Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria

Article Sidebar

Main Article Content

Oyetunde Christian Oyedeji.
Mubarak A Moronkunbi.
Adebayo Adeyinka Victor.
Popoola Olusegun Victor
Abstract: This study evaluates the effectiveness of contemporary cybersecurity protocols in Nigeria, focusing on their efficiency and application within the local context. Cybersecurity is essential in safeguarding sensitive data against theft and unauthorised access, especially as Nigeria experiences growth in online services such as e-commerce and e-banking. The research examines the usability and economic viability of modern security measures like SSL, TLS, and cryptographic protocols. It highlights the challenges of implementing these protocols in Nigeria due to high operational costs and limited local expertise. The paper also discusses Nigeria's legal framework, including the Cybercrime Act of 2015 and the efforts by governmental bodies like NITDA to enhance cybersecurity. Case studies of recent cyber-attacks illustrate the evolving threat landscape and the critical need for robust cybersecurity strategies. The study concludes with recommendations for improving Nigeria's cybersecurity infrastructure through better regulation, increased awareness, and adopting emerging technologies like blockchain and quantum computing. The research aims to bolster Nigeria's cybersecurity posture and promote safer digital environments by addressing these issues.
Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(7), 52-58. https://doi.org/10.51583/IJLTEMAS.2024.130707

Downloads

Downloads

Download data is not yet available.

References

Dastres, R., & Soori, M. (2020). Network and web security use a secure socket layer (SSL). International Journal of Computer and Information Engineering, 14(10), 330-333. hal. science

Khan, N. A., Khan, A. S., Kar, H. A., Ahmad, Z., Tarmizi, S., & Julaihi, A. A. (2022, May). Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure. In 2022 Applied Informatics International Conference (AiIC) (pp. 126-130). IEEE. researchgate.net DOI: https://doi.org/10.1109/AiIC54368.2022.9914605

Ibrahim, A. (). Secure Socket Layer: Fundamentals and Certificate Verification. engrxiv.org. engrxiv.org

Kumar, D. D., Mukharzee, J. D., Reddy, C. V. D., & Rajagopal, S. M. (2024, March). Safe and Secure Communication Using SSL/TLS. In 2024 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 1–6). IEEE. [HTML] DOI: https://doi.org/10.1109/ESCI59607.2024.10497224

Ode-Martins, O. (2021). Challenges of Biometrics Technology in Nigeria to Enhance Information Security: A Qualitative Exploratory Case Study. [HTML]

Igbinovia, M. O. & Ishola, B. C. (2023). Cyber security in university libraries and implication for library and information science education in Nigeria. Digital Library Perspectives. [HTML] DOI: https://doi.org/10.1108/DLP-11-2022-0089

Ugbe, U. M. (2021). Exploring the Security Measures to Reduce Cyberattacks within the Nigerian Banking Sector: A Qualitative Inquiry. [HTML]

O'Brien, N., Crespo, R. F., O'Driscoll, F., Prendergast, M., Chana, D., Darzi, A., & Ghafur, S. (2024). Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study. JMIR Formative Research, 8(1), e50968. jmir.org DOI: https://doi.org/10.2196/50968

Adisa, O. T. (2023). The impact of cybercrime and cybersecurity on Nigeria's national security. cuni.cz

Oladipo, J. O., Okoye, C. C., Elufioye, O. A., Falaiye, T., & Nwankwo, E. E. (2024). Human factors in cybersecurity: Navigating the fintech landscape. International Journal of Science and Research Archive, 11(1), 1959-1967. ijsra.net DOI: https://doi.org/10.30574/ijsra.2024.11.1.0258

Daniels, O. (2023). National Cybersecurity Policy and Strategy of Nigeria: A Case Study. [HTML]

Abrahams, T. O., Ewuga, S. K., Dawodu, S. O., Adegbite, A. O., & Hassan, A. O. (2024). A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION. Computer Science & IT Research Journal, 5(1), 1-25. fepbl.com DOI: https://doi.org/10.51594/csitrj.v5i1.699

Obono, O. F. E. M., & Tawo, B. P. (2022). Improving Security in A Virtual Local Area Network. Journal of Theoretical and Applied Information Technology, 100(10). jatit.org

Heino, J., Hakkala, A., & Virtanen, S. (2022). Study of methods for endpoint aware inspection in a next generation firewall. Cybersecurity. springer.com DOI: https://doi.org/10.1186/s42400-022-00127-8

Bang, A. O., Rao, U. P., Visconti, A., Brighente, A., & Conti, M. (2022). An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions. Computers & Security. [HTML] DOI: https://doi.org/10.1016/j.cose.2022.102914

Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2021). MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611-6622. academia.edu DOI: https://doi.org/10.1109/JIOT.2021.3113577

Izevbuwa, O. G. & Ngwoke, R. A. (2022). Combating the Menace of Cybercrime in Nigeria: A Review of the Cybercrime (Prohibition, Prevention etc) Act 2015 and Other Legislations. JL Pol'y & Globalization. academia.edu

Obiefuna, O. C., Adibe, E., & Osuagwu, A. (2023). Nigeria's Cybercrime (Prohibition, Prevention, etc) Act 2015 at Eight: Class Act or the New Normal? IRLJ. nigerianjournalsonline.com

Awhefeada, U. V. & Bernice, O. O. (2020). Appraising the laws governing the control of cybercrime in Nigeria. Journal of Law and Criminal Justice. researchgate.net DOI: https://doi.org/10.15640/jlcj.v8n1a3

Eboibi, F. E. (2020). Cybercriminals and Nigerian Cybercrimes Act 2015: Conceptualising Computers for Cybercrime Justice. JACL. uwc.ac.za

KHAUSTOVA, V., TIRLEA, M. R., DANDARA, L., TRUSHKINA, N., & BIRCA, I. (2023). DEVELOPMENT OF CRITICAL INFRASTRUCTURE FROM THE POINT OF VIEW OF INFORMATION SECURITY. Univers strategic, 53(1). idsi. md

Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, 26(1), 69-75. sciendo.com DOI: https://doi.org/10.2478/raft-2021-0011

Malatji, M., Marnewick, A. L., & Von Solms, S. (2022). Cybersecurity capabilities for critical infrastructure resilience. Information & Computer Security, 30(2), 255-279. [HTML] DOI: https://doi.org/10.1108/ICS-06-2021-0091

Viganò, E., Loi, M., & Yaghmaei, E. (2020). Cybersecurity of critical infrastructure. The Ethics of Cybersecurity. oapen.org DOI: https://doi.org/10.1007/978-3-030-29053-5_8

Abiodun, T. F., Oloyede, A. O., Ademola, O. E., Abah, O., & Kehinde, O. S. (2020). Unlawful killings of civilians by officers of the special anti-robbery squad (SARS) unit of the Nigerian police in southwest Nigeria: implications for national security. African Journal of Law, Political Research and Administration, 3(1), 49–64. abjournals.org

Adediran, A. O. (2021). Cyberbullying in Nigeria: Examining the adequacy of legal responses. International Journal for the Semiotics of Law-Revue internationale de Sémiotique juridique, 34(4), 965-984. [HTML] DOI: https://doi.org/10.1007/s11196-020-09697-7

Richards, N. U., & Eboibi, F. E. (2021). African governments and the influence of corruption on the proliferation of cybercrime in Africa: Wherein lies the rule of law? International Review of Law, Computers & Technology, 35(2), 131–161. [HTML] DOI: https://doi.org/10.1080/13600869.2021.1885105

Baseri, Y., Chouhan, V., & Hafid, A. (2024). Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols. [PDF] DOI: https://doi.org/10.2139/ssrn.4687851

Liu, Q., Huang, Y., Du, Y., Zhao, Z., Geng, M., Zhang, Z., & Wei, K. (2022). Advances in Chip-Based Quantum Key Distribution. ncbi.nlm.nih.gov DOI: https://doi.org/10.3390/e24101334

Oliva del Moral, J., deMarti iOlius, A., Vidal, G., M. Crespo, P., & Etxezarreta Martinez, J. (2024). Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective. [PDF] DOI: https://doi.org/10.1109/JIOT.2024.3410702

Bishnoi, B. (2020). Quantum Computation. [PDF]

Sayal, M. A., Alameady, M. H., & Albermany, S. A. (2020). Using SSL and TLS Protocols in Providing a Secure Environment for e-commerce Sites. Webology. webology.org DOI: https://doi.org/10.14704/WEB/V17I2/WEB17048

Oppliger, R. (2023). SSL and TLS: Theory and Practice. [HTML]

Sheikh, S. A., & Tariq Banday, M. (2021). Secure E-mail Communications Through Cryptographic Techniques—A Study. Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2019, 219-235. [HTML] DOI: https://doi.org/10.1007/978-981-15-1275-9_19

Möller, D. P. (2023). NIST Cybersecurity Framework and MITRE Cybersecurity Criteria. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices (pp. 231-271). Cham: Springer Nature Switzerland. [HTML] DOI: https://doi.org/10.1007/978-3-031-26845-8_5

Syafrizal, M., Selamat, S. R., & Zakaria, N. A. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, 12(3), 417-432. academia.edu DOI: https://doi.org/10.17762/ijcnis.v12i3.4817

Markopoulou, D. & Papakonstantinou, V. (2021). The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The …. Computer law & security review. sciencedirect.com DOI: https://doi.org/10.1016/j.clsr.2020.105502

Chidukwani, A., Zander, S., & Koutsakis, P. (2022). A survey on the cyber security of small-to-medium businesses: Challenges, research focus and recommendations. IEEE Access. ieee.org DOI: https://doi.org/10.1109/ACCESS.2022.3197899

Idowu, O. A. (). Cybercrimes and Challenges of Cyber-Security in Nigeria. academia.edu. academia.edu

Onumo, A. O. (2020). A Behavioural Compliance Framework for Effective Cybersecurity Governance and Practice. brad.ac.uk

Adewopo, V., Azumah, S. W., Yakubu, M. A., Gyamfi, E. K., Ozer, M., & Elsayed, N. (2024). A Comprehensive Analytical Review on Cybercrime in West Africa. arXiv preprint arXiv:2402.01649. [PDF]

Chidume, C. G., Oko-Otu, C. N., & Aro, G. C. (2021). State Fragility and Covid-19 pandemic: Implications on the political economy of Nigeria. ncbi.nlm.nih.gov DOI: https://doi.org/10.1016/j.ssaho.2021.100127

N. Okeke, E. (2021). Pan[dem]ic! Rational Risk Avoidance During a Health Pandemic. ncbi.nlm.nih.gov DOI: https://doi.org/10.1101/2021.05.28.21257983

D Chechet, G., K P Kwaga, J., Yahaya, J., Noyes, H., MacLeod, A., & E Adamson, W. (2022). SARS-CoV-2 seroprevalence at urban and rural sites in Kaduna State, Nigeria, during October/November 2021, immediately prior to detection of the Omicron variant. ncbi.nlm.nih.gov DOI: https://doi.org/10.1101/2021.12.21.21268166

Agbeyangi, A., Makinde, A., & Odun-Ayo, I. (2024). Nigeria's ICT and Economic Sustainability in the Digital Age. [PDF]

AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. unil.ch DOI: https://doi.org/10.1016/j.cose.2022.102754

Shopina, I., Khomiakov, D., Khrystynchenko, N., Zhukov, S., & Shpenov, D. (2020). CYBERSECURITY: LEGAL AND ORGANIZATIONAL SUPPORT IN LEADING COUNTRIES, NATO AND EU STANDARDS. Journal of Security & Sustainability Issues, 9(3). lvduvs.edu.ua DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy. [HTML] DOI: https://doi.org/10.1080/23738871.2020.1778759

Roshanaei, M. (2021). Resilience at the core: critical infrastructure protection challenges, priorities and cybersecurity assessment strategies. Journal of Computer and Communications. scirp.org DOI: https://doi.org/10.4236/jcc.2021.98006

Ofodile, O. C., Odeyemi, O., Okoye, C. C., Addy, W. A., Oyewole, A. T., Adeoye, O. B., & Ololade, Y. J. (2024). Digital banking regulations: a comparative review between Nigeria and the USA. Finance & Accounting Research Journal, 6(3), 347-371. fepbl.com DOI: https://doi.org/10.51594/farj.v6i3.897

Ololade, Y. J. (2024). SME financing through fintech: an analytical study of trends in Nigeria and the USA. International Journal of Management & Entrepreneurship Research, 6(4), 1078-1102. fepbl.com DOI: https://doi.org/10.51594/ijmer.v6i4.1001

Olujobi, O. J. (2020). Analysis of the legal framework governing gas flaring in Nigeria's upstream petroleum sector and the need for overhauling. Social Sciences. elizadeuniversity.edu.ng DOI: https://doi.org/10.3390/socsci9080132

Article Details

How to Cite

Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(7), 52-58. https://doi.org/10.51583/IJLTEMAS.2024.130707

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)