Site Logo E-PROJECTTOPICS

ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY


πŸ“‹


Presented To


Computer Science Department

πŸ“„ Pages: 65       🧠 Words: 9867       πŸ“š Chapters: 5 πŸ—‚οΈοΈ For: PROJECT

πŸ‘οΈβ€πŸ—¨οΈοΈοΈ Views: 437      

⬇️ Download Now!

ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS

CHAPTER ONE
INTRODUCTION
1.1   BACKGROUND TO THE STUDY
Cybersecurity through ethical hacking plays an important role in the ongoing development of telecommunication industry, as well as Internet services (Odinma, 2010). Enhancing cybersecurity and protecting critical information infrastructures are essential to each nation's security and economic well-being (Odinma, 2010). Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as government policy.

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or telecommunication network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit (Okonigene & Adekanle, 2009). 

Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security (Laura, 1995). The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems (Laura, 1995). It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

1.2   STATEMENT OF THE PROBLEM
The issue of cyber security is one that has been discussed by many people with various perspectives on the issue, most coming at it from different sides than the others. Cyber-crimes have gone beyond conventional crimes and now have threatening ramifications to the national security of all countries, even to technologically developed countries as the United States. The illegal act may be targeted at a computer network or devices e.g., computer virus, denial of service attacks (DOS), malware (malicious code). the illegal act may be facilitated by computer network or devices with target independent of the computer network or device". However, ethical hacking has been used by various telecommunication companies to cover the loophole and this study is providing an overview on the issues and the solutions.

1.3   OBJECTIVES OF THE STUDY
The following are the objectives of this study:

  1. To examine the issues of ethical hacking and cyber security in Nigeria telecommunication industry.
  2. To examine the solutions to the issues of ethical hacking and cyber security in Nigeria telecommunication industry.
  3. To determine the level of effectiveness of ethical hacking and cyber security in Nigerian telecommunication industry.

1.4   RESEARCH QUESTIONS

  1. Is ethical hacking and cyber security practiced in Nigeria telecommunication industry?
  2. What are the solutions to the issues of hacking and cyber crime in Nigeria telecommunication industry?
  3. What is the level of effectiveness of ethical hacking and cyber security in Nigerian telecommunication industry?

1.6   SIGNIFICANCE OF THE STUDY
The following are the significance of this study:

  1. The findings from this study will educate the stakeholders in the telecommunication industry and the general public on how ethical hacking can be used in cyber security to protect against cyber crime.
  2. This research will be a contribution to the body of literature in the area of the effect of personality trait on student's academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY
This study will cover the issues and solution relating to ethical hacking and cyber security in the Nigerian telecommunication industry.
LIMITATION OF STUDY
Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).
Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work

πŸ“„ Pages: 65       🧠 Words: 9867       πŸ“š Chapters: 5 πŸ—‚οΈοΈ For: PROJECT

πŸ‘οΈβ€πŸ—¨οΈοΈοΈ Views: 437      

⬇️ Download Now!

click on whatsapp