語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity in Nigeria = A Case St...
~
SpringerLink (Online service)
Cybersecurity in Nigeria = A Case Study of Surveillance and Prevention of Digital Crime /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cybersecurity in Nigeria/ by Aamo Iorliam.
其他題名:
A Case Study of Surveillance and Prevention of Digital Crime /
作者:
Iorliam, Aamo.
面頁冊數:
XIV, 55 p. 19 illus., 15 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-15210-9
ISBN:
9783030152109
Cybersecurity in Nigeria = A Case Study of Surveillance and Prevention of Digital Crime /
Iorliam, Aamo.
Cybersecurity in Nigeria
A Case Study of Surveillance and Prevention of Digital Crime /[electronic resource] :by Aamo Iorliam. - 1st ed. 2019. - XIV, 55 p. 19 illus., 15 illus. in color.online resource. - SpringerBriefs in Cybersecurity,2193-973X. - SpringerBriefs in Cybersecurity,.
Introduction -- Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software.
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
ISBN: 9783030152109
Standard No.: 10.1007/978-3-030-15210-9doiSubjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Cybersecurity in Nigeria = A Case Study of Surveillance and Prevention of Digital Crime /
LDR
:03710nam a22003975i 4500
001
1004584
003
DE-He213
005
20200704051809.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030152109
$9
978-3-030-15210-9
024
7
$a
10.1007/978-3-030-15210-9
$2
doi
035
$a
978-3-030-15210-9
050
4
$a
TK5105.59
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Iorliam, Aamo.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1205929
245
1 0
$a
Cybersecurity in Nigeria
$h
[electronic resource] :
$b
A Case Study of Surveillance and Prevention of Digital Crime /
$c
by Aamo Iorliam.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XIV, 55 p. 19 illus., 15 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Cybersecurity,
$x
2193-973X
505
0
$a
Introduction -- Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis -- Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection -- Cybersecurity and Mobile Device Forensic -- Proposed Digital Surveillance Software.
520
$a
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Africa—Economic conditions.
$3
1279443
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Biometrics (Biology).
$3
1249740
650
0
$a
Computers.
$3
565115
650
0
$a
Law and legislation.
$3
1069250
650
1 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
African Economics.
$3
1139822
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Biometrics.
$3
677095
650
2 4
$a
Legal Aspects of Computing.
$3
669901
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030152093
776
0 8
$i
Printed edition:
$z
9783030152116
830
0
$a
SpringerBriefs in Cybersecurity,
$x
2193-973X
$3
1254278
856
4 0
$u
https://doi.org/10.1007/978-3-030-15210-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入