Framework for Managing Cybercrime Risks in Nigerian Universities
- URL: http://arxiv.org/abs/2108.09754v1
- Date: Sun, 22 Aug 2021 15:24:32 GMT
- Title: Framework for Managing Cybercrime Risks in Nigerian Universities
- Authors: Bukhari Badamasi and Samuel C. Avemaria Utulu
- Abstract summary: The study is based on literature review and propose how an actionable framework that Nigerian Universities can adopt to setoff cybersecurity programs can be developed.
We conclude that the framework provides a lucrative starting point for Nigerian universities to setoff efficient and effective cyber security program.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Universities in developing countries, including those in Nigeria, experience
cybercrime risks due to poor management of their cyber spaces and resources.
The outcome of these cybercrimes are threats and breaches of universities'
cyber security. The threats and breaches have resulted in substantial
financial, social, and intellectual property losses. In the recent past,
Nigerian universities have started to respond to these cyber-attacks. Many of
them now invest in anti-cybercrime tools and programs to mitigate cyber
security threats and breaches. Despite this, the number of times Nigerian
universities suffer from cyber-attacks and the losses that result from them
keeps increasing. Our observation, however, indicates that most Nigerian
universities run their cyber security without using scientifically derived
frameworks that spell out how to manage threats and breaches that emanate from
within and outside them. We consider this a problem to ongoing efforts made by
Nigerian universities to mitigate cyber security threats and breaches. The
study reported in this paper was therefore, carried out to explicate how
Nigerian universities can develop actionable frameworks that can help them to
mitigate cyber security threats and breaches. The study is based on literature
review and propose how an actionable framework that Nigerian Universities can
adopt to setoff cybersecurity programs can be developed. The process comprises
of problem identification, description of objectives, designing and developing
the artefact, testing, and evaluating the artefact, and communicating the
result. We conclude that the framework provides a lucrative starting point for
Nigerian universities to setoff efficient and effective cyber security program.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks [0.0]
This paper delves into the escalating threat posed by the misuse of AI, specifically through the use of Large Language Models (LLMs)
Through a series of controlled experiments, the paper demonstrates how these models can be manipulated to bypass ethical and privacy safeguards to effectively generate cyber attacks.
We also introduce Occupy AI, a customized, finetuned LLM specifically engineered to automate and execute cyberattacks.
arXiv Detail & Related papers (2024-08-23T02:56:13Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence [27.550484938124193]
This paper introduces a framework to benchmark, elicit, and improve cybersecurity incident analysis and response abilities.
We create a high-quality bilingual instruction corpus by crawling cybersecurity raw text from cybersecurity websites.
The instruction dataset SEvenLLM-Instruct is used to train cybersecurity LLMs with the multi-task learning objective.
arXiv Detail & Related papers (2024-05-06T13:17:43Z) - The New Frontier of Cybersecurity: Emerging Threats and Innovations [0.0]
The research delves into the consequences of these threats on individuals, organizations, and society at large.
The sophistication and diversity of these emerging threats necessitate a multi-layered approach to cybersecurity.
This study emphasizes the importance of implementing effective measures to mitigate these threats.
arXiv Detail & Related papers (2023-11-05T12:08:20Z) - knowCC: Knowledge, awareness of computer & cyber ethics between CS/non-CS university students [0.0]
This research focuses on the relations between cybersecurity awareness, cyber knowledge, computer ethics, cyber ethics, and cyber behavior.
The findings express that while internet users are alert of cyber threats, they only take the most elementary and easy-to-implement precautions.
arXiv Detail & Related papers (2023-10-19T12:29:26Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Towards Determining the Effect of Age and Educational Level on
Cyber-Hygiene [0.0]
Authors of this paper undertook an online pilot study among students and employees of University of Nigeria, Nsukka.
The survey seeks to find out the effect of age and level of education on the cyber hygiene knowledge and behaviour of the respondents.
Our findings show wide adoption of internet in institution of higher learning, whereas, significant number of the internet users do not have good cyber hygiene knowledge and behaviour.
arXiv Detail & Related papers (2021-03-11T11:42:23Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.