• Essang ONUNTUEI Humanities Department, Greensprings School, Lagos, Nigeria



Cybercrime, Cyber Exploit, Detection, Response, Safety, Threat, Welfare


As cyber network cuts across all works of life, several endemic dangers abound. Cyber theft and loss of resources to unauthorised persons has brought a grave concern to the public despite efforts to prevent its occurrence. So, the study considered the link between percentages of systems attacked and insiders’ cyber exploits; the impact of early threat detection on prompt response to cyber-attacks, and whether the percentage of systems attacked is a function of threat response duration and cyber welfare package in Nigeria’s major oil and gas firms as well. The methods of data analysis used include Pearson product moment correlation, Chi-square, and multiple regression analysis respectively. The results of findings show a link between the percentage of systems attacked and insiders’ cyber exploits in Nigeria’s major oil and gas firms; early threat detection impacting on prompt response to cyber-attacks, and percentage of systems attacked is a function of threat response duration and cyber welfare package respectively. Also, based on findings, recommendations were made on safety, risk, and reliability of cyber network in Nigeria’s oil and gas industry.


Adelola, T., Dawson R. and Batmaz, F. (2014). ‘Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case,’ The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, pp. 234-239.

BBC Newshour Extra (2016) ‘The end of oil and its implications,’ Radio program on January 08, 2016 at 9:06 GMT.

Bhattarai, S. & Wang, Y. (2018) ‘End-to-End Trust and Security for Internet of Things Applications’ Computer (Vol. 51, Issue: 4, April 2018 ).

Braun T., Fung B., Igbal F. & Shah B. (2018) ‘Security and privacy challenges in smart cities.’ Sustainable Cities and Society. Vol. 39, Pp 499-507. DOI:

Buchanan, B. (2017) The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations Oxford University Press.

Buttar, S. (2016). ‘ICT in Higher Education’ PEOPLE: International Journal of Social Sciences Vol. 2 Issue 1, pp. 1686-1696. -

Chen, E. (2017) The Internet of Things: Opportunities, Issues, and Challenges In: The Internet of Things in the Modern Business Environment. Pp21.

Cherdantseva Y., Burnap P., Blyth A. Jones K., Soulsby H., & Stoddart K., (2016) ‘A review of cyber security risk assessment methods for SCADA systems’ Computers & Society Volume 56, February 2016, Pages 1-27.

Chou, T. (2013). ‘Security threats on cloud computing vulnerabilities’ International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013

Fishler, M. in AZ Big Media, (2015) Cyber security causes concerns about privacy; Dated: 2nd January, 2015.

Gaines C. & Rashleigh J. (2015). Are you taking the right steps when it comes to cyber security? Retrieved from:

Helms J., Salazar B., Scheibel P., Engels M., & Reiger C., (2017). Safe Active Scanning for Energy Delivery Systems Final Report. Lawrence Livermore National Security

Herrera A., Ron M. & Rabadão C. (2018) ‘National cyber-security policies oriented to BYOD (bring your own device): Systematic review’ Information Systems and Technologies (CISTI), 2017 12th Iberian Conference. DOI:

Hollnagel, E. (2018) Safety I and safety II: the past and future of safety management. London: CRC Press

Kohsamut, T. & Sucaromana, U. (2017) ‘Using Blog to Enhance English Writing Skill Among High School Students in Thailand’ PEOPLE: International Journal of Social Sciences. Volume 3 Issue 2, pp.1337-1348. DOI-

Malhotra, Y. (2017) Advancing Cyber Risk Insurance Underwriting Model Risk Management beyond VaR to Pre-Empt and Prevent the Forthcoming Global Cyber Insurance Crisis (December 7, 2017).

Nigerian National Petroleum Corporation (2016). Oil Production. Retrieved from:

Olayemi, O. (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria Vol. 6(3), pp. 116-125, Academic Journals. ISSN 2006- 988x © 2014

Orji U. (2015) ‘Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation?’ Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference

Pereira D., Hirata C., Pagliares R., Nadjm-Tehrani S. (2017) ‘Towards Combined Safety and Security Constraints Analysis’ In: Tonetta S., Schoitsch E., Bitsch F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2017. Computer Science, vol 10489. Springer, Cham Doi:

PM News Nigeria (2015) Cyber Crime in Nigeria. Dated: 6 June, 2018 (2015) Information Security Breaches Survey. Dated: 11 August 2015 Retrieved from

Raiyn, J. (2014) ‘A survey of Cyber Attack Detection Strategies’ International Journal of Security and Its Applications Vol.8, No.1 (2014), pp.247-256

Shahid, A. & Sumbul, M. (2017). ‘Social Evils In Media: Challenges And Solutions In 21st Century.’ People: International Journal Of Social Sciences, 3(3), 854-875. DOI-

Stephan R., Stereshkov V., (2018) Systems and methods for detecting and preventing cyber-threats - US Patent App. 15/628,917, 2018 - Google Patents.

Suzuki, T. (2015) ‘Practice of tablet device classes in Keio Yochisha primary school - ICT Education from primary school first grade’

The Nigerian Voice (2015).‘Cyber Crime; the Greatest Challenge of the Nigerian Youths!!!’ Dated: 10/14/2015. Retrieved from:

Trautman, L. (2015) ‘Cybersecurity: What about U.S. Policy?’ U. Ill. JL Tech. & Pol'y 341.

Xu L., He W. and Li S. (2014). ‘Internet of Things in Industries: A Survey’ IEEE Transactions on Industrial Informatics (Vol.10, Issue: 4, Nov. 2014) Page(s): 2233 – 2243




How to Cite

ONUNTUEI, E. (2018). SAFETY, RISK, AND RELIABILITY OF CYBER NETWORK IN OIL AND GAS INDUSTRY . PUPIL: International Journal of Teaching, Education and Learning, 2(2), 81–97.