Skip to main content

Cybersecurity and Mobile Device Forensic

  • Chapter
  • First Online:

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

Issues relating to cybersecurity and its challenges in Nigeria can be traced as far back as the provision of Internet services to Nigerians in 1996. Nigerians are known for the huge frauds they commit using the Internet. This chapter treats cybersecurity challenges/conflicts history in Nigeria. Furthermore, it looks at the relevant laws guiding against cyber crimes in Nigeria. Lastly, the need for embracing cybersecurity and mobile device forensics is encouraged.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Difenda (2018) What is the cia triangle and why is it important for cybersecurity management?, says NCC. https://www.difenda.com/blog/what-is-the-cia-triangle-and-why-is-it-important-for-cybersecurity-management. Accessed 11 Jan 2019

  2. Houmb S H, Sallhammar K (2005) Modeling system integrity of a security critical system using colored petri nets. WIT Transactions on The Built Environment, 82. https://www.witpress.com/Secure/elibrary/papers/SAFE05/SAFE05001FU.pdf. Accessed 11 Jan 2019

  3. Vanguard (2017) Nigeria 3rd in global internet crimes behind UK, US, says NCC. https://www.vanguardngr.com/2017/08/nigeria-3rd-global-internet-crimes-behind-uk-u-s-says-ncc/. Accessed 11 Jan 2019

  4. The Statictica (2017) Countries with the highest number of internet users as of december 2017 (in millions). https://www.statista.com/statistics/262966/number-of-internet-users-in-selected-countries/. Accessed 11 Jan 2019

  5. worldometers (2019) Current world population. http://www.worldometers.info/world-population/. Accessed 11 Jan 2019

  6. Bainbridge D (2008) Introduction to information technology law. Longman, UK

    Google Scholar 

  7. Evidence Act (2011) Explanatory memorandum. http://resourcedat.com/wp-content/uploads/2012/01/Evidence_Act_2011.pdf. Accessed 11 Jan 2019

  8. Iorliam A, James A (2013) Fraudulent activities using virtual meetings. Int J Comput Sci Eng 5(5):409

    Google Scholar 

  9. Trading economics (2019) Nigeria unemployment rate. https://tradingeconomics.com/nigeria/unemployment-rate. Accessed 12 Jan 2019

  10. Farjamfar A, Abdullah MT, Mahmod R, Udzir NI (2014) A review on mobile devices digital forensic process models. Res J Appl Sci Eng Technol 8(3):358–66

    Article  Google Scholar 

  11. Iorliam A (2018) Fundamental computing forensics for Africa: a case study of the science in Nigeria. Springer, Cham

    Google Scholar 

  12. cellebrite (n.d.). Digital intelligence for a safer world. https://www.cellebrite.com/en/home/. Accessed 12 Jan 2019

  13. J. Bergerson (2017) Mobile phone forensics: understanding cellebrite extraction reports.https://www.iltanet.org/blogs/jason-bergerson/2017/03/17/mobile-phone-forensics-understanding-cellebrite-extraction-reports?ssopc=1. Accessed 24 Jan 2019

  14. XACT. XACTMobile phone investigations go deeper. http://www.veille.ma/IMG/pdf/xact-datasheet.pdf. Accessed 24 Jan 2019

  15. Paraben device seizure (2011) Android forensic techniques. https://www.sciencedirect.com/topics/computer-science/paraben-device-seizure. Accessed 24 Jan 2019

  16. Pearson S, Watson R (2010) Digital triage forensics: processing the digital crime scene. Syngress, US

    Google Scholar 

  17. Mobile forensics central (2012). http://mobileforensicscentral.com/mfc/. Accessed 24 Jan 2019

  18. bitpim (2010). http://www.bitpim.org/. Accessed 24 Jan 2019

  19. SIMCon. SIM card acquisition and analysis with SIMCon. https://subscription.packtpub.com/book/networking_and_servers/9781785282058/1/ch01lvl1sec12/sim-card-acquisition-and-analysis-with-simcon. Accessed 24 Jan 2019

  20. celldek (2007). https://www.officer.com/investigations/forensics/evidence-collection/product/10043165/forensic-science-service-celldek. Accessed 24 Jan 2019

  21. Ayers AR, Jansen W, Delaitre AM, Moenner L (2007) Cell phone forensic tools: an overview and analysis update

    Google Scholar 

  22. mobiledit (2018). https://www.mobiledit.com/forensic-solutions/. Accessed 24 Jan 2019

  23. Van Den Bos J, Van Der Knijff R (2005) TULP2Gan open source forensic software framework for acquiring and decoding data stored in electronic devices. Int J Digit Evid 4(2):1–9

    Google Scholar 

  24. SIMIS (2006). http://www.crownhillmobile.com/products.php. Accessed 24 Jan 2019

  25. Forensic card reader (2013) http://www.avervision.com.tw/kiosk_avi-xm35.html. Accessed 24 Jan 2019

  26. Murphy C (2011) cellular phone evidence data extraction and documentation

    Google Scholar 

  27. pulse.ng (2018) Nigerian man convicted of fraud on trial for stealing his own identity. https://www.pulse.ng/news/metro/nigerian-man-convicted-of-fraud-on-trial-for-stealing-his-own-identity/fpn6xpw. Accessed 12 Jan 2019

  28. vanguardngr.com (2017) US court jails Nigerian over identity fraud. https://www.vanguardngr.com/2017/10/u-s-court-jails-nigerian-identity-fraud/. Accessed 12 Jan 2019

  29. allafrica.com (2015). Nigeria: concerns over spate of identity theft on social media. https://allafrica.com/stories/201511092243.html. Accessed 17 Jan 2019

  30. pmnewsnigeria (2019). Ecobank loses N207m to suspected fraudsters. https://www.pmnewsnigeria.com/2018/05/30/ecobank-loses-n207m-to-suspected-fraudsters/. Accessed 12 Jan 2019

  31. Centre for laws of the federation of Nigeria (2015). Cybercrimes (Prohibition, Prevention, etc) act

    Google Scholar 

  32. vanguardngr.com. INEC website hacked. https://www.vanguardngr.com/2015/03/inec-website-hacked/. Accessed 17 Jan 2019

  33. vanguardngr.com. APC website hacked. https://www.vanguardngr.com/2019/01/apc-website-hacked/. Accessed 17 Jan 2019

  34. bbc.com. Online fraud: Top Nigerian scammer arrested. https://www.bbc.com/news/world-africa-36939751. Accessed 17 Jan 2019

  35. Yedaly M, Wright B (2016) Cyber crime & cyber security trends in Africa. https://www.thehaguesecuritydelta.com/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf

  36. vanguardngr.com. Global hunt for Nigerian cyber criminal spreading malware. https://www.vanguardngr.com/2017/08/global-hunt-nigerian-cyber-criminal-spreading-malware/. Accessed 18 Jan 2019

  37. iclg. Cybersecurity 2019 Nigeria. https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/nigeria. Accessed 18 Jan 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aamo Iorliam .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Iorliam, A. (2019). Cybersecurity and Mobile Device Forensic. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-15210-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15210-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15209-3

  • Online ISBN: 978-3-030-15210-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics