Cyber Crime and Challenges of Securing Nigeria's Cyber-Space Against Criminal Attacks

Cyber Crime and Challenges of Securing Nigeria's Cyber-Space Against Criminal Attacks

Benjamin Enahoro Assay
Copyright: © 2019 |Pages: 23
DOI: 10.4018/978-1-5225-5984-9.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The growing menace of cyber-related crimes in Nigeria is giving the government and other stakeholders in the information and communication technology sector a cause to worry. Apart from taking a toll on the nation's economic sphere, it has also affected the image of the country negatively especially when viewed against the backdrop of the recent ranking of Nigeria as third in global internet crimes behind United Kingdom and the United States. This scenario, no doubt, requires urgent attention. This chapter, therefore, proffer solutions and recommend ways to make the country's cyberspace free from incessant criminal attacks.
Chapter Preview
Top

Introduction

Unarguably, information and communication technology has revolutionized the world in which we live. It is credited with playing a leading role in stimulating economic growth in most modern economies. Apart from creating millions of new jobs, it is also an important enabler of innovation and development (Kvochko, 2013).

In societies where it has been fully deployed, available evidence (Ursula, 2010; Fair, 2013) shows that its impact can be felt in all aspects of a nation’s life. Hence, Williams and Sawyer (2015 p. 4) aver that “information technology affects almost all aspects of our lives, including education, health, finance, recreation and entertainment, government, jobs and careers, and your personal life”. Information and communication technology (ICT) therefore offers limitless opportunities for individuals, organizations and nations to attain greater heights in areas that were otherwise difficult.

Information and communication technology systems are now as basic to humans as life necessities such as shelter, water and electricity. Many individuals, corporate organizations and government agencies depend on ICT and computer networks to perform simple as well as complex tasks from social networking and research to business and commerce.

Today, the cyberspace has become increasingly important to the ICT world because of the momentum Internet transactions are gaining everyday. From business, industry, government to not-for-profit organizations, the Internet has simplified business processes such as sorting, summarizing, coding, editing, customized and generic report generation in a real-time processing mode. However, it has also brought unintended consequences such as criminal activities, spamming, credit card frauds, Automatic Teller Machine (ATM) frauds, phishing, identity theft and a blossoming haven for cybercriminal miscreants to perpetrate their insidious acts.

It is sad to note that there are delinquents who roam the cyberspace, with negative intentions. The cyberspace, more than ever before, has become more vulnerable as businesses, agencies and individuals are being threatened by cybercriminals not only in Nigeria but around the world. The exceptional outbreak of cybercrime in Nigeria in recent times is quite alarming, and the negative impact on the economy of the country is highly disturbing.

This chapter thus examines cybercrime and the challenges of securing Nigeria’s cyberspace against criminal attacks. The objectives of the chapter are:

  • 1.

    To show the dangers cybercriminals pose to individuals, organizations, the Nigerian economy and other parts of the world.

  • 2.

    To point out how the activities of a few Nigerians who engage in cybercrime is affecting the reputation of the country.

  • 3.

    To come out with recommendations that will help to put an end to activities of cybercriminals in Nigeria and beyond.

Key Terms in this Chapter

Telecommunications Device: It means: (1) a device that is able to transmit telephonic, electronic, digital, cellular, or radio communications, or (2) a part of a device that is able to transmit telephonic, electronic, digital, cellular, or radio communications, regardless of whether the part itself is able to transmit. It includes a cellular telephone, digital telephone, picture telephone, and modem equipped device.

ATM Fraud: ATM fraud refers to fraud with the use of an ATM card whereby the perpetrator of the crime uses the card to immediately withdraw funds from a consumer account using PIN based transactions at the automated teller machine.

Cyberattack: Is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter compute code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.

Information and Communication Technology: ICT refers to technologies that provide access to information through telecommunications. It is similar to information (IT) but focuses primarily on communication technologies. This includes the internet, wireless networks, cell phones, and other communication mediums.

Internet Fraud: Internet fraud is a type of fraud which makes use of the Internet to defraud victims or take advantage of them. It ranges from e-mail spam to online scams.

Hacking: Is the use of a computer or other technological device or system in order to gain unauthorized access to data held by another person or organization.

Cybercriminal: A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both. Cybercriminals use computers in three broad ways: select computer as their target, uses computer as their weapon and uses computer as their accessory.

Internet: Is a global computer network that provides a variety of information and communication facilities, and consists of interconnected networks using standardized communication protocols.

Internet of Things: Is a computing concept that describes the idea of everyday physical objects being connected to the Internet and being able to identify themselves to other devices.

Complete Chapter List

Search this Book:
Reset