Page 122 - The-5th-MCAIT2021-eProceeding
P. 122

Cybersecurity Threats and Practices in Internet Café: An
                            Assessment of Cybercafé in Nigeria


                                                            c
                                        b
                                                                                             e
                                                                             d
                          a*
            Mansur Aliyu , A. S. Baiti , A. B. Tambuwal , Samaila Musa , Aminu Aliyu
                                       a Sokoto State University, Sokoto, Nigeria
                                    b,d,e Umaru Ali Shinkafi Polytechnic, Sokoto, Nigeria
                                      c Federal University Gusau, Zamfara, Nigeria
                               * Email:mansur.aliyu@ssu.edu.ng, mansuraliyu@gmail.com

        Abstract

        The Internet has grown over the years from data transmission media to global cyberspace providing access to information
        to all kinds of users. Internet Users had gone beyond sending/receiving office related work to conducting personal financial
        transactions, socializing with family and friends, and posting the tiniest details of their private life.  With these kinds of
        information  and  the  billions  of users  having  access  to  the  Internet,  a  high  cybercrime  rate  is  inevitable,  especially  in
        developing countries like Nigeria. This paper attempts to explore cybersecurity threats and practices in Internet cafés in
        selected states in Nigeria. A survey method was adopted to administer questionnaires directly to cyber café operators and
        users in Sokoto and Kebbi states. A total of sixty (60) Internet cafés and computer business centers were surveyed using
        both close-ended and open-ended questions related to their current  cybersecurity threats and practices.  The significant
        findings revealed that most cybercafé operators in the two states had knowledge and experience about cybercrime. They all
        acknowledge the risks of cybercrime, but they took insufficient measures to avert unauthorized access to their computers.
        The findings also revealed that most operators use weak administrator and user passwords to log in to their networks, with
        no strong firewalls and up-to-date antivirus software, which resulted in corrupting computer files, data hacking, personal
        and financial identities theft, denial of service, virus infection, etc. In the end, it was recommended that both the cybercafé
        operators, general users, and the government take severe steps in securing their data, information, and network infrastructure
        against cybercrimes or threats.

        Keywords: Cybersecurity; cybercrime; cybercafe; Internet; Nigeria


        1. Introduction
           Internet usage has become part of everyday life and has fundamentally changed our habits regarding data and
        information communication and processing. Nowadays, technological developments in developing countries
        have the potential to grow economic, social, and political changes. They also can advance criminal activities in
        any given country. As a nation, Nigeria has not been left behind in internet penetration and usage, primarily via
        mobile phones. It is a country prone to attacks by cybercriminals and a possible source of cybercrime activities
        (Makare, 2017). While most cybercrime attacks might target financial institutions like banks, internet users
        within  the  general  public  are  also  likely  to  become  victims  of  similar  criminal  activities  (Kshetri,  2019).
        Therefore, it is essential to assess both the awareness and preparedness level of local internet operators and users
        to deal with the threats of cyber-criminal activities.
           Cybercrime refers to any criminal activity executed through the Internet (Osho & Adepoju, 2016; Aneke, et
        al. 2020). This involves many things from denial of service, downloading illegal files, non-delivery of goods or
        services and computer intrusions (hacking) to intellectual property rights abuses, economic espionage (theft of
        trade  secrets),  online  extortion,  international  money  laundering,  identity  theft,  and  a  growing  list  of  other
        Internet-facilitated offenses (Ajeet, 2014). Cybercrime is most difficult to immediately detect the method used
        to carry out the Crime, to know precisely where and when the users carried out the Crime. The anonymity of






        E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021)   [109]
        Artificial Intelligence in the 4th Industrial Revolution
   117   118   119   120   121   122   123   124   125   126   127