Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria
Article Sidebar
Main Article Content
Downloads
Downloads
References
Dastres, R., & Soori, M. (2020). Network and web security use a secure socket layer (SSL). International Journal of Computer and Information Engineering, 14(10), 330-333. hal. science
Khan, N. A., Khan, A. S., Kar, H. A., Ahmad, Z., Tarmizi, S., & Julaihi, A. A. (2022, May). Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure. In 2022 Applied Informatics International Conference (AiIC) (pp. 126-130). IEEE. researchgate.net DOI: https://doi.org/10.1109/AiIC54368.2022.9914605
Ibrahim, A. (). Secure Socket Layer: Fundamentals and Certificate Verification. engrxiv.org. engrxiv.org
Kumar, D. D., Mukharzee, J. D., Reddy, C. V. D., & Rajagopal, S. M. (2024, March). Safe and Secure Communication Using SSL/TLS. In 2024 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 1–6). IEEE. [HTML] DOI: https://doi.org/10.1109/ESCI59607.2024.10497224
Ode-Martins, O. (2021). Challenges of Biometrics Technology in Nigeria to Enhance Information Security: A Qualitative Exploratory Case Study. [HTML]
Igbinovia, M. O. & Ishola, B. C. (2023). Cyber security in university libraries and implication for library and information science education in Nigeria. Digital Library Perspectives. [HTML] DOI: https://doi.org/10.1108/DLP-11-2022-0089
Ugbe, U. M. (2021). Exploring the Security Measures to Reduce Cyberattacks within the Nigerian Banking Sector: A Qualitative Inquiry. [HTML]
O'Brien, N., Crespo, R. F., O'Driscoll, F., Prendergast, M., Chana, D., Darzi, A., & Ghafur, S. (2024). Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study. JMIR Formative Research, 8(1), e50968. jmir.org DOI: https://doi.org/10.2196/50968
Adisa, O. T. (2023). The impact of cybercrime and cybersecurity on Nigeria's national security. cuni.cz
Oladipo, J. O., Okoye, C. C., Elufioye, O. A., Falaiye, T., & Nwankwo, E. E. (2024). Human factors in cybersecurity: Navigating the fintech landscape. International Journal of Science and Research Archive, 11(1), 1959-1967. ijsra.net DOI: https://doi.org/10.30574/ijsra.2024.11.1.0258
Daniels, O. (2023). National Cybersecurity Policy and Strategy of Nigeria: A Case Study. [HTML]
Abrahams, T. O., Ewuga, S. K., Dawodu, S. O., Adegbite, A. O., & Hassan, A. O. (2024). A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION. Computer Science & IT Research Journal, 5(1), 1-25. fepbl.com DOI: https://doi.org/10.51594/csitrj.v5i1.699
Obono, O. F. E. M., & Tawo, B. P. (2022). Improving Security in A Virtual Local Area Network. Journal of Theoretical and Applied Information Technology, 100(10). jatit.org
Heino, J., Hakkala, A., & Virtanen, S. (2022). Study of methods for endpoint aware inspection in a next generation firewall. Cybersecurity. springer.com DOI: https://doi.org/10.1186/s42400-022-00127-8
Bang, A. O., Rao, U. P., Visconti, A., Brighente, A., & Conti, M. (2022). An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions. Computers & Security. [HTML] DOI: https://doi.org/10.1016/j.cose.2022.102914
Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2021). MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611-6622. academia.edu DOI: https://doi.org/10.1109/JIOT.2021.3113577
Izevbuwa, O. G. & Ngwoke, R. A. (2022). Combating the Menace of Cybercrime in Nigeria: A Review of the Cybercrime (Prohibition, Prevention etc) Act 2015 and Other Legislations. JL Pol'y & Globalization. academia.edu
Obiefuna, O. C., Adibe, E., & Osuagwu, A. (2023). Nigeria's Cybercrime (Prohibition, Prevention, etc) Act 2015 at Eight: Class Act or the New Normal? IRLJ. nigerianjournalsonline.com
Awhefeada, U. V. & Bernice, O. O. (2020). Appraising the laws governing the control of cybercrime in Nigeria. Journal of Law and Criminal Justice. researchgate.net DOI: https://doi.org/10.15640/jlcj.v8n1a3
Eboibi, F. E. (2020). Cybercriminals and Nigerian Cybercrimes Act 2015: Conceptualising Computers for Cybercrime Justice. JACL. uwc.ac.za
KHAUSTOVA, V., TIRLEA, M. R., DANDARA, L., TRUSHKINA, N., & BIRCA, I. (2023). DEVELOPMENT OF CRITICAL INFRASTRUCTURE FROM THE POINT OF VIEW OF INFORMATION SECURITY. Univers strategic, 53(1). idsi. md
Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, 26(1), 69-75. sciendo.com DOI: https://doi.org/10.2478/raft-2021-0011
Malatji, M., Marnewick, A. L., & Von Solms, S. (2022). Cybersecurity capabilities for critical infrastructure resilience. Information & Computer Security, 30(2), 255-279. [HTML] DOI: https://doi.org/10.1108/ICS-06-2021-0091
Viganò, E., Loi, M., & Yaghmaei, E. (2020). Cybersecurity of critical infrastructure. The Ethics of Cybersecurity. oapen.org DOI: https://doi.org/10.1007/978-3-030-29053-5_8
Abiodun, T. F., Oloyede, A. O., Ademola, O. E., Abah, O., & Kehinde, O. S. (2020). Unlawful killings of civilians by officers of the special anti-robbery squad (SARS) unit of the Nigerian police in southwest Nigeria: implications for national security. African Journal of Law, Political Research and Administration, 3(1), 49–64. abjournals.org
Adediran, A. O. (2021). Cyberbullying in Nigeria: Examining the adequacy of legal responses. International Journal for the Semiotics of Law-Revue internationale de Sémiotique juridique, 34(4), 965-984. [HTML] DOI: https://doi.org/10.1007/s11196-020-09697-7
Richards, N. U., & Eboibi, F. E. (2021). African governments and the influence of corruption on the proliferation of cybercrime in Africa: Wherein lies the rule of law? International Review of Law, Computers & Technology, 35(2), 131–161. [HTML] DOI: https://doi.org/10.1080/13600869.2021.1885105
Baseri, Y., Chouhan, V., & Hafid, A. (2024). Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols. [PDF] DOI: https://doi.org/10.2139/ssrn.4687851
Liu, Q., Huang, Y., Du, Y., Zhao, Z., Geng, M., Zhang, Z., & Wei, K. (2022). Advances in Chip-Based Quantum Key Distribution. ncbi.nlm.nih.gov DOI: https://doi.org/10.3390/e24101334
Oliva del Moral, J., deMarti iOlius, A., Vidal, G., M. Crespo, P., & Etxezarreta Martinez, J. (2024). Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective. [PDF] DOI: https://doi.org/10.1109/JIOT.2024.3410702
Bishnoi, B. (2020). Quantum Computation. [PDF]
Sayal, M. A., Alameady, M. H., & Albermany, S. A. (2020). Using SSL and TLS Protocols in Providing a Secure Environment for e-commerce Sites. Webology. webology.org DOI: https://doi.org/10.14704/WEB/V17I2/WEB17048
Oppliger, R. (2023). SSL and TLS: Theory and Practice. [HTML]
Sheikh, S. A., & Tariq Banday, M. (2021). Secure E-mail Communications Through Cryptographic Techniques—A Study. Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2019, 219-235. [HTML] DOI: https://doi.org/10.1007/978-981-15-1275-9_19
Möller, D. P. (2023). NIST Cybersecurity Framework and MITRE Cybersecurity Criteria. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices (pp. 231-271). Cham: Springer Nature Switzerland. [HTML] DOI: https://doi.org/10.1007/978-3-031-26845-8_5
Syafrizal, M., Selamat, S. R., & Zakaria, N. A. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, 12(3), 417-432. academia.edu DOI: https://doi.org/10.17762/ijcnis.v12i3.4817
Markopoulou, D. & Papakonstantinou, V. (2021). The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The …. Computer law & security review. sciencedirect.com DOI: https://doi.org/10.1016/j.clsr.2020.105502
Chidukwani, A., Zander, S., & Koutsakis, P. (2022). A survey on the cyber security of small-to-medium businesses: Challenges, research focus and recommendations. IEEE Access. ieee.org DOI: https://doi.org/10.1109/ACCESS.2022.3197899
Idowu, O. A. (). Cybercrimes and Challenges of Cyber-Security in Nigeria. academia.edu. academia.edu
Onumo, A. O. (2020). A Behavioural Compliance Framework for Effective Cybersecurity Governance and Practice. brad.ac.uk
Adewopo, V., Azumah, S. W., Yakubu, M. A., Gyamfi, E. K., Ozer, M., & Elsayed, N. (2024). A Comprehensive Analytical Review on Cybercrime in West Africa. arXiv preprint arXiv:2402.01649. [PDF]
Chidume, C. G., Oko-Otu, C. N., & Aro, G. C. (2021). State Fragility and Covid-19 pandemic: Implications on the political economy of Nigeria. ncbi.nlm.nih.gov DOI: https://doi.org/10.1016/j.ssaho.2021.100127
N. Okeke, E. (2021). Pan[dem]ic! Rational Risk Avoidance During a Health Pandemic. ncbi.nlm.nih.gov DOI: https://doi.org/10.1101/2021.05.28.21257983
D Chechet, G., K P Kwaga, J., Yahaya, J., Noyes, H., MacLeod, A., & E Adamson, W. (2022). SARS-CoV-2 seroprevalence at urban and rural sites in Kaduna State, Nigeria, during October/November 2021, immediately prior to detection of the Omicron variant. ncbi.nlm.nih.gov DOI: https://doi.org/10.1101/2021.12.21.21268166
Agbeyangi, A., Makinde, A., & Odun-Ayo, I. (2024). Nigeria's ICT and Economic Sustainability in the Digital Age. [PDF]
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. unil.ch DOI: https://doi.org/10.1016/j.cose.2022.102754
Shopina, I., Khomiakov, D., Khrystynchenko, N., Zhukov, S., & Shpenov, D. (2020). CYBERSECURITY: LEGAL AND ORGANIZATIONAL SUPPORT IN LEADING COUNTRIES, NATO AND EU STANDARDS. Journal of Security & Sustainability Issues, 9(3). lvduvs.edu.ua DOI: https://doi.org/10.9770/jssi.2020.9.3(22)
Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy. [HTML] DOI: https://doi.org/10.1080/23738871.2020.1778759
Roshanaei, M. (2021). Resilience at the core: critical infrastructure protection challenges, priorities and cybersecurity assessment strategies. Journal of Computer and Communications. scirp.org DOI: https://doi.org/10.4236/jcc.2021.98006
Ofodile, O. C., Odeyemi, O., Okoye, C. C., Addy, W. A., Oyewole, A. T., Adeoye, O. B., & Ololade, Y. J. (2024). Digital banking regulations: a comparative review between Nigeria and the USA. Finance & Accounting Research Journal, 6(3), 347-371. fepbl.com DOI: https://doi.org/10.51594/farj.v6i3.897
Ololade, Y. J. (2024). SME financing through fintech: an analytical study of trends in Nigeria and the USA. International Journal of Management & Entrepreneurship Research, 6(4), 1078-1102. fepbl.com DOI: https://doi.org/10.51594/ijmer.v6i4.1001
Olujobi, O. J. (2020). Analysis of the legal framework governing gas flaring in Nigeria's upstream petroleum sector and the need for overhauling. Social Sciences. elizadeuniversity.edu.ng DOI: https://doi.org/10.3390/socsci9080132
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.