In June 2014, the British government launched a scheme aimed at addressing the threat to cyber space in the UK. It sort to encourage Organisations to adopt good practice of information security, which includes framework and a simple technical security controls to protect information from threats associated with the internet. The scheme also ensures that a form of certification was necessary to demonstrate this. My research sorts to evaluate the extent in which organisations in Nigeria are aware of the requirement of cyber essentials and how far they have implemented these requirements. Nigeria having been ranked amongst the top 15 countries in the world noted for cybercrime from a survey found in a web site “balancing act- Africa.com” it be...
Ethical hacking and cyber security are crucial topics in today's increasingly digital world. The Nig...
The world economy today has adopted the internet as a medium of transactions, this has made many org...
Unprepared with a fragile digital infrastructures, and hurriedly tossed into the depth of the cybers...
Recent cybersecurity reports suggest that cyber-attacks are on the increase, especially as they are ...
Security can be defined as the degree of resistance to, or protection from harm. It applies to any v...
Advancement in information and communication technology (ICT) has created room for the emergence of ...
This paper unveils the role of security intelligence in facilitating the war against cybercrime in o...
Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules...
This study examined three fundamental threats to the security of digital business transactions in Ni...
Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules...
Over the years, the alarming growth of the internet and its wide acceptance has led to increase in s...
Since the advent of the internet, cybercrime has become a recurring decimal in Nigeria. Cyber crime ...
Nigeria recorded a milestone in October 2014, when the Cybercrime bill was passed by the Senate. The...
“It appears almost to be the case that an incident of cybersquatting is an integral consequence of c...
The relevance of critical information infrastructure is crucial to every nation. The National Critic...
Ethical hacking and cyber security are crucial topics in today's increasingly digital world. The Nig...
The world economy today has adopted the internet as a medium of transactions, this has made many org...
Unprepared with a fragile digital infrastructures, and hurriedly tossed into the depth of the cybers...
Recent cybersecurity reports suggest that cyber-attacks are on the increase, especially as they are ...
Security can be defined as the degree of resistance to, or protection from harm. It applies to any v...
Advancement in information and communication technology (ICT) has created room for the emergence of ...
This paper unveils the role of security intelligence in facilitating the war against cybercrime in o...
Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules...
This study examined three fundamental threats to the security of digital business transactions in Ni...
Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules...
Over the years, the alarming growth of the internet and its wide acceptance has led to increase in s...
Since the advent of the internet, cybercrime has become a recurring decimal in Nigeria. Cyber crime ...
Nigeria recorded a milestone in October 2014, when the Cybercrime bill was passed by the Senate. The...
“It appears almost to be the case that an incident of cybersquatting is an integral consequence of c...
The relevance of critical information infrastructure is crucial to every nation. The National Critic...
Ethical hacking and cyber security are crucial topics in today's increasingly digital world. The Nig...
The world economy today has adopted the internet as a medium of transactions, this has made many org...
Unprepared with a fragile digital infrastructures, and hurriedly tossed into the depth of the cybers...