Advertisement

Cybersecurity and Mobile Device Forensic

  • Aamo IorliamEmail author
Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

Issues relating to cybersecurity and its challenges in Nigeria can be traced as far back as the provision of Internet services to Nigerians in 1996. Nigerians are known for the huge frauds they commit using the Internet. This chapter treats cybersecurity challenges/conflicts history in Nigeria. Furthermore, it looks at the relevant laws guiding against cyber crimes in Nigeria. Lastly, the need for embracing cybersecurity and mobile device forensics is encouraged.

Keywords

Cybersecurity Mobile device Internet fraud 

References

  1. 1.
    Difenda (2018) What is the cia triangle and why is it important for cybersecurity management?, says NCC. https://www.difenda.com/blog/what-is-the-cia-triangle-and-why-is-it-important-for-cybersecurity-management. Accessed 11 Jan 2019
  2. 2.
    Houmb S H, Sallhammar K (2005) Modeling system integrity of a security critical system using colored petri nets. WIT Transactions on The Built Environment, 82. https://www.witpress.com/Secure/elibrary/papers/SAFE05/SAFE05001FU.pdf. Accessed 11 Jan 2019
  3. 3.
    Vanguard (2017) Nigeria 3rd in global internet crimes behind UK, US, says NCC. https://www.vanguardngr.com/2017/08/nigeria-3rd-global-internet-crimes-behind-uk-u-s-says-ncc/. Accessed 11 Jan 2019
  4. 4.
    The Statictica (2017) Countries with the highest number of internet users as of december 2017 (in millions). https://www.statista.com/statistics/262966/number-of-internet-users-in-selected-countries/. Accessed 11 Jan 2019
  5. 5.
    worldometers (2019) Current world population. http://www.worldometers.info/world-population/. Accessed 11 Jan 2019
  6. 6.
    Bainbridge D (2008) Introduction to information technology law. Longman, UKGoogle Scholar
  7. 7.
    Evidence Act (2011) Explanatory memorandum. http://resourcedat.com/wp-content/uploads/2012/01/Evidence_Act_2011.pdf. Accessed 11 Jan 2019
  8. 8.
    Iorliam A, James A (2013) Fraudulent activities using virtual meetings. Int J Comput Sci Eng 5(5):409Google Scholar
  9. 9.
    Trading economics (2019) Nigeria unemployment rate. https://tradingeconomics.com/nigeria/unemployment-rate. Accessed 12 Jan 2019
  10. 10.
    Farjamfar A, Abdullah MT, Mahmod R, Udzir NI (2014) A review on mobile devices digital forensic process models. Res J Appl Sci Eng Technol 8(3):358–66CrossRefGoogle Scholar
  11. 11.
    Iorliam A (2018) Fundamental computing forensics for Africa: a case study of the science in Nigeria. Springer, ChamGoogle Scholar
  12. 12.
    cellebrite (n.d.). Digital intelligence for a safer world. https://www.cellebrite.com/en/home/. Accessed 12 Jan 2019
  13. 13.
    J. Bergerson (2017) Mobile phone forensics: understanding cellebrite extraction reports.https://www.iltanet.org/blogs/jason-bergerson/2017/03/17/mobile-phone-forensics-understanding-cellebrite-extraction-reports?ssopc=1. Accessed 24 Jan 2019
  14. 14.
    XACT. XACTMobile phone investigations go deeper. http://www.veille.ma/IMG/pdf/xact-datasheet.pdf. Accessed 24 Jan 2019
  15. 15.
    Paraben device seizure (2011) Android forensic techniques. https://www.sciencedirect.com/topics/computer-science/paraben-device-seizure. Accessed 24 Jan 2019
  16. 16.
    Pearson S, Watson R (2010) Digital triage forensics: processing the digital crime scene. Syngress, USGoogle Scholar
  17. 17.
    Mobile forensics central (2012). http://mobileforensicscentral.com/mfc/. Accessed 24 Jan 2019
  18. 18.
    bitpim (2010). http://www.bitpim.org/. Accessed 24 Jan 2019
  19. 19.
  20. 20.
  21. 21.
    Ayers AR, Jansen W, Delaitre AM, Moenner L (2007) Cell phone forensic tools: an overview and analysis updateGoogle Scholar
  22. 22.
    mobiledit (2018). https://www.mobiledit.com/forensic-solutions/. Accessed 24 Jan 2019
  23. 23.
    Van Den Bos J, Van Der Knijff R (2005) TULP2Gan open source forensic software framework for acquiring and decoding data stored in electronic devices. Int J Digit Evid 4(2):1–9Google Scholar
  24. 24.
    SIMIS (2006). http://www.crownhillmobile.com/products.php. Accessed 24 Jan 2019
  25. 25.
    Forensic card reader (2013) http://www.avervision.com.tw/kiosk_avi-xm35.html. Accessed 24 Jan 2019
  26. 26.
    Murphy C (2011) cellular phone evidence data extraction and documentationGoogle Scholar
  27. 27.
    pulse.ng (2018) Nigerian man convicted of fraud on trial for stealing his own identity. https://www.pulse.ng/news/metro/nigerian-man-convicted-of-fraud-on-trial-for-stealing-his-own-identity/fpn6xpw. Accessed 12 Jan 2019
  28. 28.
    vanguardngr.com (2017) US court jails Nigerian over identity fraud. https://www.vanguardngr.com/2017/10/u-s-court-jails-nigerian-identity-fraud/. Accessed 12 Jan 2019
  29. 29.
    allafrica.com (2015). Nigeria: concerns over spate of identity theft on social media. https://allafrica.com/stories/201511092243.html. Accessed 17 Jan 2019
  30. 30.
    pmnewsnigeria (2019). Ecobank loses N207m to suspected fraudsters. https://www.pmnewsnigeria.com/2018/05/30/ecobank-loses-n207m-to-suspected-fraudsters/. Accessed 12 Jan 2019
  31. 31.
    Centre for laws of the federation of Nigeria (2015). Cybercrimes (Prohibition, Prevention, etc) actGoogle Scholar
  32. 32.
    vanguardngr.com. INEC website hacked. https://www.vanguardngr.com/2015/03/inec-website-hacked/. Accessed 17 Jan 2019
  33. 33.
    vanguardngr.com. APC website hacked. https://www.vanguardngr.com/2019/01/apc-website-hacked/. Accessed 17 Jan 2019
  34. 34.
    bbc.com. Online fraud: Top Nigerian scammer arrested. https://www.bbc.com/news/world-africa-36939751. Accessed 17 Jan 2019
  35. 35.
  36. 36.
    vanguardngr.com. Global hunt for Nigerian cyber criminal spreading malware. https://www.vanguardngr.com/2017/08/global-hunt-nigerian-cyber-criminal-spreading-malware/. Accessed 18 Jan 2019
  37. 37.
    iclg. Cybersecurity 2019 Nigeria. https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/nigeria. Accessed 18 Jan 2019

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Mathematics and Computer ScienceBenue State UniversityMakurdiNigeria

Personalised recommendations