Adenusi Dauda, Adekunle A. U, Ekuewa J.B, Ayediran O.R


Cyber-space is a platform where you can process, receive and send information. It includes phone
set, computer system, network, information stored on the network, network devices, all this
constitute what is being called Cyber space. This cyber space is not secure, and the process to
make it secure is known as Cyber Security. Cyber-crime refers to the series of organized crime
attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of
technical infrastructure development. Google, Wikipedia and Bing to mention a few, give
detailed answers to millions of questions every day. Cyberspace is a world that contains just
about anything one is searching for. With the advent of these advancements in information
accessibility and the advantages and applications of the internet comes an exponentially growing
disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats
concerning it now need to be taken more seriously. This paper attempts to provide an overview of
Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cybercrime and its eradication. It looks at those involved and the reasons for their involvement.
Methods of stepping up cyber security and the recommendations that would help in checking the
increasing rate of cyber-crimes were highlighted. The paper also attempts to name some
bottleneck of cybercrime and present practical and logical solutions to these threats.

Full Text:



Adebusuyi, A. (2008): The Internet and Emergence of Yahooboys sub-Culture in

Nigeria, International Journal Of Cyber-Criminology, 0794-2891, Vol.2(2) 368-381,


Amaka Eze, “Thisday Live”

Anderson, Ross, et al. (2016): Measuring the cost of cybercrime, 11th Workshop on

the Economics of Information Security (June 2016), Retrieved from

Augustine C. Odinma, MIEEE (2010): Cybercrime & Cert: Issues & Probable Policies

for Nigeria, DBI Presentation, Nov 1-2.

Background Check International, “Information Technology/Cyber Security


Ibikunle. F. and Eweniyi O. (2017): Cyber Security In Nigeria. (IJCRSEE)

International Journal of Cognitive Research in science, engineering and education. Vol.

, No.1, 2017.

International Telecommunication Union, Retrieved from

Laura, A. (2015): Cyber Crime and National Security: The Role of the Penal and

Procedural Law”,Research Fellow, Nigerian Institute of Advanced Legal Studies.,

Retrieved from

Longe, O. B, Chiemeke, S. (2018): Cyber Crime and Criminality In Nigeria – What

Roles Are Internet Access Points In Playing?, European Journal Of Social Sciences –

Volume 6, Number 4

Major General G. G UMO (2010): Cyber Threats: Implications For Nigeria’s National

Interest, Retrieved from


Mohsin, A. (2006): Cyber Crimes And Solutions, Retrieved from

Okonigene, R. E., Adekanle, B. (2009): Cybercrime In Nigeria, Business Intelligence

Journal, Retrieved from


Oliver, E. O. (2010): Being Lecture Delivered at DBI/George Mason University

Conferenceon Cyber Security holding, Department of Information Management

Technology Federal University of Technology, Owerri, 1-2 Nov.

Olumide, O. O.,Victor, F. B. (2010): E-Crime in Nigeria: Trends, Tricks, and

Treatment. The Pacific Journal of Science and Technology, Volume 11. Number 1.

May 2010 (Spring)

Roseline, O. Moses-Òkè (2012): Cyber Capacity Without Cyber Security: A Case

Study OfNigeria’s National Policy For Information Technology (NPFIT), The Journal

Of Philosophy, Science & Law Volume 12, May 30, 2012, Retrieved from


Schaeffer, B. S., et al. (2018): Cyber Crime And Cyber Security: A White Paper For

Franchisors, Licensors, and Others

Strassmann, P. A. (2014): Cyber Security for the Department Of Defense, Retrieved

July 10, 2017 From

Department of Justice, U.S. Attorney’s Office, Northern District of Georgia (2018)

“Cyber-criminal sentenced for hacking universities”

Thompson, D. (1989): Police Powers-Where’s the Evidence, Proceedings of the The

Australian Computer Abuse Inaugural Conference.


  • There are currently no refbacks.