Fig 3 - uploaded by Michael Adu
Content may be subject to copyright.
System Architecture with Activity Log feature for Online Social Networks monitoring C. Responses A range of government agencies can be put in place to respond to different aspects of cybercrime in Nigeria. Local and State agencies should have primary responsibility for cybercrime that targets individuals, businesses and government systems in their jurisdictions. The National Cybercrime Working Group (NCWG) must be put in place to bring together representatives from Local, State and Federal Governments. Nigeria Law enforcement and justice agencies are to ensure that agency efforts in response to cybercrime are properly aligned. Other agencies are to be involved in responding to cybercrime including Consumer Protection Agency (CPA).

System Architecture with Activity Log feature for Online Social Networks monitoring C. Responses A range of government agencies can be put in place to respond to different aspects of cybercrime in Nigeria. Local and State agencies should have primary responsibility for cybercrime that targets individuals, businesses and government systems in their jurisdictions. The National Cybercrime Working Group (NCWG) must be put in place to bring together representatives from Local, State and Federal Governments. Nigeria Law enforcement and justice agencies are to ensure that agency efforts in response to cybercrime are properly aligned. Other agencies are to be involved in responding to cybercrime including Consumer Protection Agency (CPA).

Source publication
Article
Full-text available
Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud...

Similar publications

Article
Full-text available
Cybercrime perpetrated by pockets of citizens is posing a serious threat to international security and economy. Recognizing the lack of any global cooperation on this issue, this paper provides a comprehensive comparative analysis of cyber crime in the corporate sector of the East with India serving as the prototype, and the West, with United State...
Conference Paper
Full-text available
With growth of cyber criminal, risk management has become a vital topic both in academic and business world. Most artificial intelligence tools have been used to enhance risk management and risk management tools have benefited from them. In recent years new technologies has emerge known as blockchain technology. This technologies have attracted con...

Citations

... Consequently, there are also several ways of categorizing these attacks. Attacks may be classified as either passive or[5,6]. Passive attacks are attacks in which the cryptographic device is operated largely or even entirely within its specification. ...
Article
Full-text available
Global system for mobile communication is a wireless radio technology used mostly on network communication. It is designed to overcome the challenges of analog communication. GSM evolved from generation 1G to 4G LTE and uses protocols to protect transmissions, which have shown to be susceptible to attacks. This fact has been proven based on several attacks ranging from narrow pipe attack, guess, and determine attacks, side channel attacks, time memory tradeoff attacks and correlation attacks which have high computational complexities. The proposed system called GSM Traffic Monitoring System (GTMS) attempts to proffer a lower computational complexity attack. It uses a key retrieval and passive attack module to handle the mirroring of the secret key authentication procedure given a chosen random challenge on a SIM card through the injection of a malware. This research aims at drawing the attention of network providers- SIM configuration; an area that requires protection from attackers.