ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS

 ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS

CHAPTER ONEINTRODUCTION

1.1   BACKGROUND TO THE STUDY  

Cybersecurity through ethical hacking plays an important role in the ongoing development of telecommunication industry, as well as Internet services (Odinma, 2010). Enhancing cybersecurity and protecting critical information infrastructures are essential to each nation’s security and economic well-being (Odinma, 2010). Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as government policy.

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or telecommunication network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit (Okonigene & Adekanle, 2009).

Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security (Laura, 1995). The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems (Laura, 1995). It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

Deterring cybercrime is an integral component of a national cybersecurity and critical information infrastructure protection strategy. In particular, this includes the adoption of appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect the integrity of national critical infrastructures (Adebusuyi, 2008). At the national level, this is a shared responsibility requiring coordinated action related to prevention, preparation, response and recovery from incidents on the part of government authorities, the private sector and citizens.

The exceptional outbreak of cyber-crime in Nigeria in recent times was quite alarming, and the negative impact on the socio-economy of the country is highly disturbing. Over the past twenty years, immoral cyberspace users have continued to use the internet to commit crimes; this has evoked mixed feelings of admiration and fear in the general populace along with a growing unease about the state of cyber and personal security (Oliver, 2010). This phenomenon has seen sophisticated and extraordinary increase recently and has called for quick response in providing laws that would protect the cyber space and its users.

The first recorded cyber murder was committed in the United States seven years ago. According to the Indian Express, January 2002, an underworld don in a hospital was to undergo a minor surgery. His rival went ahead to hire a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient. Statistically, all over the world, there has been a form of cyber-crime committed every day since 2006. Prior to the year 2001, the phenomenon of cyber-crime was not globally associated with Nigeria. This resonates with the fact that in Nigeria we came into realization of the full potential of the internet right about that time. Since then, however, the country has acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Telecommunication facilities.  Nigerian cyber criminals are daily devising new ways of perpetrating this form of crime and the existing methods of tracking these criminals are no longer suitable for to deal with their new tricks (Adebusuyi, 2008). The victims as well show increasing naivety and gullibility at the prospects incited by these fraudsters. This paper seeks to give an overview of ethical hacking and cyber-security in Nigerian telecommunication industry, outline some challenges and proffer solutions.

In 2014, the National Assembly of Nigeria made a bold move in the war against cybercrime when the Senate passed the Cybercrime Bill. This feat in addition to the cyber security strategy and policy documents introduced by the Office of the National Security Adviser (NSA) are attributes that will strengthen cyber security.

1.2   STATEMENT OF THE PROBLEM The issue of cyber security is one that has been discussed by many people with various perspectives on the issue, most coming at it from different sides than the others. Cyber-crimes have gone beyond conventional crimes and now have threatening ramifications to the national security of all countries, even to technologically developed countries as the United States. The illegal act may be targeted at a computer network or devices e.g., computer virus, denial of service attacks (DOS), malware (malicious code). the illegal act may be facilitated by computer network or devices with target independent of the computer network or device”. However, ethical hacking has been used by various telecommunication companies to cover the loophole and this study is providing an overview on the issues and the solutions.

1.3   OBJECTIVES OF THE STUDY The following are the objectives of this study:

To examine the issues of ethical hacking and cyber security in Nigeria telecommunication industry. To examine the solutions to the issues of ethical hacking and cyber security in Nigeria telecommunication industry. To determine the level of effectiveness of ethical hacking and cyber security in Nigerian telecommunication industry.

1.4   RESEARCH QUESTIONS

Is ethical hacking and cyber security practiced in Nigeria telecommunication industry? What are the solutions to the issues of hacking and cyber crime in Nigeria telecommunication industry? What is the level of effectiveness of ethical hacking and cyber security in Nigerian telecommunication industry?

1.6   SIGNIFICANCE OF THE STUDY The following are the significance of this study:

The findings from this study will educate the stakeholders in the telecommunication industry and the general public on how ethical hacking can be used in cyber security to protect against cyber crime. This research will be a contribution to the body of literature in the area of the effect of personality trait on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY This study will cover the issues and solution relating to ethical hacking and cyber security in the Nigerian telecommunication industry.LIMITATION OF STUDYFinancial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.

REFERENCES

Adebusuyi, A. (2008): The Internet and Emergence of Yahooboys sub-Culture in Nigeria,  International Journal Of Cyber-Criminology, 0794-2891, Vol.2(2) 368-381, July-December Odinma, Augustine C. MIEEE (2010): Cybercrime & Cert: Issues & Probable Policies for Nigeria, DBI Presentation, Nov 1-2. Laura, A. (1995): Cyber Crime and National Security: The Role of the Penal and Procedural Law”,Research Fellow, Nigerian Institute of Advanced Legal Studies., Retrieved from http://nials-nigeria.org/pub/lauraani.pdf Okonigene, R. E., Adekanle, B. (2009): Cybercrime In Nigeria, Business Intelligence Journal, Retrieved from http://www.saycocorporativo.com/saycoUK/BIJ/journal/Vol3No1/Article_7.pdf Oliver, E. O. (2010): Being Lecture Delivered at DBI/George Mason University Conferenceon Cyber Security holding, Department of Information Management Technology Federal University of Technology, Owerri, 1-2 Nov.

Project Topics   Project Topics and Materials   

.

Click Here To Get The Complete Project »

How To Write Chapter Three Of Your Research Project (Research Methodology)

  • Methodology In Research Paper


    Chapter three of the research project or the research methodology is another significant part of the research project writing. In developing the chapter three of the research project, you state the purpose of research, research method you wish to adopt, the instruments to be used, where you will collect your data, types of data collection, and how you collected it.

    This chapter explains the different methods to be used in the research project. Here you mention the procedures and strategies you will employ in the study such as research design, study design in research, research area (area of the study), the population of the study, etc. You also tell the reader your research design methods, why you chose a particular method, method of analysis, how you planned to analyze your data.

    Your methodology should be written in a simple language such that other researchers can follow the method and arrive at the same conclusion or findings.

    You can choose a survey design when you want to survey a particular location or behavior by administering instruments such as structured questionnaires, interviews, or experimental; if you intend manipulating some variables.

    The purpose of chapter three (research methodology) is to give an experienced investigator enough information to replicate the study. Some supervisors do not understand this and require students to write what is in effect, a textbook.

    A research design is used to structure the research and to show how all of the major parts of the research project, including the sample, measures, and methods of assignment, work together to address the central research questions in the study. The chapter three should begin with a paragraph reiterating the purpose of research. It is very important that before choosing design methods try and ask yourself the following questions: Will I generate enough information that will help me to solve the research problem by adopting this method?

    Method vs Methodology

    I think the most appropriate in methods versus methodology is to think in terms of their inter-connectedness and relationship between both. You should not beging thinking so much about research methods without thinking of developing a research methodology.

    Metodologia or methodology is the consideration of your research objectives and the most effective method and approach to meet those objectives. That is to say that methodology in research paper is the first step in planning a research project work.

    Design Methodology: Methodological Approach

    Example of methodology in research paper, you are attempting to identify the influence of personality on a road accident, you may wish to look at different personality types, you may also look at accident records from the FRSC, you may also wish to look at the personality of drivers that are accident victims, once you adopt this method, you are already doing a survey, and that becomes your metodologia or methodology.

    Your methodology should aim to provide you with the information to allow you to come to some conclusions about the personalities that are susceptible to a road accident or those personality types that are likely to have a road accident.

    The following subjects may or may not be in the order required by a particular institution of higher education, but all of the subjects constitute a defensible in metodologia or methodology chapter.

    Click here to complete this article - How To Write Chapter Three Of Your Research Project (Research Methodology)

TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.