CFP last date
20 January 2025
Reseach Article

An Assessment of Cybersecurity Technologies in the Selected Universities in Southwestern Nigeria

by Gbonjubola Oluwafunmilayo Binuyo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 50
Year of Publication: 2019
Authors: Gbonjubola Oluwafunmilayo Binuyo
10.5120/ijca2019919405

Gbonjubola Oluwafunmilayo Binuyo . An Assessment of Cybersecurity Technologies in the Selected Universities in Southwestern Nigeria. International Journal of Computer Applications. 178, 50 ( Sep 2019), 11-18. DOI=10.5120/ijca2019919405

@article{ 10.5120/ijca2019919405,
author = { Gbonjubola Oluwafunmilayo Binuyo },
title = { An Assessment of Cybersecurity Technologies in the Selected Universities in Southwestern Nigeria },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2019 },
volume = { 178 },
number = { 50 },
month = { Sep },
year = { 2019 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number50/30890-2019919405/ },
doi = { 10.5120/ijca2019919405 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:53:37.964103+05:30
%A Gbonjubola Oluwafunmilayo Binuyo
%T An Assessment of Cybersecurity Technologies in the Selected Universities in Southwestern Nigeria
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 50
%P 11-18
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The study identified the forms of cybercrimes in selected universities in Southwestern Nigeria. It determined the cyber security techniques and polices adopted by the selected Universities. It examined the effectiveness of cyber securities adopted by the selected Universities. Hence, primary data were obtained through the administration of questionnaire on 33 ICT administrators from each of the selected nine (9) universities in Southwestern Nigeria, making 297 respondents. Secondary data were sourced from publications. Data collected were analysed using descriptive and inferential statistics. The result showed that common types of cybercrimes in the selected institutions were hacking 66.3%), credit card fraud (58.5%), spamming (52.2%), software piracy (60.7%), identity theft (55.2%), sweet heart swindle (53.3%) and malicious programme/virus (54.4%). The results also showed that most cybercriminals used password cracker (83%), network sniffer (50.4%) and key logger (44.4%) to perpetrate their illicit acts. Also, the results indicated the adopted cyber securities mechanism in the selected universities which include identity (ID) and Password (100%), Public Key Cryptography (33.3%), Biometric Authentication (29.6%) and Digital Signature (18.5%). There was a significant (F=7.043; p<0.05) relationship between frequency of cyber-attack on Servers/Web Services and the deployment of Multi-Layer Authentication, Digital Signature (F=16.611, p<0.05) and Public Key Cryptography (F=6.750, p<0.05). The study concluded that major technologies used for cybercrimes in the universities in Southwestern Nigeria were password cracker, key logger and network sniffer. The study also concluded that the common types of cybercrime in the universities were hacking, credit card fraud, spamming, software piracy, identity theft, pornography, sweet heat swindle and malicious programmes (virus). The study further concluded that authentication protocols deployed majorly by universities in Southwestern Nigeria were Kerberos, internet protocol (IP) securities, CHAP and MS-CHAP. The study concluded that all the universities deployed identity (ID) and password authentication for security access control while privacy policy, network security policy and employee training regarding confidential information were the cyber security policy adopted by most of the universities in Southwestern Nigeria. The study concluded that the deployment of Cyber securities such as public key cryptography and digital signature inhibits threats on servers and services of the universities. This study concluded that universities in Southwestern Nigeria that did not deploy multi-layer authentication, digital signature and public key cryptography on their internet servers are susceptible to cybercrime frequently.

References
  1. Akogwu, S. (2012), an Assessment of the Level of Awareness on Cyber Crime among Internet Users in Ahmadu Bello University, Zaria Unpublished B.Sc. project submitted to the Department of Sociology, Ahmadu Bello University.
  2. British Security Standard 7790/ISO Standard 17799: Information Security Management, London: British Standards Institute, 1999, Section 6.1.1-2.
  3. Shinder, D.L. (2002), Scene of the Cybercrime: Computer Forensics Handbook. Syngress Publishing Inc. 88 Hingham Street, USA.
  4. International Telecommunication Union (ITU), (2016). Available from http://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx (Accessed on 11th April, 2016)
  5. Hammonds W. (2013). Cyber security and universities: managing their risks. Retrieved February 14, 2016 from http://www.universitiesuk.ac.uk/highereducation/Documents/2013/CyberSecurityAndUniversities.pdf
  6. Roseline, O. and Moses, O. (2012). Cyber Capacity without Cyber Security: A case study of Nigeria's National Policy for Information Technology (NPFIT). The Journal of Philosophy, Science &amp; Law, 12(1), pp. 1-14.
  7. Osho O., and Onoja A., (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology (IJCC) Vol. 9 (1): 120–143. DOI: 10.5281/zenodo.22390.
  8. Agba, P.C. (2002), International Communication Principles, Concepts and Issues. In Okunna, C.S. (ed) Techniques of Mass Communication: A Multi-dimensional Approach. Enugu: New Generation Books.
  9. Vladimir, G. (2005), International Cooperation in Fighting Cyber Crime. Available from www.crimeresearch.org (Accessed on 7th December, 2015)
  10. Oyewole and Obeta (2002), An Introduction to Cyber Crime. Retrieved on September 2011 from http//www.crimeresearch.org/articules/cyber-crime
  11. Binuyo, G. O., Olasupo, J.O., and Ogunjemilua, E. M. (2016). A Study of the Application of Information and Communications Technology in Customer Relationship Management in Selected Airlines in Nigeria. International Journal of Computer Applications, 139(1), 24 – 30.
  12. Nigerian National Policy for Information Technology (2001): Cyber security policies in Nigeria, Federal Ministry of Science and Technology, Abuja.
  13. McConnell L. (2013). The Nature, Causes and Consequences of Cyber Crime in Tertiary Institution in Zaria-Kaduna State, Nigeria. American International Journal of Contemporary Research, 3(9), pp. 98-113.
  14. Ribadu, E. (2007). Cyber Crime and Commercial Fraud; A Nigerian Perspective. A paper presented at the Modern Law for Global Commerce, Vienna 9th – 12th July.
  15. Olugbodi, K. (2010), Fighting Cyber Crime in Nigeria. Retrieved September 10, 2011 from http//www.guide2nigeria,com/news_articles_About_ Nigeria
  16. Adebusuyi, A. (2008): The Internet and Emergence of Yahoo boys sub-Culture in Nigeria, International Journal of Cyber-Criminology, 0794-2891, 2 (2) 368-381.
  17. Frank I. and Odunayo E. (2013). “Approach to Cyber Security Issues in Nigeria: Challenges and Solution”. International Journal of Cognitive Research in science, engineering and education 1(1), pp. 2-9.
  18. Rouse M. (2005). Definition of Spam. Available fromhttp://searchunifiedcommunications.techtarget.com/definition/Internet-Protocol. (Accessed on September 16th, 2015)
  19. Oppenheimer P. (2010). Developing Network Security Strategies. Pearson Education, Cisco Press, October 4, 2016.
  20. Duncan, A.J., Creese, S. and Goldsmith, M. (2012). “Insider attacks in cloud computing, in Trust, Security and Privacy in Computing and Communications (Trust Com)”, IEEE 11th International Conference, pp. 857–862.
  21. Tamara S. (2014). Security of Multifactor Authentication Model to Improve Authentication Systems. Information and Knowledge Management, 4(6), pp. 81-86.
  22. Pipkin, D.L, (2000). Information Security. Upper Saddle River, NJ: Prentice Hall
  23. Bertino, E., Martino, L. D., Paci, F. and Squicciarini, A. C. (2010). “Web services threats, vulnerabilities, and countermeasures,” in Security for Web Services and Service-Oriented Architectures. Springer, 2010, pp. 25–44.
  24. Kizza, J.M., (2013). Guide to Computer Network Security. Department of Computer Science and Engineering, University of Tennessee-Chattanooga, USA.
  25. Nilsson J., (2006). “Vulnerability Scanners”, Unpublished Master of Science Thesis submitted to Department of Computer and System Sciences, Royal Institute of Technology, Kista, Sweden.
  26. Bassett R., Bass L. and O'Brien P. (2006). Computer Forensics: An Essential Ingredient forCyber Security. Journal of information Science and Technology (JIST) 3(1), pp. 23-29.
  27. McGraw, G. (2006). Software Security: Building Security In, Adison Wesley Professional.
  28. Bacudio G., Yuan X., Chu B. and Jones M. (2011). An overview of Penetration Testing. International Journal of Network Security and Its Applications, 3(6), pp. 19.
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrimes Cybersecurity Universities Nigeria