ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS


Department Of Information Technology


PAGES: 56
FORMAT: MS WORD
Chapters: 1-5
PRICE: ₦ 5,000.00

ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS 

ABSTRACT

The study examines the issues and solutions of ethical hacking and cybersecurity in the Nigerian telecommunication industry, the study has the following objectives, To examine the issues of ethical hacking and cybersecurity in Nigeria telecommunication industry, To examine the solutions to the issues of ethical hacking and cybersecurity in Nigeria telecommunication industry, To determine the level of effectiveness of ethical hacking and cybersecurity in the Nigerian telecommunication industry. Concerning the methodology for this study, data for this study was collected from the respondents through the use of questionnaires. Other information was collected from textbooks, journals, and other secondary sources of data. The research design used for this study was the descriptive research design. Since data characteristics were described using frequencies and percentages, and no manipulations of data or variables were necessary, the researcher chose this research design. The researcher discarded other alternatives such as the causal and explanatory research designs, because accurate findings and data analysis may not be achieved. The researcher adopted the census sampling technique to successfully complete the study. All 32 respondents were used for this study. Data collected were analyzed using frequencies and percentages. These frequencies and percentages enabled the researcher to clearly represent true data characteristics and findings with a great deal of accuracy. Interpretation and analysis of data were also used to describe items in tables and charts used for this study.

The study has the following findings; Nigeria’s cyberspace is much secured, there are issues associated with hacking in the telecommunication industry, ethical hacking is very effective in the telecommunication industry, there are solutions to the issues of ethical hacking in the telecommunication industry.

This research will educate the stakeholders in the telecommunication industry and the general public on how ethical hacking can be used in cybersecurity to protect against cybercrime.

TABLE OF CONTENTS

Title Page    -    -    -    -    -    -    -    -    -    i

Approval Page    -    -    -    -    -    -    -    -    ii

Declaration    -    -    -    -    -    -    -    -    iii

Dedication    -    -    -    -    -    -    -    -    -    iv

Acknowledgement    -    -    -    -    -    -    -    v

Abstract    -    -    -    -    -    -    -    -    -    vi

Table of Contents    -    -    -    -    -    -    -    vii

CHAPTER ONE – INTRODUCTION

1.1    Background of the Study    -    -    -    -    -   

1.2    Statement of General Problem    -    -    -    -   

1.3    Objective of the Study    -    -    -    -    -    -   

1.4    Research Questions    -    -    -    -    -    -   

1.5    Hypothesis   -      -      -      -      -      -      -        -        -        

1.6    Significance of the Study    -    -    -    -    -   

1.7    Scope of the Study    -    -    -    -    -    -   

1.8    Definition of Terms    -    -    -    -    -    -   

CHAPTER TWO – REVIEW OF RELATED LITERATURE

2.1    Introduction    -    -    -    -    -    -    -    -

2.2    Theoretical Framework    -    -    -    -    -    -

2.2.1 Routine activity theory     -    -    -    -    -    -

2.2.2 Opportunity theory -    -    -    -    -    -    -

2.2.3 Technology theory -    -    -    -    -    -    -

2.2.4 Social theories     -    -    -    -    -    -       -

2.2.5 The peel theory -    -    -    -    -    -    -       -

2.2.6 Space transition theory-    -    -    -    -    -   

2.3    e-banking crimes -    -    -    -    -    -    -

2.4 types of cyber-crime -    -    -    -    -    -    -

2.4.1 Phishing -    -    -    -    -    -    -        -    -   

2.4.2 Cyber terrorism     -    -    -    -    -    -        -

2.4.3 Electronic spam mails     -    -    -    -    -        -

2.4.4 Cyber stalking -    -    -    -    -    -    -         -

2.4.5 Fake copy-cat web sites -    -    -    -    -    -   

2.5 Effects of cyber-crime on banking     -    -    -    -       

2.6 Cyber-crime policy in Nigeria     -    -    -    ­-       -   

CHAPTER THREE – RESEARCH METHODOLOGY

3.1    Introduction    -    -    -    -    -    -    -   

3.2    Research Design    -    -    -    -    -    -   

3.3    Area of the Study    -    -    -    -    -    -   

3.4    Population of Study    -    -    -    -    -    -   

3.5    Sample size and Sampling Techniques    -    -    -   

3.6    Instrument for Data Collection    -    -    -    -   

3.7    Validity of the Instrument    -    -    -    -    -   

3.8    Reliability of the Instrument    -    -    -    -

3.9    Method of Data Collection    -    -    -    -    -   

3.10    Method of Data Analysis    -    -    -    -    -   

CHAPTER FOUR – DATA PRESENTATION AND ANALYSIS

4.0    Introduction    -    -    -    -    -    -    -   

4.1    Data Presentation and Analysis    -    -    -    -   

4.2    Characteristics of the Respondents    -    -    -   

4.3    Data Analysis    -    -    -    -    -    -    -   

4.4    Testing Hypothesis    -    -    -    -    -    -   

4.5    Summary of Findings    -    -    -    -    -    -   

4.6    Discussion of Findings    -    -    -    -    -   

CHAPTER FIVE – SUMMARY, CONCLUSION AND RECOMMENDATION

5.0    Introduction    -    -    -    -    -    -    -   

5.1    Summary    -    -    -    -    -    -    -    -   

5.2    Conclusion    -    -    -    -    -    -    -    -   

5.3    Recommendations    -    -    -    -    -    -   

    References -    -    -    -    -    -    -    -   

Appendix    -    -    -    -    -    -    -    -   

CHAPTER ONE

INTRODUCTION

1.1   BACKGROUND TO THE STUDY

Cybersecurity through ethical hacking plays an important role in the ongoing development of the telecommunication industry, as well as Internet services (Odinma, 2010). Enhancing cybersecurity and protecting critical information infrastructures are essential to each nation’s security and economic well-being (Odinma, 2010). Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as government policy.

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or telecommunication network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit (Okonigene & Adekanle, 2009).

Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security (Laura, 1995). The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s when the United States government used groups of experts called "red teams" to hack its own computer systems (Laura, 1995). It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

Deterring cybercrime is an integral component of national cybersecurity and critical information infrastructure protection strategy. In particular, this includes the adoption of appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect the integrity of national critical infrastructures (Adebusuyi, 2008). At the national level, this is a shared responsibility requiring coordinated action related to prevention, preparation, response, and recovery from incidents on the part of government authorities, the private sector, and citizens.

The exceptional outbreak of cyber-crime in Nigeria in recent times was quite alarming, and the negative impact on the socio-economy of the country is highly disturbing. Over the past twenty years, immoral cyberspace users have continued to use the internet to commit crimes; this has evoked mixed feelings of admiration and fear in the general populace along with a growing unease about the state of cyber and personal security (Oliver, 2010). This phenomenon has seen a sophisticated and extraordinary increase recently and has called for a quick response in providing laws that would protect cyberspace and its users.

The first recorded cyber murder was committed in the United States seven years ago. According to the Indian Express, in January 2002, an underworld don in a hospital was to undergo minor surgery. His rival went ahead to hire a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient. Statistically, all over the world, there has been a form of cyber-crime committed every day since 2006. Prior to the year 2001, the phenomenon of cyber-crime was not globally associated with Nigeria. This resonates with the fact that in Nigeria we came to the realization of the full potential of the internet right about that time. Since then, however, the country has acquired worldwide notoriety in criminal activities, especially financial scams, facilitated through the use of telecommunication facilities.  Nigerian cyber criminals are daily devising new ways of perpetrating this form of crime and the existing methods of tracking these criminals are no longer suitable to deal with their new tricks (Adebusuyi, 2008). The victims as well show increasing naivety and gullibility at the prospects incited by these fraudsters. This paper seeks to give an overview of ethical hacking and cyber-security in the Nigerian telecommunication industry, outline some challenges and proffer solutions.

In 2014, the National Assembly of Nigeria made a bold move in the war against cybercrime when the Senate passed the Cybercrime Bill. This feat in addition to the cybersecurity strategy and policy documents introduced by the Office of the National Security Adviser (NSA) are attributes that will strengthen cybersecurity.

1.2   STATEMENT OF THE PROBLEM

The issue of cybersecurity is one that has been discussed by many people with various perspectives on the issue, most coming at it from different sides than the others. Cyber-crimes have gone beyond conventional crimes and now have threatening ramifications to the national security of all countries, even to technologically developed countries like the United States. The illegal act may be targeted at a computer network or devices e.g., computer virus, denial of service attacks (DOS), malware (malicious code). the illegal act may be facilitated by a computer network or devices with target independent of the computer network or device”. However, ethical hacking has been used by various telecommunication companies to cover the loophole and this study is providing an overview of the issues and the solutions.

1.3   OBJECTIVES OF THE STUDY

The following are the objectives of this study:

To examine the issues of ethical hacking and cybersecurity in Nigeria's telecommunication industry. To examine the solutions to the issues of ethical hacking and cybersecurity in Nigeria's telecommunication industry. To determine the level of effectiveness of ethical hacking and cybersecurity in the Nigerian telecommunication industry.

1.4   RESEARCH QUESTIONS

Is ethical hacking and cybersecurity practiced in Nigeria's telecommunication industry? What are the solutions to the issues of hacking and cybercrime in Nigeria's telecommunication industry? What is the level of effectiveness of ethical hacking and cybersecurity in the Nigerian telecommunication industry?

1.6   SIGNIFICANCE OF THE STUDY

The following are the significance of this study:

The findings from this study will educate the stakeholders in the telecommunication industry and the general public on how ethical hacking can be used in cybersecurity to protect against cybercrime. This research will be a contribution to the body of literature in the area of the effect of personality traits on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY

This study will cover the issues and solutions relating to ethical hacking and cybersecurity in the Nigerian telecommunication industry.

LIMITATION OF STUDY

Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature, or information and in the process of data collection (internet, questionnaire, and interview).

Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted to the research work.

REFERENCES

Adebusuyi, A. (2008): The Internet and Emergence of Yahoo boys sub-Culture in Nigeria,  International Journal Of Cyber-Criminology, 0794-2891, Vol.2(2) 368-381, July-December

Odinma, Augustine C. MIEEE (2010): Cybercrime & Cert: Issues & Probable Policies for Nigeria, DBI Presentation, Nov 1-2.

Laura, A. (1995): Cyber Crime and National Security: The Role of the Penal and Procedural Law”, Research Fellow, Nigerian Institute of Advanced Legal Studies., Retrieved from

Okonigene, R. E., Adekanle, B. (2009): Cybercrime In Nigeria, Business Intelligence Journal, Retrieved from

Oliver, E. O. (2010): Being Lecture Delivered at DBI/George Mason University Conference on Cyber Security holding, Department of Information Management Technology Federal University of Technology, Owerri, 1-2 Nov.

.



TYPE IN YOUR TOPIC OR KEYWORD AND CLICK SEARCH:





HOW TO GET YOUR COMPLETE PROJECT MATERIAL INSTANTLY

  • * Select 3 free project topics of your choice from your Department

    * Submit the 3 project topics to your Supervisor for his or her Approval

    * Call our 24/7 customer service desk or WhatsApp Chat# (+234) 0803-766-4978 and get your project topics and complete material instantly.

    * You can also send an Email to [email protected]

    * All project materials on this website are well researched by professionals with high level of professionalism.


TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.


  • Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.

    "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

  • Hilary Yusuf, United States International University Africa, Nairobi, Kenya.

    "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

  • Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.

    "Researchwap.net is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.net" and God bless you and your business! ."

  • Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.

    "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

  • Sampson, University of Nigeria, Nsukka.

    "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

  • Cynthia, Akwa Ibom State University .

    "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

  • Elizabeth, Obafemi Awolowo University

    "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

  • Ali Olanrewaju, Lagos State University.

    "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

  • Willie Ekereobong, University of Port Harcourt.

    "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

  • Theressa, Igbinedion University.

    "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 5k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

  • Joseph, Abia state Polytechnic.

    "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

  • Christiana, Landmark University .
    Christiana, Landmark University .

    "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

  • Musa, Federal University of Technology Minna

    "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

  • Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.

    "I was scared at first when I saw your website but I decided to risk my last 5k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."


  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.
    Thank you for choosing researchwap.com.


PROJECT DETAILS

PAGES: 56
FORMAT: MS WORD
Chapters: 1-5
PRICE: ₦ 5,000.00


TYPE TOPIC OR KEYWORD AND CLICK SEARCH:

FREQUENTLY ASKED QUESTIONS


  • 1. How can I get the complete project if I order?

    AFTER FOLLOWING THE PAYMENT PROCEDURES HERE, AND WE RECEIVE YOUR DETAILS AS SMS ON 08037664978 or as mail to [email protected], THE MATERIAL WILL BE ATTACHED AND MAILED TO YOUR EMAIL ADDRESS WITHIN 30 MINUTES, AND A NOTIFICATION OF THE DELIVERY WILL BE SENT TO YOUR PHONE NUMBER.

    2. How will my payment be confirmed?

    FOLLOW THE PAYMENT INSTRUCTIONS FOUND ON THE PAYMENTS PAGE. NOTE: Payment information is required for Payment Confirmation.

    3. One of your topics suites my project, but the case study is different. What step should I take?

    Students are always advised to use our materials as guide. However, if you have a different case study, you may need to consult researchwap.com Depending on similarity of the organization/industry (case study) you may modify to, if you wish.

    4. How long does it take to get the complete project?

    Depending on how fast your payment and details is acknowledged by us, you will get the complete project within 30 minutes. However, on a very good day you can still get it within 15 minutes!

    5. Why should I trust this website?

    We are well aware of fraudulent activities (scam) that have been happening on the internet. It is unfortunate, but hopefully declining. However, we wish to re-assure our esteemed clients that we are genuine and our services is authentic, if not, we would not post our account details, email address, phone number or any personal details that could be traceable. Free chapter 1 is always given on the site to prove to you that we got the material. If you are unable to view the free chapter 1 send an email or SMS containing your name, topic, with the subject head "FREE CHAPTER 1" to [email protected] or 08037664978 plus the topic. You will get the free chapter 1 within an hour.

    6. Do you accept ATM payments and Online Transfers?

    Yes. We accept ATM transfers and online payments. FOLLOW THE PAYMENT INSTRUCTIONS FOUND ON THE PAYMENTS PAGE.

    7. Is it a complete research project or just materials?

    Yes it is a complete research project. We send complete project materials (i.e. chapters 1-5, full references, and questionnaires/secondary data to your email address after payment confirmation.

    8. How can I pay Online with my ATM card?

    1. Visit an ATM

    2. Insert your card

    3. Select Quickteller

    4. Select "Pay bills"

    5. Choose your account type

    6. Select "Others"

    7. Enter 322222 as the payment code

    8. Enter your phone number as "Customer Reference"

    9. Accept the N1.00 amount displayed

    10. Follow prompts to complete the transaction

    9. How will I receive a software?

    A link to download the software will always be on the first page of the material.

    10. I have a fresh topic that is not on your site. How do I go about it?

    We have professional writers in management sciences, computer science and social sciences. If you have a fresh topic, just click this hire a writer link, fill the form, submit the details and one of our writers will contact you shortly.