000 04505nam a22006135i 4500
001 978-3-030-15210-9
003 DE-He213
005 20240423125005.0
007 cr nn 008mamaa
008 190315s2019 sz | s |||| 0|eng d
020 _a9783030152109
_9978-3-030-15210-9
024 7 _a10.1007/978-3-030-15210-9
_2doi
050 4 _aTK5105.59
072 7 _aUTN
_2bicssc
072 7 _aCOM043050
_2bisacsh
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aIorliam, Aamo.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCybersecurity in Nigeria
_h[electronic resource] :
_bA Case Study of Surveillance and Prevention of Digital Crime /
_cby Aamo Iorliam.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXIV, 55 p. 19 illus., 15 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Cybersecurity,
_x2193-9748
505 0 _aIntroduction -- Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software.
520 _aThis book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer crimes.
650 0 _aAfrica
_xEconomic conditions.
650 0 _aComputer networks .
650 0 _aBiometric identification.
650 0 _aComputers
_xLaw and legislation.
650 0 _aInformation technology
_xLaw and legislation.
650 1 4 _aMobile and Network Security.
650 2 4 _aCybercrime.
650 2 4 _aAfrican Economics.
650 2 4 _aComputer Communication Networks.
650 2 4 _aBiometrics.
650 2 4 _aLegal Aspects of Computing.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030152093
776 0 8 _iPrinted edition:
_z9783030152116
830 0 _aSpringerBriefs in Cybersecurity,
_x2193-9748
856 4 0 _uhttps://doi.org/10.1007/978-3-030-15210-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c172980
_d172980