The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, Social Engineering threats and trends are investigated and mitigation strategies recommended. The national and economic security of countries now relies on the Cyberspace because virtually all businesses processes are using the Internet. Unfortunately, Cyber-criminality is increasing and rated the fastest growing crime worldwide. Social engineering, a technique whereby cybercriminals...
Continuous demand, by end users, has become an issue with respect to the scarce resources of the radio frequency spectrum. In this paper we conducted a 24-hour outdoor measurement of spectrum occupancy, in both rural and urban areas in Kwara State, Nigeria, spanning across the frequency range of 48.5 MHz – 880 MHz The results obtained show that the mean average duty cycle for TV bands 1–4 and CDMA...
There is an increased trend in information insecurity, online fraud and social engineering activities today as a result of high dependence on the Internet and social networks for communication, advertisement of products and services, etc. Malwares are most times, deliberately programmed as worms to appear as flash messages, online games, gift awards and in many other attractive forms for the user...
Attacks on airport information network services in the form of Denial of Service (DoS), Distributed DoS (DDoS), and hijacking are the most effective schemes mostly explored by cyber terrorists in the aviation industry running Mission Critical Services (MCSs). This work presents a case for Airport Information Resource Management Systems (AIRMS) which is a cloud based platform proposed for the Nigerian...
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to investigate the prevalence of spam SMS, with focus on Nigeria. To quantify the prevalence, primary data was collected using questionnaire. Out of 270 surveyed, the...
This paper presents an investigation of the use of social networking service among youths aged 16 through 25 years, in Nigeria.The convergence of information systems and networks, the Internet and mobility has brought about a fundamental shift on how people generate and share information. Specifically, social media has emerged as a powerful tool in a digitally connected world, touching every aspect...
Social media (SM) has seen an exponential growth since its inception on the web, making it an interesting and unexplored area of research. The positives and the novelty of the SM sites have resulted in its integration to our daily lives. Unfortunately, there are repercussions to its adoption, including but not limited to uncontrollable daily dedicated hours; loneliness creating the need to use it...
Digital Forensics is an area of Forensics Science that uses the application of scientific method toward crime investigation. The thwarting of forensic evidence is known as anti-forensics, the aim of which is ambiguous in the sense that it could be bad or good. The aim of this project is to simulate digital crimes scenario and carry out forensic and anti-forensic analysis to enhance security. This...
Security challenges to telecommunication networks have been a matter of concern to the international community within the last two decades. Telecommunication infrastructure that provides the necessary backbone for information exchange such as voice, video, data, and Internet connectivity have been found to be particularly vulnerable to various forms of attacks. Some of these attacks could lead to...
In March and April, 2015, for the first time in the history of Nigeria, elections were conducted, using partial electronic voting means. Specifically, smart card readers were utilized for accreditation of prospective voters. While the 2015 election exercise was adjudged the best ever in the history of the country, it was not without challenges. One of these was the failure, in many instances, of the...
This keynote paper discusses the opportunities and barriers to real economic growth through e-transformation in African economies. Understanding the answer to this question is dependent on how we interpret the question and on where the opportunities for economic growth lie.
This work establishes a state-of-the-art protective measure on how the smart antennas can be used effectively to curtail the activities of hackers/intruders on radio frequency signals. Hackers can scan confidential information/data belonging to organization, law enforcement and even interception of radio frequencies signals to the public usage. In this analysis, three antenna elements array have been...
There is a rapid growth of the application of mobile devices as a learning aid especially in developing countries such as Nigeria largely due to affordability, interest and availability of mobile handheld devices. Though web-based learning systems such as m-learning are used nowadays to support several learning activities and learners are generally willing to use the devices for learning, cybersecurity...
This paper presents a study of the Nigeria's presence in Cyberspace. The Cyberspace (Internet) is now critical to every nation's socio-economic, cultural and political activities. When it is disrupted or fails, can grind a nation to a standstill. On the contrary, its correct functioning and pliability is transforming modern society with exceptional pecuniary and social benefits. With nearly all traditional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.