Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime /

This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers t...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Iorliam, Aamo (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:SpringerBriefs in Cybersecurity,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04766nam a2200577 4500
001 978-3-030-15210-9
003 DE-He213
005 20191220130851.0
007 cr nn 008mamaa
008 190315s2019 gw | s |||| 0|eng d
020 |a 9783030152109  |9 978-3-030-15210-9 
024 7 |a 10.1007/978-3-030-15210-9  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.59 
072 7 |a UTN  |2 bicssc 
072 7 |a COM043050  |2 bisacsh 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Iorliam, Aamo.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cybersecurity in Nigeria  |h [electronic resource] :  |b A Case Study of Surveillance and Prevention of Digital Crime /  |c by Aamo Iorliam. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XIV, 55 p. 19 illus., 15 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Cybersecurity,  |x 2193-973X 
505 0 |a Introduction -- Natural Laws (Benford's Law and Zipf's Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford's Law and Zipf's Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software. 
520 |a This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria's digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria's cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford's Law and Zipf's Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes. 
650 0 |a Africa-Economic conditions. 
650 0 |a Computer communication systems. 
650 0 |a Biometrics (Biology). 
650 0 |a Computers. 
650 0 |a Law and legislation. 
650 1 4 |a Mobile and Network Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28050 
650 2 4 |a Cybercrime.  |0 http://scigraph.springernature.com/things/product-market-codes/1B7000 
650 2 4 |a African Economics.  |0 http://scigraph.springernature.com/things/product-market-codes/W45020 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Biometrics.  |0 http://scigraph.springernature.com/things/product-market-codes/I22040 
650 2 4 |a Legal Aspects of Computing.  |0 http://scigraph.springernature.com/things/product-market-codes/I24059 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030152093 
776 0 8 |i Printed edition:  |z 9783030152116 
830 0 |a SpringerBriefs in Cybersecurity,  |x 2193-973X 
856 4 0 |u https://doi.org/10.1007/978-3-030-15210-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)