Abstract
Issues relating to cybersecurity and its challenges in Nigeria can be traced as far back as the provision of Internet services to Nigerians in 1996. Nigerians are known for the huge frauds they commit using the Internet. This chapter treats cybersecurity challenges/conflicts history in Nigeria. Furthermore, it looks at the relevant laws guiding against cyber crimes in Nigeria. Lastly, the need for embracing cybersecurity and mobile device forensics is encouraged.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Difenda (2018) What is the cia triangle and why is it important for cybersecurity management?, says NCC. https://www.difenda.com/blog/what-is-the-cia-triangle-and-why-is-it-important-for-cybersecurity-management. Accessed 11 Jan 2019
Houmb S H, Sallhammar K (2005) Modeling system integrity of a security critical system using colored petri nets. WIT Transactions on The Built Environment, 82. https://www.witpress.com/Secure/elibrary/papers/SAFE05/SAFE05001FU.pdf. Accessed 11 Jan 2019
Vanguard (2017) Nigeria 3rd in global internet crimes behind UK, US, says NCC. https://www.vanguardngr.com/2017/08/nigeria-3rd-global-internet-crimes-behind-uk-u-s-says-ncc/. Accessed 11 Jan 2019
The Statictica (2017) Countries with the highest number of internet users as of december 2017 (in millions). https://www.statista.com/statistics/262966/number-of-internet-users-in-selected-countries/. Accessed 11 Jan 2019
worldometers (2019) Current world population. http://www.worldometers.info/world-population/. Accessed 11 Jan 2019
Bainbridge D (2008) Introduction to information technology law. Longman, UK
Evidence Act (2011) Explanatory memorandum. http://resourcedat.com/wp-content/uploads/2012/01/Evidence_Act_2011.pdf. Accessed 11 Jan 2019
Iorliam A, James A (2013) Fraudulent activities using virtual meetings. Int J Comput Sci Eng 5(5):409
Trading economics (2019) Nigeria unemployment rate. https://tradingeconomics.com/nigeria/unemployment-rate. Accessed 12 Jan 2019
Farjamfar A, Abdullah MT, Mahmod R, Udzir NI (2014) A review on mobile devices digital forensic process models. Res J Appl Sci Eng Technol 8(3):358–66
Iorliam A (2018) Fundamental computing forensics for Africa: a case study of the science in Nigeria. Springer, Cham
cellebrite (n.d.). Digital intelligence for a safer world. https://www.cellebrite.com/en/home/. Accessed 12 Jan 2019
J. Bergerson (2017) Mobile phone forensics: understanding cellebrite extraction reports.https://www.iltanet.org/blogs/jason-bergerson/2017/03/17/mobile-phone-forensics-understanding-cellebrite-extraction-reports?ssopc=1. Accessed 24 Jan 2019
XACT. XACTMobile phone investigations go deeper. http://www.veille.ma/IMG/pdf/xact-datasheet.pdf. Accessed 24 Jan 2019
Paraben device seizure (2011) Android forensic techniques. https://www.sciencedirect.com/topics/computer-science/paraben-device-seizure. Accessed 24 Jan 2019
Pearson S, Watson R (2010) Digital triage forensics: processing the digital crime scene. Syngress, US
Mobile forensics central (2012). http://mobileforensicscentral.com/mfc/. Accessed 24 Jan 2019
bitpim (2010). http://www.bitpim.org/. Accessed 24 Jan 2019
SIMCon. SIM card acquisition and analysis with SIMCon. https://subscription.packtpub.com/book/networking_and_servers/9781785282058/1/ch01lvl1sec12/sim-card-acquisition-and-analysis-with-simcon. Accessed 24 Jan 2019
celldek (2007). https://www.officer.com/investigations/forensics/evidence-collection/product/10043165/forensic-science-service-celldek. Accessed 24 Jan 2019
Ayers AR, Jansen W, Delaitre AM, Moenner L (2007) Cell phone forensic tools: an overview and analysis update
mobiledit (2018). https://www.mobiledit.com/forensic-solutions/. Accessed 24 Jan 2019
Van Den Bos J, Van Der Knijff R (2005) TULP2Gan open source forensic software framework for acquiring and decoding data stored in electronic devices. Int J Digit Evid 4(2):1–9
SIMIS (2006). http://www.crownhillmobile.com/products.php. Accessed 24 Jan 2019
Forensic card reader (2013) http://www.avervision.com.tw/kiosk_avi-xm35.html. Accessed 24 Jan 2019
Murphy C (2011) cellular phone evidence data extraction and documentation
pulse.ng (2018) Nigerian man convicted of fraud on trial for stealing his own identity. https://www.pulse.ng/news/metro/nigerian-man-convicted-of-fraud-on-trial-for-stealing-his-own-identity/fpn6xpw. Accessed 12 Jan 2019
vanguardngr.com (2017) US court jails Nigerian over identity fraud. https://www.vanguardngr.com/2017/10/u-s-court-jails-nigerian-identity-fraud/. Accessed 12 Jan 2019
allafrica.com (2015). Nigeria: concerns over spate of identity theft on social media. https://allafrica.com/stories/201511092243.html. Accessed 17 Jan 2019
pmnewsnigeria (2019). Ecobank loses N207m to suspected fraudsters. https://www.pmnewsnigeria.com/2018/05/30/ecobank-loses-n207m-to-suspected-fraudsters/. Accessed 12 Jan 2019
Centre for laws of the federation of Nigeria (2015). Cybercrimes (Prohibition, Prevention, etc) act
vanguardngr.com. INEC website hacked. https://www.vanguardngr.com/2015/03/inec-website-hacked/. Accessed 17 Jan 2019
vanguardngr.com. APC website hacked. https://www.vanguardngr.com/2019/01/apc-website-hacked/. Accessed 17 Jan 2019
bbc.com. Online fraud: Top Nigerian scammer arrested. https://www.bbc.com/news/world-africa-36939751. Accessed 17 Jan 2019
Yedaly M, Wright B (2016) Cyber crime & cyber security trends in Africa. https://www.thehaguesecuritydelta.com/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf
vanguardngr.com. Global hunt for Nigerian cyber criminal spreading malware. https://www.vanguardngr.com/2017/08/global-hunt-nigerian-cyber-criminal-spreading-malware/. Accessed 18 Jan 2019
iclg. Cybersecurity 2019 Nigeria. https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/nigeria. Accessed 18 Jan 2019
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Iorliam, A. (2019). Cybersecurity and Mobile Device Forensic. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-15210-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-15210-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15209-3
Online ISBN: 978-3-030-15210-9
eBook Packages: Computer ScienceComputer Science (R0)