Judging the Relevance and worth of ideas part 2.pptx
Chapter-2.docx
1. Table of Contents
2. Literature review.................................................................................................................... 2
2.1. Revolution of internet........................................................................................................ 3
2.1.1. Internet of Things ....................................................................................................... 4
2.1.2. The Stream of Information........................................................................................ 5
2.2. Laws for internet in the United States ............................................................................ 5
2.3. Laws for internet in France .............................................................................................. 5
2.4. Modern time cyberspace.................................................................................................. 6
2.5. Need of cyberspace.......................................................................................................... 7
2.6. Individual dependency on cyberspace........................................................................... 8
2.7. Organizational dependency on cyberspace.................................................................. 9
2.8. Cyberspace risks............................................................................................................. 10
2.8.1. Viruses....................................................................................................................... 10
2.8.2. Disruption of Services ............................................................................................. 11
2.8.3. Man in the Middle (MITM)....................................................................................... 11
2.8.4. Phishing..................................................................................................................... 11
2.8.5. Injection of SQL Code ............................................................................................. 11
2.8.6. Attacks on Passwords............................................................................................. 12
2. Chapter 2
2. Literature review
Companies and people in Nigeria are increasingly concerned about cybersecurity as
they implement digital transformation to enhance growth and efficiency by relying on
cutting-edge technology. Many organizations are also becoming more reliant on outside
providers or initiatives to enhance business operations. Despite the fact that third-party
consultants may contribute to greater success for the organization, they also bring new
threats and expand the risks (Oladeji, n.d.). One of the most common blunders firms
make is failing to recognize the added risk that these resources are going to entail.
Businesses in Nigeria will be able to manage and mitigate risks more effectively during
the covid-19 epidemic if everyone knows what to look for and what to do in the event of
a pandemic that causes security risks for online working.
Individuals need to know the difference between information system security and cyber
risks in order to assess their own company's readiness. As defined by Khan et al.,
cybersecurity is a method for guarding against digital attacks on systems, networks, and
programs (2020). ITU 2020 defined cybersecurity as a collection of instruments,
policies, security ideas and guidelines, methods to risk management systems, and
technology for safeguarding users' information and organizations in the cyber
environment from cyber threats (Lebogang et al., 2022).
Abukari & Bankas (2020) have shown that unsupported standards for information
systems and poor data management methods contribute to cybersecurity risks.
Workers' unethical behavior contributes to security breaches since they are aware of
the shortcomings in their companies' cybersecurity governance structures. Vlachos
(2011) stated that the most devastating assaults occur when employees hand over
sensitive information to hackers. Security breaches can be exacerbated by employees
utilizing several devices to connect to a workplace network, which can be shared with
friends and family in some cases.
3. During the Cold War, in the 1970s and 1980s, a new breed of criminal emerged:
cybercrime. While nation-states were engaged in ideological battles, the majority of
cybercrime was centered on attacks on competitor nations' computer systems. Hackers
working for governments accessed sensitive information on nuclear proliferation,
intelligence gathering, and foreign policy (Eyo, 1983). An individual hacker attack on
important national facilities and financial institutions was also taking place, with the goal
of stealing money and causing destruction. After the fall of the Soviet Union, however,
cybercrime became significantly more widespread, dynamic, and ubiquitous in terms of
its extent and pervasiveness.
Users of the network routinely circumvent the security protocol that stops them from
accessing hazardous websites. They put the organization's network at risk of viruses
and data breaches by engaging in this ill-advised activity. As more people use public
Wi-Fi, this danger becomes more apparent (Matusitz and Ochoa, 2018). An
investigation has found that WIFI's security is unsure and known for its weaknesses,
which are not only dangerous for personal devices but could also have a big financial
impact on businesses.
Research suggests that hackers may be motivated to commit crimes related to
cyberattacks and threats to health data because there are health information buyers.
Patients' confidential information is widely available for sale at health care institutions.
Credit cards, complete names, identities, payment histories, and COVID-19 information
are all included in the data, making it valuable to thieves. In addition, the proliferation of
medical devices has made it more difficult to maintain security against cyberattacks and
threats. Due to the high workloads of healthcare professionals, IT professionals are
sometimes left in charge of guarding an entire physical network against cyber-attacks
in underdeveloped countries.
2.1. Revolution of internet
The first presentation of the Internet, the connection of systems, took place in October
1976 at the inaugural Conference Held on Computer Networks in Washington, D.C. The
US Department of Defense (DOD) developed a network that networked computers and
4. sustained data flow over a substantial distance with this device. ARPANET became
truly revolutionary, and it allowed computers of different sorts to communicate with each
other across long distances. At the time, the capacity to send data across long distances
was not yet known. ARPANET was designed to keep the United States informed of its
military adversaries. A primary goal of the system was to allow computers all around
the country to work collaboratively and exchange data. There were only four computers
connected to ARPANET at the time, all of which belonged to military university labs
engaged in defense-related research.
As ARPANET's reach grew, so did its structure, evolving to meet the new demands.
Other networks linked to ARPANET were soon sponsored by the US National Science
Foundation (NSF). These additional networks were purpose-driven, much like
ARPANET. As an example of such a network, NSFNET was designed to allow all
members of the educational community to access ARPANET. A Protocol Broadcasting
Station and other networks were later joined to ARPANET, making it the first packet-
switching network (Lima et al., 2021). Due to constraints in the Internet Protocol, which
was utilized to allow host-to-host communication, Transmission Control and Internet
Protocol were introduced. While more and more networks were connected, new
protocols and technologies were developed. As the network grew, infrastructure
difficulties arose. A number of internet rules and regulations are in place in developed
nations like the United States and France to keep hackers at bay.
When it comes to cyber security, things are always changing as the internet and digital
activities grow and change. Those who research cyber security are increasingly
focusing on the following two areas:
2.1.1. Internet of Things
Hackers can get access to a system using a device that is connected to the internet or
another network. Home automation and industrial IoT gadgets, including smartphones,
virtual assistants, linked baby monitoring, and cellphones, are progressively being
attacked by hackers in 2019. Hackers who securely connect to a connected living area
5. with Wi-Fi passwords may also acquire access to users' private details, such as health
records, financial records, and internet log-in information.
2.1.2. The Stream of Information
It is simpler for hackers to get access to a network through a personal device like a
laptop or mobile phone because of data storage on these devices. For example, former
U.S. Director of Domestic Security Michael Chertoff cautions claims that the Cyber
Security in the Digital Environment has become increasingly exposed to cyber assaults.
Therefore, businesses and government organizations must ensure that their data and
operations are safe from cyberattacks. Cyber security experts need to know how to deal
with the most recent and emerging cyber threats.
2.2. Laws for the internet in the United States
The Federal Communications Commission (FCC) governs all electronic
communications in the United States. There are few restrictions on content in the United
States, in accordance with the First Establishment clause free speech premise.
However, this does not imply that there are no Internet rules in the United States. The
Internet is most strictly regulated in the United States. That it has laws with such broad
meanings means that the Internet can be seized even if no revisions are made. If you're
a computer user in the United States, for example, you may face jail time for sending or
receiving pornographic material. In the course of a three-year campaign that began in
1993, the Federal Bureau of Investigation made 80 arrests, 66 convictions, and
conducted over 200 searches. Because the telephone and computer, both of which are
important components of today's Internet, were first developed in America it isn't
unexpected that this level of complexity is found in the US (Onuoha, 2014).
2.3. Laws for internet in France
Attempts have been made in France to control the Internet by means of a Minitel law
enforcement tool. France Telecom has proposed utilizing Minitel inspectors to roam the
Minitel system to guarantee that information providers are adhering to their agreement
with France Telecom. As a result, France will join the Communist bloc in the practice of
6. manually inspecting the Internet. Since the French Council of Constitutional pronounced
the policing mechanism unlawful for ambiguity, the legal status is currently unclear. The
CST is in charge of overseeing France's widely utilized Minitel network. Using this
organization, France Telecom may be sure that all content providers are abiding by the
terms of their agreement (Adeola et al., 2012). Five to eight people at France Telecom
are supposedly responsible for the surveillance role. Commissions on Net regulation
were formed by the French government in early 1996. Self-filtering rather than filtering
at the source was the key recommendation. It suggested international collaboration in
policing the Internet when necessary, but only when it was absolutely essential.
Recommendations were also made for rules aimed at increasing French online
presence and language
The new CST was expected to include Internet firms and professionals. As a "Minitel,"
the CST consists of 20 members from the ranks of the judiciary as well as government
officials, representatives of France Telecom's subsidiary companies, and
representatives of non-profit families and consumer groups. Individuals who fail to reply
to the ban list of Web sites or communities will be held liable for what they convey. This
statute, which gave censorship authority to the CST, was declared illegal. It's been
decided to block 18 neo-Nazi and obscene newsgroups from their servers following the
adoption of the legislation and the imprisonment of two French IAP managers, the
French Association of Internet Professionals (AFPI), an Internet interest organization.
An organization with only four members that claims to represent more than half of the
population "IAPs were concerned that they may be held liable for the content they
transmitted in France. Censorship is not an appropriate term to describe this prohibition,
according to an official from the AFPI "A different Usenet server may be selected by any
subscriber.
2.4. Modern time cyberspace
Conceptually, cyberspace refers to digital technology that is widely distributed and
linked together. As far back as the first century of the internet's spread, the term alludes
to the online realm as a world different from the actual world. It is possible for people to
7. socialize, share information, do commerce, play games, and participate in political
discussions over this worldwide network. The word "cyberspace" is now often used to
describe everything having to do with the online platform and the wide variety of cultures
that exist on it. Technology infrastructures that operate through this medium are
included in the US national critical infrastructure, according to government officials in
Washington, D.C. Individuals in cyberspace adhere to a set of common principles and
ethics known as "cyberethics," which they consider to be mutually beneficial for
everyone involved. Privacy is viewed as the most crucial component of a working code
of cyberethics by many (Alli, 2012). The moral duties of working remotely with
international reach, especially when views are included in online social interactions, are
a part of the package. The cyber risks are increasing drastically with modern cyberspace
as shown in the figure below:
Figure 1 Cyberspace malware growth (Source: PurpleSec)
2.5. Need of cyberspace
Cyberspace is a universe in its own right according to President Obama, a world that all
of mankind depends on to operate each and every day. According to him, cyberspace
is a combination of software and hardware that has become an integral part of many
people's everyday existence. In addition, a nation's infrastructure, including its schools,
hospitals, and companies, is wholly reliant on the internet. To put it another way,
8. cyberspace has brought together people from all walks of life in a way that is historically
significant.
Individuals are increasingly reliant on cyberspace for both standards and personal
activities because of its pervasiveness and the wide range of services it provides. Online
banking, marketing, and communication are all examples of this. In addition to affecting
the lifestyle of people, cyberspace is also permeating the operations of corporations and
governments alike. It is a technique of outlining one's own and one's employer's
standards of conduct. This has resulted in an ever-increasing dependence on
cyberspace.
2.6. Individual dependency on cyberspace
Online services were unavailable to Blackberry users throughout Europe, the Middle
East, and Africa in 2011. Due to Blackberry Research in Motion's technical difficulties,
this was not possible (RIM). As a result of this service interruption, Blackberry users
were unable to function normally. An unhappy Twitter user tweeted, "I may as well chop
one of my limbs off *mad face*" as a result of the unavailability of email, Twitter, and
BBM on a Blackberry cellphone. Users have gotten accustomed to internet services
and, in some cases, consider being online to be a vital part of their lives (Dlamini et al,
2011).
Addiction to cyberspace is possible from an interpersonal perspective. Excessive
Internet use has been linked to the development of Internet addiction. Addiction to the
Internet is caused by several causes, including the urge to use it and feelings of
depression while trying to limit one's usage of it.
Many people deny that they should be dependent on the Internet since they believe that
everyone else is online. The fact that many people only utilize it for work-related things
further aids their denial. Internet addiction is really not necessarily a result of relying on
the Internet to do particular activities. The physical method of doing things has become
obsolete because of the advantages of using cyberspace. As a result, individuals are
9. becoming more and more dependent on the internet, to the point of addiction.
Organizations are vulnerable to cyberspace reliance in the following area.
2.7. Organizational dependency on cyberspace
Transacting commerce of days is almost exclusively done electronically. As a result,
companies are now offering services that formerly required clients to visit a real place
on the internet. Some of these businesses rely solely on the Internet for delivery, while
others rely on the Internet to assist in their delivery. Organizations have become
increasingly dependent on cyberspace because of this. Regardless of whether it's used
for advertising and marketing or just to increase customer satisfaction, the internet is
laying the groundwork for new business models. Another benefit of using the Internet
for business is that it has shown to be a cost-effective way to expand an industry while
also reaching a global audience. In addition to banking, commerce, including airline
travel, the publishing, and media sectors are all represented on this network, which has
resulted in a great deal of innovation(Onuoha, 2014).
It is easy to think that internet banking has replaced face-to-face conversation because
of the way banks have embraced it. As an alternative, according to research, the
financial services business is strengthened and complemented by internet transactions.
Because of this, banks have been able to increase their offerings by transferring some
of their services online. The following benefits accrue to banks that utilize the internet
in addition to more traditional means of distribution:
Improved customer service
Improved usability
Less time in the processing of transactions
Strong customer relationships
These accomplishments are in keeping with the banks' strategic goal of utilizing the
Internet. Banking institutions, according to research in the UK, utilize the Internet for
such reasons listed:
10. To ensure that the company's reputation for innovation is protected or enhanced
To give clients with greater value
To create an online service in the same manner as the competition.
To cut expenditures
As a means of exploring the possibility for mass customization
Airline operations and strategic management are increasingly dependent on the
Internet, according to a recent study. Customers' requirements and intragroup
collaboration may be met on a day-to-day basis with the help of the Internet. Among
other things, the Internet helps the industry by enabling internal processes securely and
efficiently.
2.8. Cyberspace risks
Nigeria's people's way of life has been fundamentally altered by the Internet. People
believe that every revolution brings three kinds of changes that include the positive, the
negative, and the plain hideous. At first glance, the benefits of cyberspace appear to
include great interaction, easy operations, socializing, enjoyment, and commerce. To
put it another way, the evil lies in the introduction of new and more sophisticated criminal
acts, which will be examined in-depth in this chapter. When things go out of hand owing
to variables like human conduct and a lack of law enforcement, they're called "the ugly".
There is a bad side to cyberspace, and it's there to stay. Because problems actually
exist in the real world, it's reasonable to assume that the internet will, too. This is mostly
due to the fact that the same individuals live in both the real world and the internet.
When it comes to the dark side of the internet, the worldwide reach and the hidden and
cross-border character of cyberspace serve simultaneously as an advantage and a
drawback (Quarshie et al., 2012). The following subsections detail a variety of dangers
that people, organizations, and countries may face.
2.8.1. Viruses
There are a variety of types of malware, including spyware and ransomware. In order
for malware to be launched, a user must click on a fake website or attachment.
11. According to Cisco, malware may restrict access and steal all of a user's personal
information once it has been enabled.
2.8.2. Disruption of Services
By overloading a computer or network, hackers can prevent it from responding to user
requests, which is known as a denial of service assault (DoS). Attacks on a computer
network are called distributed denial of service (DDoS). DoS attacks are frequently
carried out by launching a flood assault on the "handshake" procedure. Additionally,
some cybercriminals utilize the time when a network is down to launch other assaults.
Botnets, or "zombie systems," target and exceed a target's computing power. Detecting
botnets is difficult since they are spread out around the globe and difficult to track down.
2.8.3. Man in the Middle (MITM)
MITM attacks arise when a hacker enters a two-party operation in the middle. According
to Cisco, if the flow is disrupted, they may filter and take the information. MITM attacks
are common when visitors utilize public Wi-Fi networks that aren't secure. Using
malware, attackers get access to a target computer and use it to install dangerous
software and steal sensitive data.
2.8.4. Phishing
In order to deceive the recipient into sending an email and following the instructions
inside, phishing attempts employ bogus information, such as a message. According to
Cisco, the purpose is to steal personal information such as credit card and log-in
credentials or install malicious on the victim's laptop.
2.8.5. Injection of SQL Code
A cyber-attack known as a SQL injection occurs when malicious code is inserted into a
server that utilises SQL. When a server becomes infected, it starts leaking data. The
malicious code may be sent as easily as typing it into a search field on a susceptible
website.
12. 2.8.6. Attacks on Passwords
As long as the hacker obtains the appropriate password, they may access a lot of
information. Hackers employ social engineering to lure individuals into violating security
protocols, according to Data Insider, which describes it as a " tactic cyber attackers
deploy that focuses primarily on human contact." Accessing a password database or
just guessing are two more methods of password assaults that could be used by an
attacker in the network.
The national security strategy of Nigeria stresses internal protection, Nigerian unity,
peace, and the development of global peace and security via collaboration,
nonintervention, dignity, respect, and value of humanity. A number of steps have been
put in place since Nigeria's political attainment of independence to guarantee that the
country is appropriately protected while also expanding its influence in Africa and
beyond. Of these objectives, the most important one is to safeguard the lives and
property of all citizens and other residents of the nation. Societal harmony, economic
well-being, and peaceful cohabitation among diverse peoples are all part of the plan.
In theory, Nigeria's defensive strategy is based on the belief that the acknowledgment
of human dignity, personal well-being, and economic success is more important than
any other problem. Although these beliefs and ideals were not adequately addressed
by policymakers, a significant security vacuum resulted in the civil war and more
recently with terrorism, community conflicts, domestic terrorism, rural robbery,
abduction, and cybercrime.
13. References
Oladeji, O.N., Enhancing Security Awareness and Political Stability via Francophone
Literature in Nigeria. Erudite, p.9.
Lebogang, V., Tabona, O. and Maupong, T., 2022. Evaluating Cybersecurity Strategies
in Africa. In Cybersecurity Capabilities in Developing Nations and Its Impact on Global
Security (pp. 1-19). IGI Global.
Abukari, A.M., Bankas, E.K. and Iddrisu, M.M., A Hybrid of two Homomorphic
Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data. International
Journal of Computer Applications, 975, p.8887.
Matusitz, J. and Ochoa, D., 2018. Agenda-Setting Theory in the US Media: A
Comparative Analysis of Terrorist Attacks in France and Nigeria. Global Media
Journal, 16(31), pp.1-6.
Lima, E., Moraes, J., Oliveira, H., Cerqueira, E., Zeadally, S. and Rosário, D., 2021.
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things
applications. Ad Hoc Networks, 122, p.102598.
Eyo Ate, B., 1983. The Presence of France in West-Central Africa as a Fundamental
Problem to Nigeria. Millennium, 12(2), pp.110-126.
Onuoha, F.C., 2014. A danger not to Nigeria alone: Boko Harams's transnational reach
and regional responses. Friedrich-Ebert-Stiftung Regional Office.
Adeola, G.L. and Fayomi, O.O., 2012. The political and security implications of cross
border migration between Nigeria and her francophone neighbours. International
Journal of social science tomorrow, 1(3), pp.1-9.
Alli, W.O., 2012. The role of Nigeria in regional security policy. Friedrich-Ebert-Stiftung,
Regional Office Abuja.
14. Dlamini, I.Z., Taute, B. and Radebe, J., 2011. Framework for an African policy towards
creating cyber security awareness.
Onuoha, F., 2014. Boko Haram and the evolving Salafi Jihadist threat in Nigeria. Boko
Haram: Islamism, politics, security and the state in Nigeria, 2, p.158.
Quarshie, H.O. and Martin-Odoom, A., 2012. Fighting cybercrime in Africa. Computer
Science and Engineering, 2(6), pp.98-100.