Submit Search
Upload
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants
•
0 likes
•
6 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i3/IRJET-V9I397.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET Journal
IRJET- Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
assignment help experts
assignment help experts
#essaywriting
sample assignment
sample assignment
#essaywriting
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
Recommended
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET Journal
IRJET- Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
assignment help experts
assignment help experts
#essaywriting
sample assignment
sample assignment
#essaywriting
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
pdevang
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
SeasiaInfotech2
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
Cyber Security
Cyber Security
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
pdevang
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
SeasiaInfotech2
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
Cyber Security
Cyber Security
IRJET Journal
Similar to Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants
(20)
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
Cyber Security
Cyber Security
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
meghakumariji156
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
Hostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
JuliansyahHarahap1
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Employee leave management system project.
Employee leave management system project.
Kamal Acharya
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
Recently uploaded
(20)
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Hostel management system project report..pdf
Hostel management system project report..pdf
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
School management system project Report.pdf
School management system project Report.pdf
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Employee leave management system project.
Employee leave management system project.
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 569 Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants Comfort Olebara1 1Department of Computer Science, Faculty of Physical Science, Imo State University, Owerri, Imo State, Nigeria. -----------------------------------------------------------------------***---------------------------------------------------------------------- Abstract: In the advent of surreptitiously inserted or embedded codes on software and hardware for the espionage purposes, the threat faced by developing countries cannot be over-emphasized. This research is geared towards understudying importation of cheap, fairly-used (Tokunbo) mobile devices, PCs and other consumer electronics, with a view to ascertaining the effect they have on the cyber hygiene of Nigerian civil servants, and in turn, on Nigerian Information system. A survey was used to collect self-reported data on the backdoor awareness level and cyber hygiene practices of civil servant. Collected data is used to test hypothesis that predicts backdoor awareness level has effect on cyber hygiene practices of Nigerian civil servants. ta of general backdoor awareness, while section2 collected data on participants’ cyber hygiene practice. A measurement scale of 1-5 which assumes equidistance is used to assess the participants’ level of backdoor awareness and level of cyber hygiene. This method hides behind existing literature on robustness of statistical methods such as logistic regression, to perform parametric data analysis on interval measurement scale chosen. Categorized data on backdoor awareness and cyber hygiene were subjected to logistic regression. The result showed model to be statistically significant at 0.001, and that the odds of having good cyber hygiene was 2.276 more likely for people with high backdoor awareness than those with low backdoor awareness. Regression weight (B) agrees with the outcome, as a positive regression weight of 0.823 showed that there exists a positive relationship between the independent and dependent variables (Increase in backdoor awareness results in increased cyber hygiene culture. The alternative hypothesis is accepted and Null hypothesis rejected. The researcher recommends: Backdoor awareness campaign among civil servants and ministerial heads, Sensitizing and training organizational heads in information security best practices, National measures to ensure ministerial heads are provided with secure PCs and mobile devices by the organizations they represent, frequent software updates, installing browser security software, anti- keyloggers, anti virus software, together with good cyber hygiene will provide some level ofInformation system protection. Keywords: Espionage, Cyber Security, E-Waste, Information System, Backdoor, Cyber Hygiene. I. Introduction In recent years, malwares, trojans, key loggers, and various methods deployed by cyber attackers are no longer limited to software, but has been extended to hardware, through the use of hardware backdoors. Also, the use of cloud-based services has made it possible for installed software or hardware backdoors to be activated and various forms of espionage activities carried out remotely. The risk users face extends to organizations they work for, as most users connect to the organization’s network with their PC, or other mobile devices. This works aims to provide insight into the effects fairly used mobile devices and consumer electronics have on the cyber hygiene of a developing nation. Cyber hygiene is the level of carefulness exhibited by an internet user in order to keep their devices free from various cyber- attack patterns. Some cyber hygiene good practices include but not limited to: Keeping PC firewall on, not opening e-mail whose source is unknown, scanning through flashes before attaching to PC or mobile phones, updating system software often, installing good anti-virus software. These best practices however, work only when the threat faced is software inclined. Hardware system of attack requires physical exposure of the device to an attacker, which implies that an attacker must have physically installed the threat. These come in the form of microcontrollers, or microprocessors, which may be part of the original hardware, or installed for espionage, by manufacturer or other people who have had physical contact with the device. Fairly used Mobile devices, PCs, and consumer electronics fall in the second category. These are products either traded-in by their users, stolen and sold, or discarded by owners when obsolete. The importation and dumping of sub-standard consumer electronics into third world countries has been adjudged lucrative to importers from different countries. This is necessitated by the level of poverty, unemployment, and dire need to close the digital gap, as made possible by privatization of telecommunication. Knowledge gap is constantly thinning out as a result of remote learning infrastructure, yet affordability of required hardware resources seem far-fetched. Quartz Africa (2020) reports that about 21 million Nigerians are unemployed, this has further been compounded by the outbreak of COVID-19, which has caused many employers to shed
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 570 work force, with many resorting to remote workers. The need for connectivity therefore, has led the citizens in third world countries into resorting to buying mobile phones, PCs, Switches, Routers, Repeaters, from the popular “Tokunbo” market. II. Literature Review 2.1 Conceptual Framework 2.1.1 Malware The word “Malware” is an acronym for Malicious Software. It is a set of instructions injected into a information systems, networks or computing devices with the sole aim of carrying out an attacker’s intent. A person who carries out the act of injecting malicious software for personal gain is known as an attacker, and the act, which results in compromising the integrity of the information system, hardware, network, embedded computers, or computer embodiment, is known as a cyberattack. Types of Malware Table 2.1: Common Malware (Baker, 2021) Type Action Example Adware Presents in advertisements Fireball Spyware Surreptitiously collects data Dark-Hotel Trojan camouflages as legitimate file, email Emotet Ransomware Denial of Service (DOS) until ransom is given RYUK 2.1.2 Attacker An attacker is someone who tries to gain access to a device or network unlawfully, with the intention of stealing information, causing harm. 2.1.3 Cyber-Attack Cyber-attacks may be engaged in by individuals, organizations, or nations, and for reasons ranging from fraud, espionage, recipe theft, and other reasons for which an attacker considers it necessary. Keyloggers steals keystrokes such as Pins and passwords Olympic Vision Bots Uses AI to launch multiple attacks Echobot Worms Replicates through victim’s network Stuxnex Rootkits Used by hackers to take control of victim’s device Zacinlo Fileless Malware Alters system software files, not application software files Astaroth Mobile Malware Used in Mobile phone attack Triada
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 571 2.1.4 Backdoor Backdoor is a means of stealthily gaining access to computer, embedded system, or associated devices such as IoT devices. Backdoors, as the name imply, bypass system passwords, encryption algorithms, authentication algorithms, and various security protocols, to gain access into the targeted system. Two main backdoor methods are recognized: Software backdoors and hardware backdoors. Software backdoors are those codes injected into source codes, object codes or compilers. Those inserted into source codes, which are the high-level human readable codes, may be discovered through inspection of the source code. Object code software backdoors are those inserted into the machine-readable object code either during compilation or on the disk-based object code, hence they are difficult to detect through physical examination. Detection of anomaly in object code can be achieved through checking program length, “Checksum analysis” or “object code disassembling”. Hardware backdoors are the codes burned to computer hardware or firmware. These are usually used to compromise integrated circuits, which are silicon wafer fabricated materials. The integrated circuits may be any of capacitors, Microprocessors, Microcontrollers, oscillators, magnifiers, resistors. ICs are manufactured for a specific purpose, Microprocessors and Microcontrollers, though IC, are programmable, and the embedded codes can be reprogrammed to carry out any task the programmer chooses. Programming microcontrollers are carried out using a device called “chip programmer”. The chip programmer is attached to a PC through a USB port and installed into the PC. Microcontroller chip legs are attached to the programmer in programmer IDE. Microcontrollers differ in make, shape, and size. Some of the legs are input, some for output, some are for storage (memory), while the others are for processing. 2.1.5 Backdoor Discoveries A developer of “Replicant Project”, Paul Kocialkowski reported the discovery of a backdoor in Android Operating system running on Samsung Galaxy devices. The backdoor, a technical issue in the Android Radio Interface Layer (RIL), runs in the devices’ processor baseband that controls communication with modems. RIL and Inter Process communication protocol (IPC protocol) in the Samsung device allow modem to carry out input/output operations on file systems through Receive Flow Steering (RFS) commands. RIL, while allowing the user perform read, write, update, delete operations on phone storage, provides a backdoor for the same operations to be remotely carried out (Paul, 2014). To investigate the open modem port, the researcher added some codes to the modem kernel driver. The patch program, when implemented will: Open data/radio/test file, read its content, and then close it. Another celebrated backdoor find is the research outcome at university of Michigan. The researchers in 2017, inspired by a previous vulnerability in Linux kernel, called 2015 BAIDU SDK BAIDU SDK is an app which opened a port on the devices of users who have any app using it installed, and had over 100 million smart phones infected. Inspired by that discovery, the researchers developed a tool they called OPAnalyser, with which they scanned over 100,000 Android-based apps, classified them according to ports they opened for data sharing, proxy, remote execution, VoIP, and PhoneGap code signature. Out of the 100,000 Android apps that were subjected to usage test, 410 apps were found to contain 956 backdoors. And the 410 apps had already been downloaded from official Google play store10 to 50 million times by different users. 2.1.6 Backdoor Attack Examples Some cyber espionage attacks as reported by techtarget’s Alexander Gillis in include, U.S. organizations and government agencies attack in 2020 through a backdoor discovered in SolarWinds’ IT management product. The company had over 300,000 customers who use the vulnerable IT product, including various U. S. government agencies. Russian state-sponsored hacking group called Cozy Bear, was suspected to be behind the cyberattack. The same Russian-state sponsored hacking group (Cozy Bear) was fingered in the attack on Norwegian Police Security Services in 2017. In this attack, emails of nine members of the Ministry of Defense and Ministry of Foreign Affairs and Labor party were phished.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 572 Attempts to hack int Dutch ministries and Ministry of General Affairs were made. The attack targeted sensitive information concerning government documents. Fancy Bear and Cozy Bear were suspected hacking bodies. Cyber espionage attacks against South Korea, Japan and Vietnam have pointed to North Korea as the suspected attacked. The country was also named in hacking Sony pictures; a state sponsored cyber attack that used malware and Server Message Block worm tool to carry out an attack considered at economic espionage. 2.2 Empirical Framework 2.2.1 E-Waste in Nigeria Aniyie (2009) described electronic waste as expired electronics, or those that have reached their life span. The author studied the materials with which these electronics are made and presents a categorization of these materials, as well as their toxicity effects at degraded state. Christopher et al (2016) observed the threats to mobile devices and infrastructure. The authors identified threats to mobile phones, through the operating system and network stacks, and recognized mobile phones as major contributor to enterprise threats. Basel group in their network report presented images of imported used IT equipment as shown in Figure 2.1. Fig2.1 Ibru Warehouse at Westminister near the Port of Apapa in Lagos. 50 Containers a week of used IT equipment arrive here. Source: Basel Action Network Report (2005) III. Methodology A. Purpose of Research The purpose of this study is to ascertain the level to which civil servants in Nigerian ministries are aware of the risk factors associated with buying used electronics, with respect to the backdoors they provide to enterprise information system. The cyber hygiene culture of the civil servants is also assessed. The result will help in awareness creation of backdoors in fairly used communication devices and PCs. B. Study Area Civil servant in Imo state were identified as target group in the pilot study. C. Materials and Methods Questionnaire was generated using google form and distributed to civil servants. The questionnaire consisted of two sections consisting of close ended questions. Section 1 collected data of general backdoor awareness, while section2 collected data on participants’ cyber hygiene practice. A measurement scale of 1-5 was used to assess the participants’ level of backdoor awareness and level of cyber hygiene. This method hides behind existing literature on robustness of statistical methods such as logistic regression to perform parametric data analysis on measurement scale chosen. Hence the researcher reiterates that a scale of 1-5 which assumes equidistance is used. The measurement type can be said to be interval which allows parametric statistical testing.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 573 D. Research Question Does backdoor awareness level amongst Nigerian civil servants affect their cyber hygiene practices? E. Hypothesis H1: Backdoor awareness level amongst Nigerian civil servants affect to the cyber hygiene practices F. Data Analysis Data collected from the survey was coded using SPSS version 20, and analyzed. IV. Result and Discussion Hypothesis testing: H1: Backdoor awareness level amongst Nigerian civil servants affect to the cyber hygiene practices Participants total backdoor awareness (TBA) was calculated by summing their scores on the seven questions that made up the domain, average total score was also calculated (ATBA) and run through descriptive statistics to obtain a mean value. Mean value is used to categorize scores (CatATBA). Participants who score below the mean value are categorized as having poor backdoor awareness, while those with scores from the mean and above are categorized as having high backdoor awareness. Total Cyber hygiene score (TCH) of participants was also calculated by summing up their scores on 5 questions that made up the domain. The total score was averaged (ATCH), ran through descriptive statistics, and the resulting mean used to categorize (CatATCH) participants with low cyber hygiene and those with high cyber hygiene culture. In order to test for the effect backdoor awareness has on cyber hygiene of civil servants, the categorized values of backdoor (CatATBA) awareness and cyber hygiene (CatATCH) culture were subjected to binary logistics regression, which is a statistical technique used to predict relationship between participants’ backdoor awareness and their cyber hygiene culture. Backdoor awareness is the independent variable while cyber hygiene is the dependent variable. Descriptive statistic result is shown in table 3.1 and table 3 below. Table 3.1 Descriptive Statistics for Average Total Backdoor Awareness (ATBA) Variable ATBA Valid N(listwise) N Statistic 300 300 Range 1.43 Minimum .0.00 Maximum 1.43 Mean 0.7997 Std. Deviation .29739 Variance 0.88 Skewness (Statistic) -234 (Std.Error) 0.141 Kurtosis (Statistic) 0.439 (Std.Error) 0.281 Mean cut off = 0.7997 Table 3.2 Descriptive Statistics for Average Total Cyber Hygiene (ATCH) Variable ATCH Valid N(listwise) N Statistic 300 300 Range 1 Minimum 1
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 574 Maximum 2 Mean 1.23 Std. Deviation 0.405 Variance 0.164 Skewness (Statistic) -0.269 (Std.Error) 0.141 Kurtosis (Statistic) -0.899 (Std.Error) 0.281 Mean cut-off = 1.23 Table 3.3 Binary Logistics Regression Result B S.E Wald df Sig. Exp(B) 95% C.I. for Exp(B) Lower Upper Step 1a CatATBA(1) 0.823 0.237 12.065 1 0.001 2.276 1.431 3.621 Constant -0.275 0.171 2.581 1 0.108 0.759 Interpretation of Result Table 3 presents result of logistics regression analysis which was carried out to find the effect participants’ backdoor awareness has on their cyber hygiene culture. Reference category is high backdoor awareness. The model was statistically significant at 0.001(< 0.05 maximum significance level). Odds of having good cyber hygiene is 2.276 times greater for people with high backdoor awareness than those with low backdoor awareness. This is also reflected in the regression weight (B=0.823), as positive regression weight shows a positive relationship between Independent and dependent variables. As backdoor awareness amongst civil servants increases, their cyber hygiene culture also increases. V. Conclusion and Recommendation The study revealed a medium level of backdoor awareness amongst Nigerian civil servants, and also showed that the higher one understands the risk factors associated with various means through which information system may be compromised, the more they increased practices geared towards keeping the safe. The researcher therefore recommends: 1. Backdoor awareness campaign among civil servants and ministerial heads. 2. Sensitizing and training organizational heads in information security best practices. 3. National measures to ensure ministerial heads are provided with secure PCs and mobile devices by the organizations they represent. 4. Frequent software updates, installing browser security software, anti-keyloggers, anti virus software, together with good cyber hygiene will provide some level of Information system protection. VI. References 1) Aniyie I. A. (2009). The Influx of Used Electronics into Africa: A Perilous Trens”, Law, Environment and Development Journal 5(1), pg 50. http://www.lead-journal.org/content/09090.pdf . Accessed 05/11/2021 2) Kurt B. (2021), “The 11 most common types of malware” 3) https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/Paul, K.(2014). “Replicant developers find and close Samsung Galaxy backdoor” 4) https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor 5) Christopher, B., Spike, D., Neil, M., Sharon, V., and Michael, P. (2016). ‘Assessing Threats to Mobile Devices & Infrastructure: The mobile Threat Catalogue’, Joshua M Franklin National Cybersecurity Center of Excellence, National Institute of Standards and Technology, Interagency Report.
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 575 6) Nicole C. M. (2017). “Smartphone security hole: Open port backdoors are widespread” 7) https://news.umich.edu/smartphone-security-hole-open-port-backdoors-are-widespread/ 8) Alexander S. G. “Cyber Espionage” 9) https://www.techtarget.com/searchsecurity/definition/cyber-espionage 10) Quartz Africa (2021). “Nigeria economy: GDP drops 6.1% in Q2 2020 https://qz.com/africa/1895582/nigeriaeconomy-gdp-drops-6-1-percent-in-q2-2020/ (accessed May 05, 2021).
Download now