SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 569
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil
Servants
Comfort Olebara1
1Department of Computer Science, Faculty of Physical Science, Imo State University, Owerri, Imo State, Nigeria.
-----------------------------------------------------------------------***----------------------------------------------------------------------
Abstract: In the advent of surreptitiously inserted or embedded codes on software and hardware for the espionage
purposes, the threat faced by developing countries cannot be over-emphasized. This research is geared towards
understudying importation of cheap, fairly-used (Tokunbo) mobile devices, PCs and other consumer electronics, with a view
to ascertaining the effect they have on the cyber hygiene of Nigerian civil servants, and in turn, on Nigerian Information
system. A survey was used to collect self-reported data on the backdoor awareness level and cyber hygiene practices of civil
servant. Collected data is used to test hypothesis that predicts backdoor awareness level has effect on cyber hygiene practices
of Nigerian civil servants. ta of general backdoor awareness, while section2 collected data on participants’ cyber hygiene
practice. A measurement scale of 1-5 which assumes equidistance is used to assess the participants’ level of backdoor
awareness and level of cyber hygiene. This method hides behind existing literature on robustness of statistical methods such
as logistic regression, to perform parametric data analysis on interval measurement scale chosen. Categorized data on
backdoor awareness and cyber hygiene were subjected to logistic regression. The result showed model to be statistically
significant at 0.001, and that the odds of having good cyber hygiene was 2.276 more likely for people with high backdoor
awareness than those with low backdoor awareness. Regression weight (B) agrees with the outcome, as a positive regression
weight of 0.823 showed that there exists a positive relationship between the independent and dependent variables (Increase
in backdoor awareness results in increased cyber hygiene culture. The alternative hypothesis is accepted and Null hypothesis
rejected. The researcher recommends: Backdoor awareness campaign among civil servants and ministerial heads,
Sensitizing and training organizational heads in information security best practices, National measures to ensure ministerial
heads are provided with secure PCs and mobile devices by the organizations they represent, frequent software updates,
installing browser security software, anti- keyloggers, anti virus software, together with good cyber hygiene will provide some
level ofInformation system protection.
Keywords: Espionage, Cyber Security, E-Waste, Information System, Backdoor, Cyber Hygiene.
I. Introduction
In recent years, malwares, trojans, key loggers, and various methods deployed by cyber attackers are no longer limited to
software, but has been extended to hardware, through the use of hardware backdoors. Also, the use of cloud-based services
has made it possible for installed software or hardware backdoors to be activated and various forms of espionage activities
carried out remotely. The risk users face extends to organizations they work for, as most users connect to the organization’s
network with their PC, or other mobile devices. This works aims to provide insight into the effects fairly used mobile devices and
consumer electronics have on the cyber hygiene of a developing nation.
Cyber hygiene is the level of carefulness exhibited by an internet user in order to keep their devices free from various cyber-
attack patterns. Some cyber hygiene good practices include but not limited to: Keeping PC firewall on, not opening e-mail
whose source is unknown, scanning through flashes before attaching to PC or mobile phones, updating system software
often, installing good anti-virus software. These best practices however, work only when the threat faced is software inclined.
Hardware system of attack requires physical exposure of the device to an attacker, which implies that an attacker must have
physically installed the threat. These come in the form of microcontrollers, or microprocessors, which may be part of the
original hardware, or installed for espionage, by manufacturer or other people who have had physical contact with the device.
Fairly used Mobile devices, PCs, and consumer electronics fall in the second category. These are products either traded-in by
their users, stolen and sold, or discarded by owners when obsolete. The importation and dumping of sub-standard consumer
electronics into third world countries has been adjudged lucrative to importers from different countries. This is necessitated
by the level of poverty, unemployment, and dire need to close the digital gap, as made possible by privatization of
telecommunication. Knowledge gap is constantly thinning out as a result of remote learning infrastructure, yet affordability
of required hardware resources seem far-fetched. Quartz Africa (2020) reports that about 21 million Nigerians are
unemployed, this has further been compounded by the outbreak of COVID-19, which has caused many employers to shed
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 570
work force, with many resorting to remote workers. The need for connectivity therefore, has led the citizens in third world
countries into resorting to buying mobile phones, PCs, Switches, Routers, Repeaters, from the popular “Tokunbo” market.
II. Literature Review
2.1 Conceptual Framework
2.1.1 Malware
The word “Malware” is an acronym for Malicious Software. It is a set of instructions injected into a information systems,
networks or computing devices with the sole aim of carrying out an attacker’s intent. A person who carries out the act of
injecting malicious software for personal gain is known as an attacker, and the act, which results in compromising the
integrity of the information system, hardware, network, embedded computers, or computer embodiment, is known as a
cyberattack.
Types of Malware
Table 2.1: Common Malware (Baker, 2021)
Type Action Example
Adware Presents in advertisements Fireball
Spyware Surreptitiously collects data Dark-Hotel
Trojan camouflages as legitimate file,
email
Emotet
Ransomware Denial of Service (DOS) until
ransom is given
RYUK
2.1.2 Attacker
An attacker is someone who tries to gain access to a device or network unlawfully, with the intention of stealing information,
causing harm.
2.1.3 Cyber-Attack
Cyber-attacks may be engaged in by individuals, organizations, or nations, and for reasons ranging from fraud, espionage,
recipe theft, and other reasons for which an attacker considers it necessary.
Keyloggers steals keystrokes such as Pins
and passwords
Olympic Vision
Bots Uses AI to launch multiple
attacks
Echobot
Worms Replicates through victim’s
network
Stuxnex
Rootkits Used by hackers to take control
of victim’s device
Zacinlo
Fileless Malware Alters system software files, not
application software files
Astaroth
Mobile Malware Used in Mobile phone attack Triada
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 571
2.1.4 Backdoor
Backdoor is a means of stealthily gaining access to computer, embedded system, or associated devices such as IoT devices.
Backdoors, as the name imply, bypass system passwords, encryption algorithms, authentication algorithms, and various
security protocols, to gain access into the targeted system. Two main backdoor methods are recognized: Software backdoors
and hardware backdoors.
Software backdoors are those codes injected into source codes, object codes or compilers. Those inserted into source codes,
which are the high-level human readable codes, may be discovered through inspection of the source code. Object code
software backdoors are those inserted into the machine-readable object code either during compilation or on the disk-based
object code, hence they are difficult to detect through physical examination. Detection of anomaly in object code can be
achieved through checking program length, “Checksum analysis” or “object code disassembling”.
Hardware backdoors are the codes burned to computer hardware or firmware. These are usually used to compromise
integrated circuits, which are silicon wafer fabricated materials. The integrated circuits may be any of capacitors,
Microprocessors, Microcontrollers, oscillators, magnifiers, resistors.
ICs are manufactured for a specific purpose, Microprocessors and Microcontrollers, though IC, are programmable, and
the embedded codes can be reprogrammed to carry out any task the programmer chooses. Programming microcontrollers are
carried out using a device called “chip programmer”. The chip programmer is attached to a PC through a USB port and
installed into the PC. Microcontroller chip legs are attached to the programmer in programmer IDE. Microcontrollers differ in
make, shape, and size. Some of the legs are input, some for output, some are for storage (memory), while the others are for
processing.
2.1.5 Backdoor Discoveries
A developer of “Replicant Project”, Paul Kocialkowski reported the discovery of a backdoor in Android Operating system
running on Samsung Galaxy devices. The backdoor, a technical issue in the Android Radio Interface Layer (RIL), runs in the
devices’ processor baseband that controls communication with modems. RIL and Inter Process communication protocol (IPC
protocol) in the Samsung device allow modem to carry out input/output operations on file systems through Receive Flow
Steering (RFS) commands. RIL, while allowing the user perform read, write, update, delete operations on phone storage,
provides a backdoor for the same operations to be remotely carried out (Paul, 2014). To investigate the open modem port,
the researcher added some codes to the modem kernel driver. The patch program, when implemented will: Open
data/radio/test file, read its content, and then close it.
Another celebrated backdoor find is the research outcome at university of Michigan. The researchers in 2017, inspired by a
previous vulnerability in Linux kernel, called 2015 BAIDU SDK BAIDU SDK is an app which opened a port on the devices of
users who have any app using it installed, and had over 100 million smart phones infected. Inspired by that discovery, the
researchers developed a tool they called OPAnalyser, with which they scanned over 100,000 Android-based apps, classified
them according to ports they opened for data sharing, proxy, remote execution, VoIP, and PhoneGap code signature. Out of the
100,000 Android apps that were subjected to usage test, 410 apps were found to contain 956 backdoors. And the 410 apps
had already been downloaded from official Google play store10 to 50 million times by different users.
2.1.6 Backdoor Attack Examples
Some cyber espionage attacks as reported by techtarget’s Alexander Gillis in include, U.S. organizations and government
agencies attack in 2020 through a backdoor discovered in SolarWinds’ IT management product. The company had over
300,000 customers who use the vulnerable IT product, including various U. S. government agencies. Russian state-sponsored
hacking group called Cozy Bear, was suspected to be behind the cyberattack.
The same Russian-state sponsored hacking group (Cozy Bear) was fingered in the attack on Norwegian Police Security
Services in 2017. In this attack, emails of nine members of the Ministry of Defense and Ministry of Foreign Affairs and Labor
party were phished.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 572
Attempts to hack int Dutch ministries and Ministry of General Affairs were made. The attack targeted sensitive information
concerning government documents. Fancy Bear and Cozy Bear were suspected hacking bodies.
Cyber espionage attacks against South Korea, Japan and Vietnam have pointed to North Korea as the suspected attacked. The
country was also named in hacking Sony pictures; a state sponsored cyber attack that used malware and Server Message Block
worm tool to carry out an attack considered at economic espionage.
2.2 Empirical Framework
2.2.1 E-Waste in Nigeria
Aniyie (2009) described electronic waste as expired electronics, or those that have reached their life span. The author studied
the materials with which these electronics are made and presents a categorization of these materials, as well as their toxicity
effects at degraded state. Christopher et al (2016) observed the threats to mobile devices and infrastructure. The authors
identified threats to mobile phones, through the operating system and network stacks, and recognized mobile phones as
major contributor to enterprise threats. Basel group in their network report presented images of imported used IT equipment
as shown in Figure 2.1.
Fig2.1 Ibru Warehouse at Westminister near the Port of Apapa in Lagos. 50
Containers a week of used IT equipment arrive here.
Source: Basel Action Network Report (2005)
III. Methodology
A. Purpose of Research
The purpose of this study is to ascertain the level to which civil servants in Nigerian ministries are aware of the risk factors
associated with buying used electronics, with respect to the backdoors they provide to enterprise information system. The
cyber hygiene culture of the civil servants is also assessed. The result will help in awareness creation of backdoors in fairly
used communication devices and PCs.
B. Study Area
Civil servant in Imo state were identified as target group in the pilot study.
C. Materials and Methods
Questionnaire was generated using google form and distributed to civil servants. The questionnaire consisted of two sections
consisting of close ended questions. Section 1 collected data of general backdoor awareness, while section2 collected data on
participants’ cyber hygiene practice. A measurement scale of
1-5 was used to assess the participants’ level of backdoor awareness and level of cyber hygiene. This method hides behind
existing literature on robustness of statistical methods such as logistic regression to perform parametric data analysis on
measurement scale chosen. Hence the researcher reiterates that a scale of 1-5 which assumes equidistance is used. The
measurement type can be said to be interval which allows parametric statistical testing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 573
D. Research Question
Does backdoor awareness level amongst Nigerian civil servants affect their cyber hygiene practices?
E. Hypothesis
H1: Backdoor awareness level amongst Nigerian civil servants affect to the cyber hygiene practices
F. Data Analysis
Data collected from the survey was coded using SPSS version 20, and analyzed.
IV. Result and Discussion
Hypothesis testing: H1: Backdoor awareness level amongst Nigerian civil servants affect to the cyber hygiene
practices
Participants total backdoor awareness (TBA) was calculated by summing their scores on the seven questions that made up
the domain, average total score was also calculated (ATBA) and run through descriptive statistics to obtain a mean value.
Mean value is used to categorize scores (CatATBA). Participants who score below the mean value are categorized as having
poor backdoor awareness, while those with scores from the mean and above are categorized as having high backdoor
awareness. Total Cyber hygiene score (TCH) of participants was also calculated by summing up their scores on 5 questions
that made up the domain. The total score was averaged (ATCH), ran through descriptive statistics, and the resulting mean used
to categorize (CatATCH) participants with low cyber hygiene and those with high cyber hygiene culture.
In order to test for the effect backdoor awareness has on cyber hygiene of civil servants, the categorized values of backdoor
(CatATBA) awareness and cyber hygiene (CatATCH) culture were subjected to binary logistics regression, which is a
statistical technique used to predict relationship between participants’ backdoor awareness and their cyber hygiene culture.
Backdoor awareness is the independent variable while cyber hygiene is the dependent variable.
Descriptive statistic result is shown in table 3.1 and table 3 below.
Table 3.1 Descriptive Statistics for Average Total Backdoor Awareness (ATBA)
Variable ATBA Valid
N(listwise)
N Statistic 300 300
Range 1.43
Minimum .0.00
Maximum 1.43
Mean 0.7997
Std. Deviation .29739
Variance 0.88
Skewness (Statistic) -234
(Std.Error) 0.141
Kurtosis (Statistic) 0.439
(Std.Error) 0.281
Mean cut off = 0.7997
Table 3.2 Descriptive Statistics for Average Total Cyber Hygiene (ATCH)
Variable ATCH Valid
N(listwise)
N Statistic 300 300
Range 1
Minimum 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 574
Maximum 2
Mean 1.23
Std. Deviation 0.405
Variance 0.164
Skewness (Statistic) -0.269
(Std.Error) 0.141
Kurtosis (Statistic) -0.899
(Std.Error) 0.281
Mean cut-off = 1.23
Table 3.3 Binary Logistics Regression Result
B S.E Wald df Sig. Exp(B) 95% C.I. for Exp(B)
Lower Upper
Step 1a
CatATBA(1)
0.823 0.237 12.065 1 0.001 2.276 1.431 3.621
Constant -0.275 0.171 2.581 1 0.108 0.759
Interpretation of Result
Table 3 presents result of logistics regression analysis which was carried out to find the effect participants’ backdoor
awareness has on their cyber hygiene culture. Reference category is high backdoor awareness. The model was statistically
significant at 0.001(< 0.05 maximum significance level). Odds of having good cyber hygiene is 2.276 times greater for people
with high backdoor awareness than those with low backdoor awareness. This is also reflected in the regression weight
(B=0.823), as positive regression weight shows a positive relationship between Independent and dependent variables. As
backdoor awareness amongst civil servants increases, their cyber hygiene culture also increases.
V. Conclusion and Recommendation
The study revealed a medium level of backdoor awareness amongst Nigerian civil servants, and also showed that the higher
one understands the risk factors associated with various means through which information system may be compromised, the
more they increased practices geared towards keeping the safe. The researcher therefore recommends:
1. Backdoor awareness campaign among civil servants and ministerial heads.
2. Sensitizing and training organizational heads in information security best practices.
3. National measures to ensure ministerial heads are provided with secure PCs and mobile devices by the organizations
they represent.
4. Frequent software updates, installing browser security software, anti-keyloggers, anti virus software, together with
good cyber hygiene will provide some level of Information system protection.
VI. References
1) Aniyie I. A. (2009). The Influx of Used Electronics into Africa: A Perilous Trens”, Law, Environment and
Development Journal 5(1), pg 50. http://www.lead-journal.org/content/09090.pdf . Accessed 05/11/2021
2) Kurt B. (2021), “The 11 most common types of malware”
3) https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/Paul, K.(2014). “Replicant
developers find and close Samsung Galaxy backdoor”
4) https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor
5) Christopher, B., Spike, D., Neil, M., Sharon, V., and Michael, P. (2016). ‘Assessing Threats to Mobile Devices &
Infrastructure: The mobile Threat Catalogue’, Joshua M Franklin National Cybersecurity Center of Excellence,
National Institute of Standards and Technology, Interagency Report.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 575
6) Nicole C. M. (2017). “Smartphone security hole: Open port backdoors are widespread”
7) https://news.umich.edu/smartphone-security-hole-open-port-backdoors-are-widespread/
8) Alexander S. G. “Cyber Espionage”
9) https://www.techtarget.com/searchsecurity/definition/cyber-espionage
10) Quartz Africa (2021). “Nigeria economy: GDP drops 6.1% in Q2 2020
https://qz.com/africa/1895582/nigeriaeconomy-gdp-drops-6-1-percent-in-q2-2020/ (accessed May 05, 2021).

More Related Content

Similar to Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants

Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Educationijtsrd
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxpdevang
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
 

Similar to Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants (20)

Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 

Recently uploaded (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 

Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 569 Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Servants Comfort Olebara1 1Department of Computer Science, Faculty of Physical Science, Imo State University, Owerri, Imo State, Nigeria. -----------------------------------------------------------------------***---------------------------------------------------------------------- Abstract: In the advent of surreptitiously inserted or embedded codes on software and hardware for the espionage purposes, the threat faced by developing countries cannot be over-emphasized. This research is geared towards understudying importation of cheap, fairly-used (Tokunbo) mobile devices, PCs and other consumer electronics, with a view to ascertaining the effect they have on the cyber hygiene of Nigerian civil servants, and in turn, on Nigerian Information system. A survey was used to collect self-reported data on the backdoor awareness level and cyber hygiene practices of civil servant. Collected data is used to test hypothesis that predicts backdoor awareness level has effect on cyber hygiene practices of Nigerian civil servants. ta of general backdoor awareness, while section2 collected data on participants’ cyber hygiene practice. A measurement scale of 1-5 which assumes equidistance is used to assess the participants’ level of backdoor awareness and level of cyber hygiene. This method hides behind existing literature on robustness of statistical methods such as logistic regression, to perform parametric data analysis on interval measurement scale chosen. Categorized data on backdoor awareness and cyber hygiene were subjected to logistic regression. The result showed model to be statistically significant at 0.001, and that the odds of having good cyber hygiene was 2.276 more likely for people with high backdoor awareness than those with low backdoor awareness. Regression weight (B) agrees with the outcome, as a positive regression weight of 0.823 showed that there exists a positive relationship between the independent and dependent variables (Increase in backdoor awareness results in increased cyber hygiene culture. The alternative hypothesis is accepted and Null hypothesis rejected. The researcher recommends: Backdoor awareness campaign among civil servants and ministerial heads, Sensitizing and training organizational heads in information security best practices, National measures to ensure ministerial heads are provided with secure PCs and mobile devices by the organizations they represent, frequent software updates, installing browser security software, anti- keyloggers, anti virus software, together with good cyber hygiene will provide some level ofInformation system protection. Keywords: Espionage, Cyber Security, E-Waste, Information System, Backdoor, Cyber Hygiene. I. Introduction In recent years, malwares, trojans, key loggers, and various methods deployed by cyber attackers are no longer limited to software, but has been extended to hardware, through the use of hardware backdoors. Also, the use of cloud-based services has made it possible for installed software or hardware backdoors to be activated and various forms of espionage activities carried out remotely. The risk users face extends to organizations they work for, as most users connect to the organization’s network with their PC, or other mobile devices. This works aims to provide insight into the effects fairly used mobile devices and consumer electronics have on the cyber hygiene of a developing nation. Cyber hygiene is the level of carefulness exhibited by an internet user in order to keep their devices free from various cyber- attack patterns. Some cyber hygiene good practices include but not limited to: Keeping PC firewall on, not opening e-mail whose source is unknown, scanning through flashes before attaching to PC or mobile phones, updating system software often, installing good anti-virus software. These best practices however, work only when the threat faced is software inclined. Hardware system of attack requires physical exposure of the device to an attacker, which implies that an attacker must have physically installed the threat. These come in the form of microcontrollers, or microprocessors, which may be part of the original hardware, or installed for espionage, by manufacturer or other people who have had physical contact with the device. Fairly used Mobile devices, PCs, and consumer electronics fall in the second category. These are products either traded-in by their users, stolen and sold, or discarded by owners when obsolete. The importation and dumping of sub-standard consumer electronics into third world countries has been adjudged lucrative to importers from different countries. This is necessitated by the level of poverty, unemployment, and dire need to close the digital gap, as made possible by privatization of telecommunication. Knowledge gap is constantly thinning out as a result of remote learning infrastructure, yet affordability of required hardware resources seem far-fetched. Quartz Africa (2020) reports that about 21 million Nigerians are unemployed, this has further been compounded by the outbreak of COVID-19, which has caused many employers to shed
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 570 work force, with many resorting to remote workers. The need for connectivity therefore, has led the citizens in third world countries into resorting to buying mobile phones, PCs, Switches, Routers, Repeaters, from the popular “Tokunbo” market. II. Literature Review 2.1 Conceptual Framework 2.1.1 Malware The word “Malware” is an acronym for Malicious Software. It is a set of instructions injected into a information systems, networks or computing devices with the sole aim of carrying out an attacker’s intent. A person who carries out the act of injecting malicious software for personal gain is known as an attacker, and the act, which results in compromising the integrity of the information system, hardware, network, embedded computers, or computer embodiment, is known as a cyberattack. Types of Malware Table 2.1: Common Malware (Baker, 2021) Type Action Example Adware Presents in advertisements Fireball Spyware Surreptitiously collects data Dark-Hotel Trojan camouflages as legitimate file, email Emotet Ransomware Denial of Service (DOS) until ransom is given RYUK 2.1.2 Attacker An attacker is someone who tries to gain access to a device or network unlawfully, with the intention of stealing information, causing harm. 2.1.3 Cyber-Attack Cyber-attacks may be engaged in by individuals, organizations, or nations, and for reasons ranging from fraud, espionage, recipe theft, and other reasons for which an attacker considers it necessary. Keyloggers steals keystrokes such as Pins and passwords Olympic Vision Bots Uses AI to launch multiple attacks Echobot Worms Replicates through victim’s network Stuxnex Rootkits Used by hackers to take control of victim’s device Zacinlo Fileless Malware Alters system software files, not application software files Astaroth Mobile Malware Used in Mobile phone attack Triada
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 571 2.1.4 Backdoor Backdoor is a means of stealthily gaining access to computer, embedded system, or associated devices such as IoT devices. Backdoors, as the name imply, bypass system passwords, encryption algorithms, authentication algorithms, and various security protocols, to gain access into the targeted system. Two main backdoor methods are recognized: Software backdoors and hardware backdoors. Software backdoors are those codes injected into source codes, object codes or compilers. Those inserted into source codes, which are the high-level human readable codes, may be discovered through inspection of the source code. Object code software backdoors are those inserted into the machine-readable object code either during compilation or on the disk-based object code, hence they are difficult to detect through physical examination. Detection of anomaly in object code can be achieved through checking program length, “Checksum analysis” or “object code disassembling”. Hardware backdoors are the codes burned to computer hardware or firmware. These are usually used to compromise integrated circuits, which are silicon wafer fabricated materials. The integrated circuits may be any of capacitors, Microprocessors, Microcontrollers, oscillators, magnifiers, resistors. ICs are manufactured for a specific purpose, Microprocessors and Microcontrollers, though IC, are programmable, and the embedded codes can be reprogrammed to carry out any task the programmer chooses. Programming microcontrollers are carried out using a device called “chip programmer”. The chip programmer is attached to a PC through a USB port and installed into the PC. Microcontroller chip legs are attached to the programmer in programmer IDE. Microcontrollers differ in make, shape, and size. Some of the legs are input, some for output, some are for storage (memory), while the others are for processing. 2.1.5 Backdoor Discoveries A developer of “Replicant Project”, Paul Kocialkowski reported the discovery of a backdoor in Android Operating system running on Samsung Galaxy devices. The backdoor, a technical issue in the Android Radio Interface Layer (RIL), runs in the devices’ processor baseband that controls communication with modems. RIL and Inter Process communication protocol (IPC protocol) in the Samsung device allow modem to carry out input/output operations on file systems through Receive Flow Steering (RFS) commands. RIL, while allowing the user perform read, write, update, delete operations on phone storage, provides a backdoor for the same operations to be remotely carried out (Paul, 2014). To investigate the open modem port, the researcher added some codes to the modem kernel driver. The patch program, when implemented will: Open data/radio/test file, read its content, and then close it. Another celebrated backdoor find is the research outcome at university of Michigan. The researchers in 2017, inspired by a previous vulnerability in Linux kernel, called 2015 BAIDU SDK BAIDU SDK is an app which opened a port on the devices of users who have any app using it installed, and had over 100 million smart phones infected. Inspired by that discovery, the researchers developed a tool they called OPAnalyser, with which they scanned over 100,000 Android-based apps, classified them according to ports they opened for data sharing, proxy, remote execution, VoIP, and PhoneGap code signature. Out of the 100,000 Android apps that were subjected to usage test, 410 apps were found to contain 956 backdoors. And the 410 apps had already been downloaded from official Google play store10 to 50 million times by different users. 2.1.6 Backdoor Attack Examples Some cyber espionage attacks as reported by techtarget’s Alexander Gillis in include, U.S. organizations and government agencies attack in 2020 through a backdoor discovered in SolarWinds’ IT management product. The company had over 300,000 customers who use the vulnerable IT product, including various U. S. government agencies. Russian state-sponsored hacking group called Cozy Bear, was suspected to be behind the cyberattack. The same Russian-state sponsored hacking group (Cozy Bear) was fingered in the attack on Norwegian Police Security Services in 2017. In this attack, emails of nine members of the Ministry of Defense and Ministry of Foreign Affairs and Labor party were phished.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 572 Attempts to hack int Dutch ministries and Ministry of General Affairs were made. The attack targeted sensitive information concerning government documents. Fancy Bear and Cozy Bear were suspected hacking bodies. Cyber espionage attacks against South Korea, Japan and Vietnam have pointed to North Korea as the suspected attacked. The country was also named in hacking Sony pictures; a state sponsored cyber attack that used malware and Server Message Block worm tool to carry out an attack considered at economic espionage. 2.2 Empirical Framework 2.2.1 E-Waste in Nigeria Aniyie (2009) described electronic waste as expired electronics, or those that have reached their life span. The author studied the materials with which these electronics are made and presents a categorization of these materials, as well as their toxicity effects at degraded state. Christopher et al (2016) observed the threats to mobile devices and infrastructure. The authors identified threats to mobile phones, through the operating system and network stacks, and recognized mobile phones as major contributor to enterprise threats. Basel group in their network report presented images of imported used IT equipment as shown in Figure 2.1. Fig2.1 Ibru Warehouse at Westminister near the Port of Apapa in Lagos. 50 Containers a week of used IT equipment arrive here. Source: Basel Action Network Report (2005) III. Methodology A. Purpose of Research The purpose of this study is to ascertain the level to which civil servants in Nigerian ministries are aware of the risk factors associated with buying used electronics, with respect to the backdoors they provide to enterprise information system. The cyber hygiene culture of the civil servants is also assessed. The result will help in awareness creation of backdoors in fairly used communication devices and PCs. B. Study Area Civil servant in Imo state were identified as target group in the pilot study. C. Materials and Methods Questionnaire was generated using google form and distributed to civil servants. The questionnaire consisted of two sections consisting of close ended questions. Section 1 collected data of general backdoor awareness, while section2 collected data on participants’ cyber hygiene practice. A measurement scale of 1-5 was used to assess the participants’ level of backdoor awareness and level of cyber hygiene. This method hides behind existing literature on robustness of statistical methods such as logistic regression to perform parametric data analysis on measurement scale chosen. Hence the researcher reiterates that a scale of 1-5 which assumes equidistance is used. The measurement type can be said to be interval which allows parametric statistical testing.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 573 D. Research Question Does backdoor awareness level amongst Nigerian civil servants affect their cyber hygiene practices? E. Hypothesis H1: Backdoor awareness level amongst Nigerian civil servants affect to the cyber hygiene practices F. Data Analysis Data collected from the survey was coded using SPSS version 20, and analyzed. IV. Result and Discussion Hypothesis testing: H1: Backdoor awareness level amongst Nigerian civil servants affect to the cyber hygiene practices Participants total backdoor awareness (TBA) was calculated by summing their scores on the seven questions that made up the domain, average total score was also calculated (ATBA) and run through descriptive statistics to obtain a mean value. Mean value is used to categorize scores (CatATBA). Participants who score below the mean value are categorized as having poor backdoor awareness, while those with scores from the mean and above are categorized as having high backdoor awareness. Total Cyber hygiene score (TCH) of participants was also calculated by summing up their scores on 5 questions that made up the domain. The total score was averaged (ATCH), ran through descriptive statistics, and the resulting mean used to categorize (CatATCH) participants with low cyber hygiene and those with high cyber hygiene culture. In order to test for the effect backdoor awareness has on cyber hygiene of civil servants, the categorized values of backdoor (CatATBA) awareness and cyber hygiene (CatATCH) culture were subjected to binary logistics regression, which is a statistical technique used to predict relationship between participants’ backdoor awareness and their cyber hygiene culture. Backdoor awareness is the independent variable while cyber hygiene is the dependent variable. Descriptive statistic result is shown in table 3.1 and table 3 below. Table 3.1 Descriptive Statistics for Average Total Backdoor Awareness (ATBA) Variable ATBA Valid N(listwise) N Statistic 300 300 Range 1.43 Minimum .0.00 Maximum 1.43 Mean 0.7997 Std. Deviation .29739 Variance 0.88 Skewness (Statistic) -234 (Std.Error) 0.141 Kurtosis (Statistic) 0.439 (Std.Error) 0.281 Mean cut off = 0.7997 Table 3.2 Descriptive Statistics for Average Total Cyber Hygiene (ATCH) Variable ATCH Valid N(listwise) N Statistic 300 300 Range 1 Minimum 1
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 574 Maximum 2 Mean 1.23 Std. Deviation 0.405 Variance 0.164 Skewness (Statistic) -0.269 (Std.Error) 0.141 Kurtosis (Statistic) -0.899 (Std.Error) 0.281 Mean cut-off = 1.23 Table 3.3 Binary Logistics Regression Result B S.E Wald df Sig. Exp(B) 95% C.I. for Exp(B) Lower Upper Step 1a CatATBA(1) 0.823 0.237 12.065 1 0.001 2.276 1.431 3.621 Constant -0.275 0.171 2.581 1 0.108 0.759 Interpretation of Result Table 3 presents result of logistics regression analysis which was carried out to find the effect participants’ backdoor awareness has on their cyber hygiene culture. Reference category is high backdoor awareness. The model was statistically significant at 0.001(< 0.05 maximum significance level). Odds of having good cyber hygiene is 2.276 times greater for people with high backdoor awareness than those with low backdoor awareness. This is also reflected in the regression weight (B=0.823), as positive regression weight shows a positive relationship between Independent and dependent variables. As backdoor awareness amongst civil servants increases, their cyber hygiene culture also increases. V. Conclusion and Recommendation The study revealed a medium level of backdoor awareness amongst Nigerian civil servants, and also showed that the higher one understands the risk factors associated with various means through which information system may be compromised, the more they increased practices geared towards keeping the safe. The researcher therefore recommends: 1. Backdoor awareness campaign among civil servants and ministerial heads. 2. Sensitizing and training organizational heads in information security best practices. 3. National measures to ensure ministerial heads are provided with secure PCs and mobile devices by the organizations they represent. 4. Frequent software updates, installing browser security software, anti-keyloggers, anti virus software, together with good cyber hygiene will provide some level of Information system protection. VI. References 1) Aniyie I. A. (2009). The Influx of Used Electronics into Africa: A Perilous Trens”, Law, Environment and Development Journal 5(1), pg 50. http://www.lead-journal.org/content/09090.pdf . Accessed 05/11/2021 2) Kurt B. (2021), “The 11 most common types of malware” 3) https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/Paul, K.(2014). “Replicant developers find and close Samsung Galaxy backdoor” 4) https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor 5) Christopher, B., Spike, D., Neil, M., Sharon, V., and Michael, P. (2016). ‘Assessing Threats to Mobile Devices & Infrastructure: The mobile Threat Catalogue’, Joshua M Franklin National Cybersecurity Center of Excellence, National Institute of Standards and Technology, Interagency Report.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 575 6) Nicole C. M. (2017). “Smartphone security hole: Open port backdoors are widespread” 7) https://news.umich.edu/smartphone-security-hole-open-port-backdoors-are-widespread/ 8) Alexander S. G. “Cyber Espionage” 9) https://www.techtarget.com/searchsecurity/definition/cyber-espionage 10) Quartz Africa (2021). “Nigeria economy: GDP drops 6.1% in Q2 2020 https://qz.com/africa/1895582/nigeriaeconomy-gdp-drops-6-1-percent-in-q2-2020/ (accessed May 05, 2021).