INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIII, Issue VII, July 2024
www.ijltemas.in Page 57
References:
1. Dastres, R., & Soori, M. (2020). Network and web security use a secure socket layer (SSL). International Journal of
Computer and Information Engineering, 14(10), 330-333. hal. science
2. Khan, N. A., Khan, A. S., Kar, H. A., Ahmad, Z., Tarmizi, S., & Julaihi, A. A. (2022, May). Employing public key
infrastructure to encapsulate messages during transport layer security handshake procedure. In 2022 Applied Informatics
International Conference (AiIC) (pp. 126-130). IEEE. researchgate.net
3. Ibrahim, A. (). Secure Socket Layer: Fundamentals and Certificate Verification. engrxiv.org. engrxiv.org
4. Kumar, D. D., Mukharzee, J. D., Reddy, C. V. D., & Rajagopal, S. M. (2024, March). Safe and Secure Communication
Using SSL/TLS. In 2024 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 1–6).
IEEE. [HTML]
5. Ode-Martins, O. (2021). Challenges of Biometrics Technology in Nigeria to Enhance Information Security: A
Qualitative Exploratory Case Study. [HTML]
6. Igbinovia, M. O. & Ishola, B. C. (2023). Cyber security in university libraries and implication for library and
information science education in Nigeria. Digital Library Perspectives. [HTML]
7. Ugbe, U. M. (2021). Exploring the Security Measures to Reduce Cyberattacks within the Nigerian Banking Sector: A
Qualitative Inquiry. [HTML]
8. O'Brien, N., Crespo, R. F., O'Driscoll, F., Prendergast, M., Chana, D., Darzi, A., & Ghafur, S. (2024). Usability and
Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The
Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study. JMIR
Formative Research, 8(1), e50968. jmir.org
9. Adisa, O. T. (2023). The impact of cybercrime and cybersecurity on Nigeria's national security. cuni.cz
10. Oladipo, J. O., Okoye, C. C., Elufioye, O. A., Falaiye, T., & Nwankwo, E. E. (2024). Human factors in cybersecurity:
Navigating the fintech landscape. International Journal of Science and Research Archive, 11(1), 1959-1967. ijsra.net
11. Daniels, O. (2023). National Cybersecurity Policy and Strategy of Nigeria: A Case Study. [HTML]
12. Abrahams, T. O., Ewuga, S. K., Dawodu, S. O., Adegbite, A. O., & Hassan, A. O. (2024). A REVIEW OF
CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND
EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION. Computer Science & IT
Research Journal, 5(1), 1-25. fepbl.com
13. Obono, O. F. E. M., & Tawo, B. P. (2022). Improving Security in A Virtual Local Area Network. Journal of Theoretical
and Applied Information Technology, 100(10). jatit.org
14. Heino, J., Hakkala, A., & Virtanen, S. (2022). Study of methods for endpoint aware inspection in a next generation
firewall. Cybersecurity. springer.com
15. Bang, A. O., Rao, U. P., Visconti, A., Brighente, A., & Conti, M. (2022). An iot inventory before deployment: a survey
on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions. Computers &
Security. [HTML]
16. Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2021). MUD-based behavioral
profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611-6622.
academia.edu
17. Izevbuwa, O. G. & Ngwoke, R. A. (2022). Combating the Menace of Cybercrime in Nigeria: A Review of the
Cybercrime (Prohibition, Prevention etc) Act 2015 and Other Legislations. JL Pol'y & Globalization. academia.edu
18. Obiefuna, O. C., Adibe, E., & Osuagwu, A. (2023). Nigeria's Cybercrime (Prohibition, Prevention, etc) Act 2015 at
Eight: Class Act or the New Normal? IRLJ. nigerianjournalsonline.com
19. Awhefeada, U. V. & Bernice, O. O. (2020). Appraising the laws governing the control of cybercrime in Nigeria. Journal
of Law and Criminal Justice. researchgate.net
20. Eboibi, F. E. (2020). Cybercriminals and Nigerian Cybercrimes Act 2015: Conceptualising Computers for Cybercrime
Justice. JACL. uwc.ac.za
21. KHAUSTOVA, V., TIRLEA, M. R., DANDARA, L., TRUSHKINA, N., & BIRCA, I. (2023). DEVELOPMENT OF
CRITICAL INFRASTRUCTURE FROM THE POINT OF VIEW OF INFORMATION SECURITY. Univers strategic,
53(1). idsi. md
22. Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in
critical infrastructure sectors. Land Forces Academy Review, 26(1), 69-75. sciendo.com
23. Malatji, M., Marnewick, A. L., & Von Solms, S. (2022). Cybersecurity capabilities for critical infrastructure resilience.
Information & Computer Security, 30(2), 255-279. [HTML]
24. Viganò, E., Loi, M., & Yaghmaei, E. (2020). Cybersecurity of critical infrastructure. The Ethics of Cybersecurity.
oapen.org
25. Abiodun, T. F., Oloyede, A. O., Ademola, O. E., Abah, O., & Kehinde, O. S. (2020). Unlawful killings of civilians by
officers of the special anti-robbery squad (SARS) unit of the Nigerian police in southwest Nigeria: implications for
national security. African Journal of Law, Political Research and Administration, 3(1), 49–64. abjournals.org