Cybersecurity in Nigeria (Record no. 172980)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04505nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-15210-9 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125005.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190315s2019 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030152109 |
-- | 978-3-030-15210-9 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-030-15210-9 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Iorliam, Aamo. |
Relator term | author. |
Relator code | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity in Nigeria |
Medium | [electronic resource] : |
Remainder of title | A Case Study of Surveillance and Prevention of Digital Crime / |
Statement of responsibility, etc | by Aamo Iorliam. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 55 p. 19 illus., 15 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | SpringerBriefs in Cybersecurity, |
International Standard Serial Number | 2193-9748 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Africa |
General subdivision | Economic conditions. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Biometric identification. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information technology |
General subdivision | Law and legislation. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mobile and Network Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cybercrime. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | African Economics. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Biometrics. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Legal Aspects of Computing. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030152093 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030152116 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | SpringerBriefs in Cybersecurity, |
-- | 2193-9748 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.