SlideShare uma empresa Scribd logo
1 de 14
Table of Contents
2. Literature review.................................................................................................................... 2
2.1. Revolution of internet........................................................................................................ 3
2.1.1. Internet of Things ....................................................................................................... 4
2.1.2. The Stream of Information........................................................................................ 5
2.2. Laws for internet in the United States ............................................................................ 5
2.3. Laws for internet in France .............................................................................................. 5
2.4. Modern time cyberspace.................................................................................................. 6
2.5. Need of cyberspace.......................................................................................................... 7
2.6. Individual dependency on cyberspace........................................................................... 8
2.7. Organizational dependency on cyberspace.................................................................. 9
2.8. Cyberspace risks............................................................................................................. 10
2.8.1. Viruses....................................................................................................................... 10
2.8.2. Disruption of Services ............................................................................................. 11
2.8.3. Man in the Middle (MITM)....................................................................................... 11
2.8.4. Phishing..................................................................................................................... 11
2.8.5. Injection of SQL Code ............................................................................................. 11
2.8.6. Attacks on Passwords............................................................................................. 12
Chapter 2
2. Literature review
Companies and people in Nigeria are increasingly concerned about cybersecurity as
they implement digital transformation to enhance growth and efficiency by relying on
cutting-edge technology. Many organizations are also becoming more reliant on outside
providers or initiatives to enhance business operations. Despite the fact that third-party
consultants may contribute to greater success for the organization, they also bring new
threats and expand the risks (Oladeji, n.d.). One of the most common blunders firms
make is failing to recognize the added risk that these resources are going to entail.
Businesses in Nigeria will be able to manage and mitigate risks more effectively during
the covid-19 epidemic if everyone knows what to look for and what to do in the event of
a pandemic that causes security risks for online working.
Individuals need to know the difference between information system security and cyber
risks in order to assess their own company's readiness. As defined by Khan et al.,
cybersecurity is a method for guarding against digital attacks on systems, networks, and
programs (2020). ITU 2020 defined cybersecurity as a collection of instruments,
policies, security ideas and guidelines, methods to risk management systems, and
technology for safeguarding users' information and organizations in the cyber
environment from cyber threats (Lebogang et al., 2022).
Abukari & Bankas (2020) have shown that unsupported standards for information
systems and poor data management methods contribute to cybersecurity risks.
Workers' unethical behavior contributes to security breaches since they are aware of
the shortcomings in their companies' cybersecurity governance structures. Vlachos
(2011) stated that the most devastating assaults occur when employees hand over
sensitive information to hackers. Security breaches can be exacerbated by employees
utilizing several devices to connect to a workplace network, which can be shared with
friends and family in some cases.
During the Cold War, in the 1970s and 1980s, a new breed of criminal emerged:
cybercrime. While nation-states were engaged in ideological battles, the majority of
cybercrime was centered on attacks on competitor nations' computer systems. Hackers
working for governments accessed sensitive information on nuclear proliferation,
intelligence gathering, and foreign policy (Eyo, 1983). An individual hacker attack on
important national facilities and financial institutions was also taking place, with the goal
of stealing money and causing destruction. After the fall of the Soviet Union, however,
cybercrime became significantly more widespread, dynamic, and ubiquitous in terms of
its extent and pervasiveness.
Users of the network routinely circumvent the security protocol that stops them from
accessing hazardous websites. They put the organization's network at risk of viruses
and data breaches by engaging in this ill-advised activity. As more people use public
Wi-Fi, this danger becomes more apparent (Matusitz and Ochoa, 2018). An
investigation has found that WIFI's security is unsure and known for its weaknesses,
which are not only dangerous for personal devices but could also have a big financial
impact on businesses.
Research suggests that hackers may be motivated to commit crimes related to
cyberattacks and threats to health data because there are health information buyers.
Patients' confidential information is widely available for sale at health care institutions.
Credit cards, complete names, identities, payment histories, and COVID-19 information
are all included in the data, making it valuable to thieves. In addition, the proliferation of
medical devices has made it more difficult to maintain security against cyberattacks and
threats. Due to the high workloads of healthcare professionals, IT professionals are
sometimes left in charge of guarding an entire physical network against cyber-attacks
in underdeveloped countries.
2.1. Revolution of internet
The first presentation of the Internet, the connection of systems, took place in October
1976 at the inaugural Conference Held on Computer Networks in Washington, D.C. The
US Department of Defense (DOD) developed a network that networked computers and
sustained data flow over a substantial distance with this device. ARPANET became
truly revolutionary, and it allowed computers of different sorts to communicate with each
other across long distances. At the time, the capacity to send data across long distances
was not yet known. ARPANET was designed to keep the United States informed of its
military adversaries. A primary goal of the system was to allow computers all around
the country to work collaboratively and exchange data. There were only four computers
connected to ARPANET at the time, all of which belonged to military university labs
engaged in defense-related research.
As ARPANET's reach grew, so did its structure, evolving to meet the new demands.
Other networks linked to ARPANET were soon sponsored by the US National Science
Foundation (NSF). These additional networks were purpose-driven, much like
ARPANET. As an example of such a network, NSFNET was designed to allow all
members of the educational community to access ARPANET. A Protocol Broadcasting
Station and other networks were later joined to ARPANET, making it the first packet-
switching network (Lima et al., 2021). Due to constraints in the Internet Protocol, which
was utilized to allow host-to-host communication, Transmission Control and Internet
Protocol were introduced. While more and more networks were connected, new
protocols and technologies were developed. As the network grew, infrastructure
difficulties arose. A number of internet rules and regulations are in place in developed
nations like the United States and France to keep hackers at bay.
When it comes to cyber security, things are always changing as the internet and digital
activities grow and change. Those who research cyber security are increasingly
focusing on the following two areas:
2.1.1. Internet of Things
Hackers can get access to a system using a device that is connected to the internet or
another network. Home automation and industrial IoT gadgets, including smartphones,
virtual assistants, linked baby monitoring, and cellphones, are progressively being
attacked by hackers in 2019. Hackers who securely connect to a connected living area
with Wi-Fi passwords may also acquire access to users' private details, such as health
records, financial records, and internet log-in information.
2.1.2. The Stream of Information
It is simpler for hackers to get access to a network through a personal device like a
laptop or mobile phone because of data storage on these devices. For example, former
U.S. Director of Domestic Security Michael Chertoff cautions claims that the Cyber
Security in the Digital Environment has become increasingly exposed to cyber assaults.
Therefore, businesses and government organizations must ensure that their data and
operations are safe from cyberattacks. Cyber security experts need to know how to deal
with the most recent and emerging cyber threats.
2.2. Laws for the internet in the United States
The Federal Communications Commission (FCC) governs all electronic
communications in the United States. There are few restrictions on content in the United
States, in accordance with the First Establishment clause free speech premise.
However, this does not imply that there are no Internet rules in the United States. The
Internet is most strictly regulated in the United States. That it has laws with such broad
meanings means that the Internet can be seized even if no revisions are made. If you're
a computer user in the United States, for example, you may face jail time for sending or
receiving pornographic material. In the course of a three-year campaign that began in
1993, the Federal Bureau of Investigation made 80 arrests, 66 convictions, and
conducted over 200 searches. Because the telephone and computer, both of which are
important components of today's Internet, were first developed in America it isn't
unexpected that this level of complexity is found in the US (Onuoha, 2014).
2.3. Laws for internet in France
Attempts have been made in France to control the Internet by means of a Minitel law
enforcement tool. France Telecom has proposed utilizing Minitel inspectors to roam the
Minitel system to guarantee that information providers are adhering to their agreement
with France Telecom. As a result, France will join the Communist bloc in the practice of
manually inspecting the Internet. Since the French Council of Constitutional pronounced
the policing mechanism unlawful for ambiguity, the legal status is currently unclear. The
CST is in charge of overseeing France's widely utilized Minitel network. Using this
organization, France Telecom may be sure that all content providers are abiding by the
terms of their agreement (Adeola et al., 2012). Five to eight people at France Telecom
are supposedly responsible for the surveillance role. Commissions on Net regulation
were formed by the French government in early 1996. Self-filtering rather than filtering
at the source was the key recommendation. It suggested international collaboration in
policing the Internet when necessary, but only when it was absolutely essential.
Recommendations were also made for rules aimed at increasing French online
presence and language
The new CST was expected to include Internet firms and professionals. As a "Minitel,"
the CST consists of 20 members from the ranks of the judiciary as well as government
officials, representatives of France Telecom's subsidiary companies, and
representatives of non-profit families and consumer groups. Individuals who fail to reply
to the ban list of Web sites or communities will be held liable for what they convey. This
statute, which gave censorship authority to the CST, was declared illegal. It's been
decided to block 18 neo-Nazi and obscene newsgroups from their servers following the
adoption of the legislation and the imprisonment of two French IAP managers, the
French Association of Internet Professionals (AFPI), an Internet interest organization.
An organization with only four members that claims to represent more than half of the
population "IAPs were concerned that they may be held liable for the content they
transmitted in France. Censorship is not an appropriate term to describe this prohibition,
according to an official from the AFPI "A different Usenet server may be selected by any
subscriber.
2.4. Modern time cyberspace
Conceptually, cyberspace refers to digital technology that is widely distributed and
linked together. As far back as the first century of the internet's spread, the term alludes
to the online realm as a world different from the actual world. It is possible for people to
socialize, share information, do commerce, play games, and participate in political
discussions over this worldwide network. The word "cyberspace" is now often used to
describe everything having to do with the online platform and the wide variety of cultures
that exist on it. Technology infrastructures that operate through this medium are
included in the US national critical infrastructure, according to government officials in
Washington, D.C. Individuals in cyberspace adhere to a set of common principles and
ethics known as "cyberethics," which they consider to be mutually beneficial for
everyone involved. Privacy is viewed as the most crucial component of a working code
of cyberethics by many (Alli, 2012). The moral duties of working remotely with
international reach, especially when views are included in online social interactions, are
a part of the package. The cyber risks are increasing drastically with modern cyberspace
as shown in the figure below:
Figure 1 Cyberspace malware growth (Source: PurpleSec)
2.5. Need of cyberspace
Cyberspace is a universe in its own right according to President Obama, a world that all
of mankind depends on to operate each and every day. According to him, cyberspace
is a combination of software and hardware that has become an integral part of many
people's everyday existence. In addition, a nation's infrastructure, including its schools,
hospitals, and companies, is wholly reliant on the internet. To put it another way,
cyberspace has brought together people from all walks of life in a way that is historically
significant.
Individuals are increasingly reliant on cyberspace for both standards and personal
activities because of its pervasiveness and the wide range of services it provides. Online
banking, marketing, and communication are all examples of this. In addition to affecting
the lifestyle of people, cyberspace is also permeating the operations of corporations and
governments alike. It is a technique of outlining one's own and one's employer's
standards of conduct. This has resulted in an ever-increasing dependence on
cyberspace.
2.6. Individual dependency on cyberspace
Online services were unavailable to Blackberry users throughout Europe, the Middle
East, and Africa in 2011. Due to Blackberry Research in Motion's technical difficulties,
this was not possible (RIM). As a result of this service interruption, Blackberry users
were unable to function normally. An unhappy Twitter user tweeted, "I may as well chop
one of my limbs off *mad face*" as a result of the unavailability of email, Twitter, and
BBM on a Blackberry cellphone. Users have gotten accustomed to internet services
and, in some cases, consider being online to be a vital part of their lives (Dlamini et al,
2011).
Addiction to cyberspace is possible from an interpersonal perspective. Excessive
Internet use has been linked to the development of Internet addiction. Addiction to the
Internet is caused by several causes, including the urge to use it and feelings of
depression while trying to limit one's usage of it.
Many people deny that they should be dependent on the Internet since they believe that
everyone else is online. The fact that many people only utilize it for work-related things
further aids their denial. Internet addiction is really not necessarily a result of relying on
the Internet to do particular activities. The physical method of doing things has become
obsolete because of the advantages of using cyberspace. As a result, individuals are
becoming more and more dependent on the internet, to the point of addiction.
Organizations are vulnerable to cyberspace reliance in the following area.
2.7. Organizational dependency on cyberspace
Transacting commerce of days is almost exclusively done electronically. As a result,
companies are now offering services that formerly required clients to visit a real place
on the internet. Some of these businesses rely solely on the Internet for delivery, while
others rely on the Internet to assist in their delivery. Organizations have become
increasingly dependent on cyberspace because of this. Regardless of whether it's used
for advertising and marketing or just to increase customer satisfaction, the internet is
laying the groundwork for new business models. Another benefit of using the Internet
for business is that it has shown to be a cost-effective way to expand an industry while
also reaching a global audience. In addition to banking, commerce, including airline
travel, the publishing, and media sectors are all represented on this network, which has
resulted in a great deal of innovation(Onuoha, 2014).
It is easy to think that internet banking has replaced face-to-face conversation because
of the way banks have embraced it. As an alternative, according to research, the
financial services business is strengthened and complemented by internet transactions.
Because of this, banks have been able to increase their offerings by transferring some
of their services online. The following benefits accrue to banks that utilize the internet
in addition to more traditional means of distribution:
 Improved customer service
 Improved usability
 Less time in the processing of transactions
 Strong customer relationships
These accomplishments are in keeping with the banks' strategic goal of utilizing the
Internet. Banking institutions, according to research in the UK, utilize the Internet for
such reasons listed:
 To ensure that the company's reputation for innovation is protected or enhanced
 To give clients with greater value
 To create an online service in the same manner as the competition.
 To cut expenditures
 As a means of exploring the possibility for mass customization
Airline operations and strategic management are increasingly dependent on the
Internet, according to a recent study. Customers' requirements and intragroup
collaboration may be met on a day-to-day basis with the help of the Internet. Among
other things, the Internet helps the industry by enabling internal processes securely and
efficiently.
2.8. Cyberspace risks
Nigeria's people's way of life has been fundamentally altered by the Internet. People
believe that every revolution brings three kinds of changes that include the positive, the
negative, and the plain hideous. At first glance, the benefits of cyberspace appear to
include great interaction, easy operations, socializing, enjoyment, and commerce. To
put it another way, the evil lies in the introduction of new and more sophisticated criminal
acts, which will be examined in-depth in this chapter. When things go out of hand owing
to variables like human conduct and a lack of law enforcement, they're called "the ugly".
There is a bad side to cyberspace, and it's there to stay. Because problems actually
exist in the real world, it's reasonable to assume that the internet will, too. This is mostly
due to the fact that the same individuals live in both the real world and the internet.
When it comes to the dark side of the internet, the worldwide reach and the hidden and
cross-border character of cyberspace serve simultaneously as an advantage and a
drawback (Quarshie et al., 2012). The following subsections detail a variety of dangers
that people, organizations, and countries may face.
2.8.1. Viruses
There are a variety of types of malware, including spyware and ransomware. In order
for malware to be launched, a user must click on a fake website or attachment.
According to Cisco, malware may restrict access and steal all of a user's personal
information once it has been enabled.
2.8.2. Disruption of Services
By overloading a computer or network, hackers can prevent it from responding to user
requests, which is known as a denial of service assault (DoS). Attacks on a computer
network are called distributed denial of service (DDoS). DoS attacks are frequently
carried out by launching a flood assault on the "handshake" procedure. Additionally,
some cybercriminals utilize the time when a network is down to launch other assaults.
Botnets, or "zombie systems," target and exceed a target's computing power. Detecting
botnets is difficult since they are spread out around the globe and difficult to track down.
2.8.3. Man in the Middle (MITM)
MITM attacks arise when a hacker enters a two-party operation in the middle. According
to Cisco, if the flow is disrupted, they may filter and take the information. MITM attacks
are common when visitors utilize public Wi-Fi networks that aren't secure. Using
malware, attackers get access to a target computer and use it to install dangerous
software and steal sensitive data.
2.8.4. Phishing
In order to deceive the recipient into sending an email and following the instructions
inside, phishing attempts employ bogus information, such as a message. According to
Cisco, the purpose is to steal personal information such as credit card and log-in
credentials or install malicious on the victim's laptop.
2.8.5. Injection of SQL Code
A cyber-attack known as a SQL injection occurs when malicious code is inserted into a
server that utilises SQL. When a server becomes infected, it starts leaking data. The
malicious code may be sent as easily as typing it into a search field on a susceptible
website.
2.8.6. Attacks on Passwords
As long as the hacker obtains the appropriate password, they may access a lot of
information. Hackers employ social engineering to lure individuals into violating security
protocols, according to Data Insider, which describes it as a " tactic cyber attackers
deploy that focuses primarily on human contact." Accessing a password database or
just guessing are two more methods of password assaults that could be used by an
attacker in the network.
The national security strategy of Nigeria stresses internal protection, Nigerian unity,
peace, and the development of global peace and security via collaboration,
nonintervention, dignity, respect, and value of humanity. A number of steps have been
put in place since Nigeria's political attainment of independence to guarantee that the
country is appropriately protected while also expanding its influence in Africa and
beyond. Of these objectives, the most important one is to safeguard the lives and
property of all citizens and other residents of the nation. Societal harmony, economic
well-being, and peaceful cohabitation among diverse peoples are all part of the plan.
In theory, Nigeria's defensive strategy is based on the belief that the acknowledgment
of human dignity, personal well-being, and economic success is more important than
any other problem. Although these beliefs and ideals were not adequately addressed
by policymakers, a significant security vacuum resulted in the civil war and more
recently with terrorism, community conflicts, domestic terrorism, rural robbery,
abduction, and cybercrime.
References
Oladeji, O.N., Enhancing Security Awareness and Political Stability via Francophone
Literature in Nigeria. Erudite, p.9.
Lebogang, V., Tabona, O. and Maupong, T., 2022. Evaluating Cybersecurity Strategies
in Africa. In Cybersecurity Capabilities in Developing Nations and Its Impact on Global
Security (pp. 1-19). IGI Global.
Abukari, A.M., Bankas, E.K. and Iddrisu, M.M., A Hybrid of two Homomorphic
Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data. International
Journal of Computer Applications, 975, p.8887.
Matusitz, J. and Ochoa, D., 2018. Agenda-Setting Theory in the US Media: A
Comparative Analysis of Terrorist Attacks in France and Nigeria. Global Media
Journal, 16(31), pp.1-6.
Lima, E., Moraes, J., Oliveira, H., Cerqueira, E., Zeadally, S. and Rosário, D., 2021.
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things
applications. Ad Hoc Networks, 122, p.102598.
Eyo Ate, B., 1983. The Presence of France in West-Central Africa as a Fundamental
Problem to Nigeria. Millennium, 12(2), pp.110-126.
Onuoha, F.C., 2014. A danger not to Nigeria alone: Boko Harams's transnational reach
and regional responses. Friedrich-Ebert-Stiftung Regional Office.
Adeola, G.L. and Fayomi, O.O., 2012. The political and security implications of cross
border migration between Nigeria and her francophone neighbours. International
Journal of social science tomorrow, 1(3), pp.1-9.
Alli, W.O., 2012. The role of Nigeria in regional security policy. Friedrich-Ebert-Stiftung,
Regional Office Abuja.
Dlamini, I.Z., Taute, B. and Radebe, J., 2011. Framework for an African policy towards
creating cyber security awareness.
Onuoha, F., 2014. Boko Haram and the evolving Salafi Jihadist threat in Nigeria. Boko
Haram: Islamism, politics, security and the state in Nigeria, 2, p.158.
Quarshie, H.O. and Martin-Odoom, A., 2012. Fighting cybercrime in Africa. Computer
Science and Engineering, 2(6), pp.98-100.

Mais conteúdo relacionado

Mais procurados

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1Syed Mustafa
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research DirectionsDavide Nardone
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 

Mais procurados (20)

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
188
188188
188
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 

Semelhante a Chapter-2.docx

THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxoreo10
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harshaHARSHA DURUGOJI
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 

Semelhante a Chapter-2.docx (20)

THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Internet(2)
Internet(2)Internet(2)
Internet(2)
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
Research Paper
Research PaperResearch Paper
Research Paper
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 

Último

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Último (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Chapter-2.docx

  • 1. Table of Contents 2. Literature review.................................................................................................................... 2 2.1. Revolution of internet........................................................................................................ 3 2.1.1. Internet of Things ....................................................................................................... 4 2.1.2. The Stream of Information........................................................................................ 5 2.2. Laws for internet in the United States ............................................................................ 5 2.3. Laws for internet in France .............................................................................................. 5 2.4. Modern time cyberspace.................................................................................................. 6 2.5. Need of cyberspace.......................................................................................................... 7 2.6. Individual dependency on cyberspace........................................................................... 8 2.7. Organizational dependency on cyberspace.................................................................. 9 2.8. Cyberspace risks............................................................................................................. 10 2.8.1. Viruses....................................................................................................................... 10 2.8.2. Disruption of Services ............................................................................................. 11 2.8.3. Man in the Middle (MITM)....................................................................................... 11 2.8.4. Phishing..................................................................................................................... 11 2.8.5. Injection of SQL Code ............................................................................................. 11 2.8.6. Attacks on Passwords............................................................................................. 12
  • 2. Chapter 2 2. Literature review Companies and people in Nigeria are increasingly concerned about cybersecurity as they implement digital transformation to enhance growth and efficiency by relying on cutting-edge technology. Many organizations are also becoming more reliant on outside providers or initiatives to enhance business operations. Despite the fact that third-party consultants may contribute to greater success for the organization, they also bring new threats and expand the risks (Oladeji, n.d.). One of the most common blunders firms make is failing to recognize the added risk that these resources are going to entail. Businesses in Nigeria will be able to manage and mitigate risks more effectively during the covid-19 epidemic if everyone knows what to look for and what to do in the event of a pandemic that causes security risks for online working. Individuals need to know the difference between information system security and cyber risks in order to assess their own company's readiness. As defined by Khan et al., cybersecurity is a method for guarding against digital attacks on systems, networks, and programs (2020). ITU 2020 defined cybersecurity as a collection of instruments, policies, security ideas and guidelines, methods to risk management systems, and technology for safeguarding users' information and organizations in the cyber environment from cyber threats (Lebogang et al., 2022). Abukari & Bankas (2020) have shown that unsupported standards for information systems and poor data management methods contribute to cybersecurity risks. Workers' unethical behavior contributes to security breaches since they are aware of the shortcomings in their companies' cybersecurity governance structures. Vlachos (2011) stated that the most devastating assaults occur when employees hand over sensitive information to hackers. Security breaches can be exacerbated by employees utilizing several devices to connect to a workplace network, which can be shared with friends and family in some cases.
  • 3. During the Cold War, in the 1970s and 1980s, a new breed of criminal emerged: cybercrime. While nation-states were engaged in ideological battles, the majority of cybercrime was centered on attacks on competitor nations' computer systems. Hackers working for governments accessed sensitive information on nuclear proliferation, intelligence gathering, and foreign policy (Eyo, 1983). An individual hacker attack on important national facilities and financial institutions was also taking place, with the goal of stealing money and causing destruction. After the fall of the Soviet Union, however, cybercrime became significantly more widespread, dynamic, and ubiquitous in terms of its extent and pervasiveness. Users of the network routinely circumvent the security protocol that stops them from accessing hazardous websites. They put the organization's network at risk of viruses and data breaches by engaging in this ill-advised activity. As more people use public Wi-Fi, this danger becomes more apparent (Matusitz and Ochoa, 2018). An investigation has found that WIFI's security is unsure and known for its weaknesses, which are not only dangerous for personal devices but could also have a big financial impact on businesses. Research suggests that hackers may be motivated to commit crimes related to cyberattacks and threats to health data because there are health information buyers. Patients' confidential information is widely available for sale at health care institutions. Credit cards, complete names, identities, payment histories, and COVID-19 information are all included in the data, making it valuable to thieves. In addition, the proliferation of medical devices has made it more difficult to maintain security against cyberattacks and threats. Due to the high workloads of healthcare professionals, IT professionals are sometimes left in charge of guarding an entire physical network against cyber-attacks in underdeveloped countries. 2.1. Revolution of internet The first presentation of the Internet, the connection of systems, took place in October 1976 at the inaugural Conference Held on Computer Networks in Washington, D.C. The US Department of Defense (DOD) developed a network that networked computers and
  • 4. sustained data flow over a substantial distance with this device. ARPANET became truly revolutionary, and it allowed computers of different sorts to communicate with each other across long distances. At the time, the capacity to send data across long distances was not yet known. ARPANET was designed to keep the United States informed of its military adversaries. A primary goal of the system was to allow computers all around the country to work collaboratively and exchange data. There were only four computers connected to ARPANET at the time, all of which belonged to military university labs engaged in defense-related research. As ARPANET's reach grew, so did its structure, evolving to meet the new demands. Other networks linked to ARPANET were soon sponsored by the US National Science Foundation (NSF). These additional networks were purpose-driven, much like ARPANET. As an example of such a network, NSFNET was designed to allow all members of the educational community to access ARPANET. A Protocol Broadcasting Station and other networks were later joined to ARPANET, making it the first packet- switching network (Lima et al., 2021). Due to constraints in the Internet Protocol, which was utilized to allow host-to-host communication, Transmission Control and Internet Protocol were introduced. While more and more networks were connected, new protocols and technologies were developed. As the network grew, infrastructure difficulties arose. A number of internet rules and regulations are in place in developed nations like the United States and France to keep hackers at bay. When it comes to cyber security, things are always changing as the internet and digital activities grow and change. Those who research cyber security are increasingly focusing on the following two areas: 2.1.1. Internet of Things Hackers can get access to a system using a device that is connected to the internet or another network. Home automation and industrial IoT gadgets, including smartphones, virtual assistants, linked baby monitoring, and cellphones, are progressively being attacked by hackers in 2019. Hackers who securely connect to a connected living area
  • 5. with Wi-Fi passwords may also acquire access to users' private details, such as health records, financial records, and internet log-in information. 2.1.2. The Stream of Information It is simpler for hackers to get access to a network through a personal device like a laptop or mobile phone because of data storage on these devices. For example, former U.S. Director of Domestic Security Michael Chertoff cautions claims that the Cyber Security in the Digital Environment has become increasingly exposed to cyber assaults. Therefore, businesses and government organizations must ensure that their data and operations are safe from cyberattacks. Cyber security experts need to know how to deal with the most recent and emerging cyber threats. 2.2. Laws for the internet in the United States The Federal Communications Commission (FCC) governs all electronic communications in the United States. There are few restrictions on content in the United States, in accordance with the First Establishment clause free speech premise. However, this does not imply that there are no Internet rules in the United States. The Internet is most strictly regulated in the United States. That it has laws with such broad meanings means that the Internet can be seized even if no revisions are made. If you're a computer user in the United States, for example, you may face jail time for sending or receiving pornographic material. In the course of a three-year campaign that began in 1993, the Federal Bureau of Investigation made 80 arrests, 66 convictions, and conducted over 200 searches. Because the telephone and computer, both of which are important components of today's Internet, were first developed in America it isn't unexpected that this level of complexity is found in the US (Onuoha, 2014). 2.3. Laws for internet in France Attempts have been made in France to control the Internet by means of a Minitel law enforcement tool. France Telecom has proposed utilizing Minitel inspectors to roam the Minitel system to guarantee that information providers are adhering to their agreement with France Telecom. As a result, France will join the Communist bloc in the practice of
  • 6. manually inspecting the Internet. Since the French Council of Constitutional pronounced the policing mechanism unlawful for ambiguity, the legal status is currently unclear. The CST is in charge of overseeing France's widely utilized Minitel network. Using this organization, France Telecom may be sure that all content providers are abiding by the terms of their agreement (Adeola et al., 2012). Five to eight people at France Telecom are supposedly responsible for the surveillance role. Commissions on Net regulation were formed by the French government in early 1996. Self-filtering rather than filtering at the source was the key recommendation. It suggested international collaboration in policing the Internet when necessary, but only when it was absolutely essential. Recommendations were also made for rules aimed at increasing French online presence and language The new CST was expected to include Internet firms and professionals. As a "Minitel," the CST consists of 20 members from the ranks of the judiciary as well as government officials, representatives of France Telecom's subsidiary companies, and representatives of non-profit families and consumer groups. Individuals who fail to reply to the ban list of Web sites or communities will be held liable for what they convey. This statute, which gave censorship authority to the CST, was declared illegal. It's been decided to block 18 neo-Nazi and obscene newsgroups from their servers following the adoption of the legislation and the imprisonment of two French IAP managers, the French Association of Internet Professionals (AFPI), an Internet interest organization. An organization with only four members that claims to represent more than half of the population "IAPs were concerned that they may be held liable for the content they transmitted in France. Censorship is not an appropriate term to describe this prohibition, according to an official from the AFPI "A different Usenet server may be selected by any subscriber. 2.4. Modern time cyberspace Conceptually, cyberspace refers to digital technology that is widely distributed and linked together. As far back as the first century of the internet's spread, the term alludes to the online realm as a world different from the actual world. It is possible for people to
  • 7. socialize, share information, do commerce, play games, and participate in political discussions over this worldwide network. The word "cyberspace" is now often used to describe everything having to do with the online platform and the wide variety of cultures that exist on it. Technology infrastructures that operate through this medium are included in the US national critical infrastructure, according to government officials in Washington, D.C. Individuals in cyberspace adhere to a set of common principles and ethics known as "cyberethics," which they consider to be mutually beneficial for everyone involved. Privacy is viewed as the most crucial component of a working code of cyberethics by many (Alli, 2012). The moral duties of working remotely with international reach, especially when views are included in online social interactions, are a part of the package. The cyber risks are increasing drastically with modern cyberspace as shown in the figure below: Figure 1 Cyberspace malware growth (Source: PurpleSec) 2.5. Need of cyberspace Cyberspace is a universe in its own right according to President Obama, a world that all of mankind depends on to operate each and every day. According to him, cyberspace is a combination of software and hardware that has become an integral part of many people's everyday existence. In addition, a nation's infrastructure, including its schools, hospitals, and companies, is wholly reliant on the internet. To put it another way,
  • 8. cyberspace has brought together people from all walks of life in a way that is historically significant. Individuals are increasingly reliant on cyberspace for both standards and personal activities because of its pervasiveness and the wide range of services it provides. Online banking, marketing, and communication are all examples of this. In addition to affecting the lifestyle of people, cyberspace is also permeating the operations of corporations and governments alike. It is a technique of outlining one's own and one's employer's standards of conduct. This has resulted in an ever-increasing dependence on cyberspace. 2.6. Individual dependency on cyberspace Online services were unavailable to Blackberry users throughout Europe, the Middle East, and Africa in 2011. Due to Blackberry Research in Motion's technical difficulties, this was not possible (RIM). As a result of this service interruption, Blackberry users were unable to function normally. An unhappy Twitter user tweeted, "I may as well chop one of my limbs off *mad face*" as a result of the unavailability of email, Twitter, and BBM on a Blackberry cellphone. Users have gotten accustomed to internet services and, in some cases, consider being online to be a vital part of their lives (Dlamini et al, 2011). Addiction to cyberspace is possible from an interpersonal perspective. Excessive Internet use has been linked to the development of Internet addiction. Addiction to the Internet is caused by several causes, including the urge to use it and feelings of depression while trying to limit one's usage of it. Many people deny that they should be dependent on the Internet since they believe that everyone else is online. The fact that many people only utilize it for work-related things further aids their denial. Internet addiction is really not necessarily a result of relying on the Internet to do particular activities. The physical method of doing things has become obsolete because of the advantages of using cyberspace. As a result, individuals are
  • 9. becoming more and more dependent on the internet, to the point of addiction. Organizations are vulnerable to cyberspace reliance in the following area. 2.7. Organizational dependency on cyberspace Transacting commerce of days is almost exclusively done electronically. As a result, companies are now offering services that formerly required clients to visit a real place on the internet. Some of these businesses rely solely on the Internet for delivery, while others rely on the Internet to assist in their delivery. Organizations have become increasingly dependent on cyberspace because of this. Regardless of whether it's used for advertising and marketing or just to increase customer satisfaction, the internet is laying the groundwork for new business models. Another benefit of using the Internet for business is that it has shown to be a cost-effective way to expand an industry while also reaching a global audience. In addition to banking, commerce, including airline travel, the publishing, and media sectors are all represented on this network, which has resulted in a great deal of innovation(Onuoha, 2014). It is easy to think that internet banking has replaced face-to-face conversation because of the way banks have embraced it. As an alternative, according to research, the financial services business is strengthened and complemented by internet transactions. Because of this, banks have been able to increase their offerings by transferring some of their services online. The following benefits accrue to banks that utilize the internet in addition to more traditional means of distribution:  Improved customer service  Improved usability  Less time in the processing of transactions  Strong customer relationships These accomplishments are in keeping with the banks' strategic goal of utilizing the Internet. Banking institutions, according to research in the UK, utilize the Internet for such reasons listed:
  • 10.  To ensure that the company's reputation for innovation is protected or enhanced  To give clients with greater value  To create an online service in the same manner as the competition.  To cut expenditures  As a means of exploring the possibility for mass customization Airline operations and strategic management are increasingly dependent on the Internet, according to a recent study. Customers' requirements and intragroup collaboration may be met on a day-to-day basis with the help of the Internet. Among other things, the Internet helps the industry by enabling internal processes securely and efficiently. 2.8. Cyberspace risks Nigeria's people's way of life has been fundamentally altered by the Internet. People believe that every revolution brings three kinds of changes that include the positive, the negative, and the plain hideous. At first glance, the benefits of cyberspace appear to include great interaction, easy operations, socializing, enjoyment, and commerce. To put it another way, the evil lies in the introduction of new and more sophisticated criminal acts, which will be examined in-depth in this chapter. When things go out of hand owing to variables like human conduct and a lack of law enforcement, they're called "the ugly". There is a bad side to cyberspace, and it's there to stay. Because problems actually exist in the real world, it's reasonable to assume that the internet will, too. This is mostly due to the fact that the same individuals live in both the real world and the internet. When it comes to the dark side of the internet, the worldwide reach and the hidden and cross-border character of cyberspace serve simultaneously as an advantage and a drawback (Quarshie et al., 2012). The following subsections detail a variety of dangers that people, organizations, and countries may face. 2.8.1. Viruses There are a variety of types of malware, including spyware and ransomware. In order for malware to be launched, a user must click on a fake website or attachment.
  • 11. According to Cisco, malware may restrict access and steal all of a user's personal information once it has been enabled. 2.8.2. Disruption of Services By overloading a computer or network, hackers can prevent it from responding to user requests, which is known as a denial of service assault (DoS). Attacks on a computer network are called distributed denial of service (DDoS). DoS attacks are frequently carried out by launching a flood assault on the "handshake" procedure. Additionally, some cybercriminals utilize the time when a network is down to launch other assaults. Botnets, or "zombie systems," target and exceed a target's computing power. Detecting botnets is difficult since they are spread out around the globe and difficult to track down. 2.8.3. Man in the Middle (MITM) MITM attacks arise when a hacker enters a two-party operation in the middle. According to Cisco, if the flow is disrupted, they may filter and take the information. MITM attacks are common when visitors utilize public Wi-Fi networks that aren't secure. Using malware, attackers get access to a target computer and use it to install dangerous software and steal sensitive data. 2.8.4. Phishing In order to deceive the recipient into sending an email and following the instructions inside, phishing attempts employ bogus information, such as a message. According to Cisco, the purpose is to steal personal information such as credit card and log-in credentials or install malicious on the victim's laptop. 2.8.5. Injection of SQL Code A cyber-attack known as a SQL injection occurs when malicious code is inserted into a server that utilises SQL. When a server becomes infected, it starts leaking data. The malicious code may be sent as easily as typing it into a search field on a susceptible website.
  • 12. 2.8.6. Attacks on Passwords As long as the hacker obtains the appropriate password, they may access a lot of information. Hackers employ social engineering to lure individuals into violating security protocols, according to Data Insider, which describes it as a " tactic cyber attackers deploy that focuses primarily on human contact." Accessing a password database or just guessing are two more methods of password assaults that could be used by an attacker in the network. The national security strategy of Nigeria stresses internal protection, Nigerian unity, peace, and the development of global peace and security via collaboration, nonintervention, dignity, respect, and value of humanity. A number of steps have been put in place since Nigeria's political attainment of independence to guarantee that the country is appropriately protected while also expanding its influence in Africa and beyond. Of these objectives, the most important one is to safeguard the lives and property of all citizens and other residents of the nation. Societal harmony, economic well-being, and peaceful cohabitation among diverse peoples are all part of the plan. In theory, Nigeria's defensive strategy is based on the belief that the acknowledgment of human dignity, personal well-being, and economic success is more important than any other problem. Although these beliefs and ideals were not adequately addressed by policymakers, a significant security vacuum resulted in the civil war and more recently with terrorism, community conflicts, domestic terrorism, rural robbery, abduction, and cybercrime.
  • 13. References Oladeji, O.N., Enhancing Security Awareness and Political Stability via Francophone Literature in Nigeria. Erudite, p.9. Lebogang, V., Tabona, O. and Maupong, T., 2022. Evaluating Cybersecurity Strategies in Africa. In Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (pp. 1-19). IGI Global. Abukari, A.M., Bankas, E.K. and Iddrisu, M.M., A Hybrid of two Homomorphic Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data. International Journal of Computer Applications, 975, p.8887. Matusitz, J. and Ochoa, D., 2018. Agenda-Setting Theory in the US Media: A Comparative Analysis of Terrorist Attacks in France and Nigeria. Global Media Journal, 16(31), pp.1-6. Lima, E., Moraes, J., Oliveira, H., Cerqueira, E., Zeadally, S. and Rosário, D., 2021. Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications. Ad Hoc Networks, 122, p.102598. Eyo Ate, B., 1983. The Presence of France in West-Central Africa as a Fundamental Problem to Nigeria. Millennium, 12(2), pp.110-126. Onuoha, F.C., 2014. A danger not to Nigeria alone: Boko Harams's transnational reach and regional responses. Friedrich-Ebert-Stiftung Regional Office. Adeola, G.L. and Fayomi, O.O., 2012. The political and security implications of cross border migration between Nigeria and her francophone neighbours. International Journal of social science tomorrow, 1(3), pp.1-9. Alli, W.O., 2012. The role of Nigeria in regional security policy. Friedrich-Ebert-Stiftung, Regional Office Abuja.
  • 14. Dlamini, I.Z., Taute, B. and Radebe, J., 2011. Framework for an African policy towards creating cyber security awareness. Onuoha, F., 2014. Boko Haram and the evolving Salafi Jihadist threat in Nigeria. Boko Haram: Islamism, politics, security and the state in Nigeria, 2, p.158. Quarshie, H.O. and Martin-Odoom, A., 2012. Fighting cybercrime in Africa. Computer Science and Engineering, 2(6), pp.98-100.