Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria
PDF
Full Text HTML
EPUB

Keywords

Information Techcnology

How to Cite

Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(7), 52-58. https://doi.org/10.51583/IJLTEMAS.2024.130707

Abstract

Abstract: This study evaluates the effectiveness of contemporary cybersecurity protocols in Nigeria, focusing on their efficiency and application within the local context. Cybersecurity is essential in safeguarding sensitive data against theft and unauthorised access, especially as Nigeria experiences growth in online services such as e-commerce and e-banking. The research examines the usability and economic viability of modern security measures like SSL, TLS, and cryptographic protocols. It highlights the challenges of implementing these protocols in Nigeria due to high operational costs and limited local expertise. The paper also discusses Nigeria's legal framework, including the Cybercrime Act of 2015 and the efforts by governmental bodies like NITDA to enhance cybersecurity. Case studies of recent cyber-attacks illustrate the evolving threat landscape and the critical need for robust cybersecurity strategies. The study concludes with recommendations for improving Nigeria's cybersecurity infrastructure through better regulation, increased awareness, and adopting emerging technologies like blockchain and quantum computing. The research aims to bolster Nigeria's cybersecurity posture and promote safer digital environments by addressing these issues.
PDF
Full Text HTML
EPUB

References

Dastres, R., & Soori, M. (2020). Network and web security use a secure socket layer (SSL). International Journal of Computer and Information Engineering, 14(10), 330-333. hal. science

Khan, N. A., Khan, A. S., Kar, H. A., Ahmad, Z., Tarmizi, S., & Julaihi, A. A. (2022, May). Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure. In 2022 Applied Informatics International Conference (AiIC) (pp. 126-130). IEEE. researchgate.net

Ibrahim, A. (). Secure Socket Layer: Fundamentals and Certificate Verification. engrxiv.org. engrxiv.org

Kumar, D. D., Mukharzee, J. D., Reddy, C. V. D., & Rajagopal, S. M. (2024, March). Safe and Secure Communication Using SSL/TLS. In 2024 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 1–6). IEEE. [HTML]

Ode-Martins, O. (2021). Challenges of Biometrics Technology in Nigeria to Enhance Information Security: A Qualitative Exploratory Case Study. [HTML]

Igbinovia, M. O. & Ishola, B. C. (2023). Cyber security in university libraries and implication for library and information science education in Nigeria. Digital Library Perspectives. [HTML]

Ugbe, U. M. (2021). Exploring the Security Measures to Reduce Cyberattacks within the Nigerian Banking Sector: A Qualitative Inquiry. [HTML]

O'Brien, N., Crespo, R. F., O'Driscoll, F., Prendergast, M., Chana, D., Darzi, A., & Ghafur, S. (2024). Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study. JMIR Formative Research, 8(1), e50968. jmir.org

Adisa, O. T. (2023). The impact of cybercrime and cybersecurity on Nigeria's national security. cuni.cz

Oladipo, J. O., Okoye, C. C., Elufioye, O. A., Falaiye, T., & Nwankwo, E. E. (2024). Human factors in cybersecurity: Navigating the fintech landscape. International Journal of Science and Research Archive, 11(1), 1959-1967. ijsra.net

Daniels, O. (2023). National Cybersecurity Policy and Strategy of Nigeria: A Case Study. [HTML]

Abrahams, T. O., Ewuga, S. K., Dawodu, S. O., Adegbite, A. O., & Hassan, A. O. (2024). A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION. Computer Science & IT Research Journal, 5(1), 1-25. fepbl.com

Obono, O. F. E. M., & Tawo, B. P. (2022). Improving Security in A Virtual Local Area Network. Journal of Theoretical and Applied Information Technology, 100(10). jatit.org

Heino, J., Hakkala, A., & Virtanen, S. (2022). Study of methods for endpoint aware inspection in a next generation firewall. Cybersecurity. springer.com

Bang, A. O., Rao, U. P., Visconti, A., Brighente, A., & Conti, M. (2022). An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions. Computers & Security. [HTML]

Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2021). MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611-6622. academia.edu

Izevbuwa, O. G. & Ngwoke, R. A. (2022). Combating the Menace of Cybercrime in Nigeria: A Review of the Cybercrime (Prohibition, Prevention etc) Act 2015 and Other Legislations. JL Pol'y & Globalization. academia.edu

Obiefuna, O. C., Adibe, E., & Osuagwu, A. (2023). Nigeria's Cybercrime (Prohibition, Prevention, etc) Act 2015 at Eight: Class Act or the New Normal? IRLJ. nigerianjournalsonline.com

Awhefeada, U. V. & Bernice, O. O. (2020). Appraising the laws governing the control of cybercrime in Nigeria. Journal of Law and Criminal Justice. researchgate.net

Eboibi, F. E. (2020). Cybercriminals and Nigerian Cybercrimes Act 2015: Conceptualising Computers for Cybercrime Justice. JACL. uwc.ac.za

KHAUSTOVA, V., TIRLEA, M. R., DANDARA, L., TRUSHKINA, N., & BIRCA, I. (2023). DEVELOPMENT OF CRITICAL INFRASTRUCTURE FROM THE POINT OF VIEW OF INFORMATION SECURITY. Univers strategic, 53(1). idsi. md

Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, 26(1), 69-75. sciendo.com

Malatji, M., Marnewick, A. L., & Von Solms, S. (2022). Cybersecurity capabilities for critical infrastructure resilience. Information & Computer Security, 30(2), 255-279. [HTML]

Viganò, E., Loi, M., & Yaghmaei, E. (2020). Cybersecurity of critical infrastructure. The Ethics of Cybersecurity. oapen.org

Abiodun, T. F., Oloyede, A. O., Ademola, O. E., Abah, O., & Kehinde, O. S. (2020). Unlawful killings of civilians by officers of the special anti-robbery squad (SARS) unit of the Nigerian police in southwest Nigeria: implications for national security. African Journal of Law, Political Research and Administration, 3(1), 49–64. abjournals.org

Adediran, A. O. (2021). Cyberbullying in Nigeria: Examining the adequacy of legal responses. International Journal for the Semiotics of Law-Revue internationale de Sémiotique juridique, 34(4), 965-984. [HTML]

Richards, N. U., & Eboibi, F. E. (2021). African governments and the influence of corruption on the proliferation of cybercrime in Africa: Wherein lies the rule of law? International Review of Law, Computers & Technology, 35(2), 131–161. [HTML]

Baseri, Y., Chouhan, V., & Hafid, A. (2024). Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols. [PDF]

Liu, Q., Huang, Y., Du, Y., Zhao, Z., Geng, M., Zhang, Z., & Wei, K. (2022). Advances in Chip-Based Quantum Key Distribution. ncbi.nlm.nih.gov

Oliva del Moral, J., deMarti iOlius, A., Vidal, G., M. Crespo, P., & Etxezarreta Martinez, J. (2024). Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective. [PDF]

Bishnoi, B. (2020). Quantum Computation. [PDF]

Sayal, M. A., Alameady, M. H., & Albermany, S. A. (2020). Using SSL and TLS Protocols in Providing a Secure Environment for e-commerce Sites. Webology. webology.org

Oppliger, R. (2023). SSL and TLS: Theory and Practice. [HTML]

Sheikh, S. A., & Tariq Banday, M. (2021). Secure E-mail Communications Through Cryptographic Techniques—A Study. Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2019, 219-235. [HTML]

Möller, D. P. (2023). NIST Cybersecurity Framework and MITRE Cybersecurity Criteria. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices (pp. 231-271). Cham: Springer Nature Switzerland. [HTML]

Syafrizal, M., Selamat, S. R., & Zakaria, N. A. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, 12(3), 417-432. academia.edu

Markopoulou, D. & Papakonstantinou, V. (2021). The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The …. Computer law & security review. sciencedirect.com

Chidukwani, A., Zander, S., & Koutsakis, P. (2022). A survey on the cyber security of small-to-medium businesses: Challenges, research focus and recommendations. IEEE Access. ieee.org

Idowu, O. A. (). Cybercrimes and Challenges of Cyber-Security in Nigeria. academia.edu. academia.edu

Onumo, A. O. (2020). A Behavioural Compliance Framework for Effective Cybersecurity Governance and Practice. brad.ac.uk

Adewopo, V., Azumah, S. W., Yakubu, M. A., Gyamfi, E. K., Ozer, M., & Elsayed, N. (2024). A Comprehensive Analytical Review on Cybercrime in West Africa. arXiv preprint arXiv:2402.01649. [PDF]

Chidume, C. G., Oko-Otu, C. N., & Aro, G. C. (2021). State Fragility and Covid-19 pandemic: Implications on the political economy of Nigeria. ncbi.nlm.nih.gov

N. Okeke, E. (2021). Pan[dem]ic! Rational Risk Avoidance During a Health Pandemic. ncbi.nlm.nih.gov

D Chechet, G., K P Kwaga, J., Yahaya, J., Noyes, H., MacLeod, A., & E Adamson, W. (2022). SARS-CoV-2 seroprevalence at urban and rural sites in Kaduna State, Nigeria, during October/November 2021, immediately prior to detection of the Omicron variant. ncbi.nlm.nih.gov

Agbeyangi, A., Makinde, A., & Odun-Ayo, I. (2024). Nigeria's ICT and Economic Sustainability in the Digital Age. [PDF]

AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. unil.ch

Shopina, I., Khomiakov, D., Khrystynchenko, N., Zhukov, S., & Shpenov, D. (2020). CYBERSECURITY: LEGAL AND ORGANIZATIONAL SUPPORT IN LEADING COUNTRIES, NATO AND EU STANDARDS. Journal of Security & Sustainability Issues, 9(3). lvduvs.edu.ua

Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy. [HTML]

Roshanaei, M. (2021). Resilience at the core: critical infrastructure protection challenges, priorities and cybersecurity assessment strategies. Journal of Computer and Communications. scirp.org

Ofodile, O. C., Odeyemi, O., Okoye, C. C., Addy, W. A., Oyewole, A. T., Adeoye, O. B., & Ololade, Y. J. (2024). Digital banking regulations: a comparative review between Nigeria and the USA. Finance & Accounting Research Journal, 6(3), 347-371. fepbl.com

Ololade, Y. J. (2024). SME financing through fintech: an analytical study of trends in Nigeria and the USA. International Journal of Management & Entrepreneurship Research, 6(4), 1078-1102. fepbl.com

Olujobi, O. J. (2020). Analysis of the legal framework governing gas flaring in Nigeria's upstream petroleum sector and the need for overhauling. Social Sciences. elizadeuniversity.edu.ng

Downloads

Download data is not yet available.