SAFETY, RISK, AND RELIABILITY OF CYBER NETWORK IN OIL AND GAS INDUSTRY
DOI:
https://doi.org/10.20319/pijtel.2018.22.8197Keywords:
Cybercrime, Cyber Exploit, Detection, Response, Safety, Threat, WelfareAbstract
As cyber network cuts across all works of life, several endemic dangers abound. Cyber theft and loss of resources to unauthorised persons has brought a grave concern to the public despite efforts to prevent its occurrence. So, the study considered the link between percentages of systems attacked and insiders’ cyber exploits; the impact of early threat detection on prompt response to cyber-attacks, and whether the percentage of systems attacked is a function of threat response duration and cyber welfare package in Nigeria’s major oil and gas firms as well. The methods of data analysis used include Pearson product moment correlation, Chi-square, and multiple regression analysis respectively. The results of findings show a link between the percentage of systems attacked and insiders’ cyber exploits in Nigeria’s major oil and gas firms; early threat detection impacting on prompt response to cyber-attacks, and percentage of systems attacked is a function of threat response duration and cyber welfare package respectively. Also, based on findings, recommendations were made on safety, risk, and reliability of cyber network in Nigeria’s oil and gas industry.
References
Adelola, T., Dawson R. and Batmaz, F. (2014). ‘Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case,’ The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, pp. 234-239. https://doi.org/10.1109/ICITST.2014.7038812
BBC Newshour Extra (2016) ‘The end of oil and its implications,’ Radio program on January 08, 2016 at 9:06 GMT.
Bhattarai, S. & Wang, Y. (2018) ‘End-to-End Trust and Security for Internet of Things Applications’ Computer (Vol. 51, Issue: 4, April 2018 ). https://doi.org/10.1109/MC.2018.2141038
Braun T., Fung B., Igbal F. & Shah B. (2018) ‘Security and privacy challenges in smart cities.’ Sustainable Cities and Society. Vol. 39, Pp 499-507. DOI: https://doi.org/10.1016/j.scs.2018.02.039
Buchanan, B. (2017) The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190665012.003.0009
Buttar, S. (2016). ‘ICT in Higher Education’ PEOPLE: International Journal of Social Sciences Vol. 2 Issue 1, pp. 1686-1696. - http://dx.doi.org/10.20319/pijss.2016.s21.16861696
Chen, E. (2017) The Internet of Things: Opportunities, Issues, and Challenges In: The Internet of Things in the Modern Business Environment. Pp21. https://doi.org/10.4018/978-1-5225-2104-4.ch009
Cherdantseva Y., Burnap P., Blyth A. Jones K., Soulsby H., & Stoddart K., (2016) ‘A review of cyber security risk assessment methods for SCADA systems’ Computers & Society Volume 56, February 2016, Pages 1-27. https://doi.org/10.1016/j.cose.2015.09.009
Chou, T. (2013). ‘Security threats on cloud computing vulnerabilities’ International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013 www.academia.edu/download/39196617/5313ijcsit06.pdf
Fishler, M. in AZ Big Media, (2015) Cyber security causes concerns about privacy; Dated: 2nd January, 2015. https://azbigmedia.com/publications/arizona-bankers-association-2015-2/ https://azbigmedia.com/publications/arizona-bankers-association-2015-2/
Gaines C. & Rashleigh J. (2015). Are you taking the right steps when it comes to cyber security? Retrieved from: https://www.pwc.co.uk/issues/cyber-security-data-privacy/are-you-taking-the-right-steps-when-it-comes-to-cyber-security.html
Helms J., Salazar B., Scheibel P., Engels M., & Reiger C., (2017). Safe Active Scanning for Energy Delivery Systems Final Report. Lawrence Livermore National Security https://doi.org/10.2172/1409972
Herrera A., Ron M. & Rabadão C. (2018) ‘National cyber-security policies oriented to BYOD (bring your own device): Systematic review’ Information Systems and Technologies (CISTI), 2017 12th Iberian Conference. DOI: https://doi.org/10.23919/CISTI.2017.7975953
Hollnagel, E. (2018) Safety I and safety II: the past and future of safety management. London: CRC Press
Kohsamut, T. & Sucaromana, U. (2017) ‘Using Blog to Enhance English Writing Skill Among High School Students in Thailand’ PEOPLE: International Journal of Social Sciences. Volume 3 Issue 2, pp.1337-1348. DOI- https://doi.org/10.20319/pijss.2017.32.13371348
Malhotra, Y. (2017) Advancing Cyber Risk Insurance Underwriting Model Risk Management beyond VaR to Pre-Empt and Prevent the Forthcoming Global Cyber Insurance Crisis (December 7, 2017). https://doi.org/10.2139/ssrn.3081492
Nigerian National Petroleum Corporation (2016). Oil Production. Retrieved from: www.nnpcgroup.com/NNPCBusiness/upstreamventures/oilproduction.aspx
Olayemi, O. (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria Vol. 6(3), pp. 116-125, Academic Journals. ISSN 2006- 988x © 2014 https://doi.org/10.5897/IJSA2013.0510
Orji U. (2015) ‘Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation?’ Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference https://doi.org/10.1109/CYCON.2015.7158472
Pereira D., Hirata C., Pagliares R., Nadjm-Tehrani S. (2017) ‘Towards Combined Safety and Security Constraints Analysis’ In: Tonetta S., Schoitsch E., Bitsch F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2017. Computer Science, vol 10489. Springer, Cham Doi: https://doi.org/10.1007/978-3-319-66284-8_7
PM News Nigeria (2015) Cyber Crime in Nigeria. Dated: 6 June, 2018 http://www.pmnewsnigeria.com/2015/06/24/cyber-crime-in-nigeria/
Pwc.co.uk (2015) Information Security Breaches Survey. Dated: 11 August 2015 Retrieved from http://www.pwc.co.uk/audit-assurance/publications/2015-information-security-breaches-survey.jhtml
Raiyn, J. (2014) ‘A survey of Cyber Attack Detection Strategies’ International Journal of Security and Its Applications Vol.8, No.1 (2014), pp.247-256 https://doi.org/10.14257/ijsia.2014.8.1.23
Shahid, A. & Sumbul, M. (2017). ‘Social Evils In Media: Challenges And Solutions In 21st Century.’ People: International Journal Of Social Sciences, 3(3), 854-875. DOI- https://doi.org/10.20319/pijss.2017.33.854875
Stephan R., Stereshkov V., (2018) Systems and methods for detecting and preventing cyber-threats - US Patent App. 15/628,917, 2018 - Google Patents. https://patents.google.com/patent/US20180109558A1/en
Suzuki, T. (2015) ‘Practice of tablet device classes in Keio Yochisha primary school - ICT Education from primary school first grade’ http://grdspublishing.org/PEOPLE/people.html
The Nigerian Voice (2015).‘Cyber Crime; the Greatest Challenge of the Nigerian Youths!!!’ Dated: 10/14/2015. Retrieved from: https://www.thenigerianvoice.com/news/193648/cyber-crime-the-greatest-challenge-of-the-nigerian-youths.html
Trautman, L. (2015) ‘Cybersecurity: What about U.S. Policy?’ U. Ill. JL Tech. & Pol'y 341. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jltp2015&div=15&id=&page=
Xu L., He W. and Li S. (2014). ‘Internet of Things in Industries: A Survey’ IEEE Transactions on Industrial Informatics (Vol.10, Issue: 4, Nov. 2014) Page(s): 2233 – 2243 https://doi.org/10.1109/TII.2014.2300753
Downloads
Published
How to Cite
Issue
Section
License
Copyright of Published Articles
Author(s) retain the article copyright and publishing rights without any restrictions.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.