Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Cybersecurity in Nigeria (eBook)

A Case Study of Surveillance and Prevention of Digital Crime

(Autor)

eBook Download: PDF
2019
XIV, 55 Seiten
Springer International Publishing (Verlag)
978-3-030-15210-9 (ISBN)

Lese- und Medienproben

Cybersecurity in Nigeria - Aamo Iorliam
Systemvoraussetzungen
58,84 inkl. MwSt
(CHF 57,45)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. 

These cybercrimes are hampering Nigeria's digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer.

The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria's cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). 

In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford's Law and Zipf's Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues. 



?Dr. Iorliam Aamo has been a lecturer at the Department of Mathematics/Computer Science, Benue State University, Nigeria, since 2010. A leading researcher, he was awarded an MSc with distinction in Forensic Computing from Coventry University, UK. He then moved to the University of Surrey, UK, where he obtained his Ph.D. in Computer Science, focusing on the application of power laws to forensics, biometrics and network traffic analysis.

​Dr. Iorliam Aamo has been a lecturer at the Department of Mathematics/Computer Science, Benue State University, Nigeria, since 2010. A leading researcher, he was awarded an MSc with distinction in Forensic Computing from Coventry University, UK. He then moved to the University of Surrey, UK, where he obtained his Ph.D. in Computer Science, focusing on the application of power laws to forensics, biometrics and network traffic analysis.

Introduction

Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis

Mobile Device Forensics and its Importance

Mobile Device Forensic Tools

Proposed Digital Surveillance of Software

Erscheint lt. Verlag 15.3.2019
Reihe/Serie SpringerBriefs in Cybersecurity
SpringerBriefs in Cybersecurity
Zusatzinfo XIV, 55 p. 19 illus., 15 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Recht / Steuern Allgemeines / Lexika
Sozialwissenschaften Politik / Verwaltung
Wirtschaft
Schlagworte Benford’s Law • Crime Detection • crime prevention • Cyberspace • cyber-surveillance • mobile device forensics • network traffic analysis • power laws • Zipf’s Law
ISBN-10 3-030-15210-3 / 3030152103
ISBN-13 978-3-030-15210-9 / 9783030152109
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich

von Herbert Voß

eBook Download (2025)
Lehmanns Media (Verlag)
CHF 19,50
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel …

eBook Download (2024)
Carl Hanser Fachbuchverlag
CHF 68,35