It looks at those involved and the reasons for their involvement.
Methods of stepping up cyber security and the recommendations that would help in checking the
increasing rate of cyber-crimes were highlighted. The paper also attempts to name some
bottleneck of cybercrime and present practical and logical solutions to these threats.
Full Text:
PDFReferences
Adebusuyi, A. (2008): The Internet and Emergence of Yahooboys sub-Culture in
Nigeria, International Journal Of Cyber-Criminology, 0794-2891, Vol.2(2) 368-381,
July-December
Amaka Eze, “Thisday Liveâ€
Anderson, Ross, et al. (2016): Measuring the cost of cybercrime, 11th Workshop on
the Economics of Information Security (June 2016), Retrieved from
http://weis2016.econinfosec.org/papers/Anderson_WEIS2012.pdf
Augustine C. Odinma, MIEEE (2010): Cybercrime & Cert: Issues & Probable Policies
for Nigeria, DBI Presentation, Nov 1-2.
Background Check International, “Information Technology/Cyber Security
Solutionsâ€
Ibikunle. F. and Eweniyi O. (2017): Cyber Security In Nigeria. (IJCRSEE)
International Journal of Cognitive Research in science, engineering and education. Vol.
, No.1, 2017.
International Telecommunication Union, Retrieved from
http://www.itu.int/en/Pages/default.aspx
Laura, A. (2015): Cyber Crime and National Security: The Role of the Penal and
Procedural Lawâ€,Research Fellow, Nigerian Institute of Advanced Legal Studies.,
Retrieved from http://nials-nigeria.org/pub/lauraani.pdf
Longe, O. B, Chiemeke, S. (2018): Cyber Crime and Criminality In Nigeria – What
Roles Are Internet Access Points In Playing?, European Journal Of Social Sciences –
Volume 6, Number 4
Major General G. G UMO (2010): Cyber Threats: Implications For Nigeria’s National
Interest, Retrieved from
https://docs.google.com/file/d/0B9sby6N_v5O3M2FlNWIzZjgtMDRiOS00NjI1
LThmMjItNmI0Nzg5NGVlNTM2/edit?num=50&sort=name&layout=list&pli=1
Mohsin, A. (2006): Cyber Crimes And Solutions, Retrieved from
http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167
Okonigene, R. E., Adekanle, B. (2009): Cybercrime In Nigeria, Business Intelligence
Journal, Retrieved from
http://www.saycocorporativo.com/saycoUK/BIJ/journal/Vol3No1/Article_7.
Oliver, E. O. (2010): Being Lecture Delivered at DBI/George Mason University
Conferenceon Cyber Security holding, Department of Information Management
Technology Federal University of Technology, Owerri, 1-2 Nov.
Olumide, O. O.,Victor, F. B. (2010): E-Crime in Nigeria: Trends, Tricks, and
Treatment. The Pacific Journal of Science and Technology, Volume 11. Number 1.
May 2010 (Spring)
Roseline, O. Moses-Òkè (2012): Cyber Capacity Without Cyber Security: A Case
Study OfNigeria’s National Policy For Information Technology (NPFIT), The Journal
Of Philosophy, Science & Law Volume 12, May 30, 2012, Retrieved from
www.Miami.Edu/Ethics/Jpsl
Schaeffer, B. S., et al. (2018): Cyber Crime And Cyber Security: A White Paper For
Franchisors, Licensors, and Others
Strassmann, P. A. (2014): Cyber Security for the Department Of Defense, Retrieved
July 10, 2017 From http://www.strassmann.com/pubs/dod/cybersecuritydraft-v1.pdf
Department of Justice, U.S. Attorney’s Office, Northern District of Georgia (2018)
“Cyber-criminal sentenced for hacking universitiesâ€
Thompson, D. (1989): Police Powers-Where’s the Evidence, Proceedings of the The
Australian Computer Abuse Inaugural Conference.
Refbacks
- There are currently no refbacks.