Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity in Nigeriaa case study...
~
Iorliam, Aamo.
Cybersecurity in Nigeriaa case study of surveillance and prevention of digital crime /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity in Nigeriaby Aamo Iorliam.
Reminder of title:
a case study of surveillance and prevention of digital crime /
Author:
Iorliam, Aamo.
Published:
Cham :Springer International Publishing :2019.
Description:
xiv, 55 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer securityNigeria.
Online resource:
https://doi.org/10.1007/978-3-030-15210-9
ISBN:
9783030152109$q(electronic bk.)
Cybersecurity in Nigeriaa case study of surveillance and prevention of digital crime /
Iorliam, Aamo.
Cybersecurity in Nigeria
a case study of surveillance and prevention of digital crime /[electronic resource] :by Aamo Iorliam. - Cham :Springer International Publishing :2019. - xiv, 55 p. :ill., digital ;24 cm. - SpringerBriefs in cybersecurity,2193-973X. - SpringerBriefs in cybersecurity..
Introduction -- Natural Laws (Benford's Law and Zipf's Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford's Law and Zipf's Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software.
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria's digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria's cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers) In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford's Law and Zipf's Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT) It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
ISBN: 9783030152109$q(electronic bk.)
Standard No.: 10.1007/978-3-030-15210-9doiSubjects--Topical Terms:
836065
Computer security
--Nigeria.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cybersecurity in Nigeriaa case study of surveillance and prevention of digital crime /
LDR
:03349nmm a2200337 a 4500
001
554378
003
DE-He213
005
20190316001122.0
006
m d
007
cr nn 008maaau
008
191118s2019 gw s 0 eng d
020
$a
9783030152109$q(electronic bk.)
020
$a
9783030152093$q(paper)
024
7
$a
10.1007/978-3-030-15210-9
$2
doi
035
$a
978-3-030-15210-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I64 2019
100
1
$a
Iorliam, Aamo.
$3
818749
245
1 0
$a
Cybersecurity in Nigeria
$h
[electronic resource] :
$b
a case study of surveillance and prevention of digital crime /
$c
by Aamo Iorliam.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xiv, 55 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in cybersecurity,
$x
2193-973X
505
0
$a
Introduction -- Natural Laws (Benford's Law and Zipf's Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford's Law and Zipf's Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software.
520
$a
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria's digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria's cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers) In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford's Law and Zipf's Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT) It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
650
0
$a
Computer security
$z
Nigeria.
$3
836065
650
0
$a
Computer networks
$x
Security measures
$z
Nigeria.
$3
836066
650
1 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Cybercrime.
$3
748274
650
2 4
$a
African Economics.
$3
773877
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Biometrics.
$3
274525
650
2 4
$a
Legal Aspects of Computing.
$3
276398
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
SpringerBriefs in cybersecurity.
$3
561564
856
4 0
$u
https://doi.org/10.1007/978-3-030-15210-9
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000167240
電子館藏
1圖書
電子書
EB QA76.9.A25 I64 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-15210-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login