SAFETY, RISK, AND RELIABILITY OF CYBER NETWORK IN OIL AND GAS INDUSTRY

Authors

  • Essang ONUNTUEI Humanities Department, Greensprings School, Lagos, Nigeria

DOI:

https://doi.org/10.20319/pijtel.2018.22.8197

Keywords:

Cybercrime, Cyber Exploit, Detection, Response, Safety, Threat, Welfare

Abstract

As cyber network cuts across all works of life, several endemic dangers abound. Cyber theft and loss of resources to unauthorised persons has brought a grave concern to the public despite efforts to prevent its occurrence. So, the study considered the link between percentages of systems attacked and insiders’ cyber exploits; the impact of early threat detection on prompt response to cyber-attacks, and whether the percentage of systems attacked is a function of threat response duration and cyber welfare package in Nigeria’s major oil and gas firms as well. The methods of data analysis used include Pearson product moment correlation, Chi-square, and multiple regression analysis respectively. The results of findings show a link between the percentage of systems attacked and insiders’ cyber exploits in Nigeria’s major oil and gas firms; early threat detection impacting on prompt response to cyber-attacks, and percentage of systems attacked is a function of threat response duration and cyber welfare package respectively. Also, based on findings, recommendations were made on safety, risk, and reliability of cyber network in Nigeria’s oil and gas industry.

References

Adelola, T., Dawson R. and Batmaz, F. (2014). ‘Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case,’ The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, pp. 234-239. https://doi.org/10.1109/ICITST.2014.7038812

BBC Newshour Extra (2016) ‘The end of oil and its implications,’ Radio program on January 08, 2016 at 9:06 GMT.

Bhattarai, S. & Wang, Y. (2018) ‘End-to-End Trust and Security for Internet of Things Applications’ Computer (Vol. 51, Issue: 4, April 2018 ). https://doi.org/10.1109/MC.2018.2141038

Braun T., Fung B., Igbal F. & Shah B. (2018) ‘Security and privacy challenges in smart cities.’ Sustainable Cities and Society. Vol. 39, Pp 499-507. DOI: https://doi.org/10.1016/j.scs.2018.02.039

Buchanan, B. (2017) The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190665012.003.0009

Buttar, S. (2016). ‘ICT in Higher Education’ PEOPLE: International Journal of Social Sciences Vol. 2 Issue 1, pp. 1686-1696. - http://dx.doi.org/10.20319/pijss.2016.s21.16861696

Chen, E. (2017) The Internet of Things: Opportunities, Issues, and Challenges In: The Internet of Things in the Modern Business Environment. Pp21. https://doi.org/10.4018/978-1-5225-2104-4.ch009

Cherdantseva Y., Burnap P., Blyth A. Jones K., Soulsby H., & Stoddart K., (2016) ‘A review of cyber security risk assessment methods for SCADA systems’ Computers & Society Volume 56, February 2016, Pages 1-27. https://doi.org/10.1016/j.cose.2015.09.009

Chou, T. (2013). ‘Security threats on cloud computing vulnerabilities’ International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013 www.academia.edu/download/39196617/5313ijcsit06.pdf

Fishler, M. in AZ Big Media, (2015) Cyber security causes concerns about privacy; Dated: 2nd January, 2015. https://azbigmedia.com/publications/arizona-bankers-association-2015-2/ https://azbigmedia.com/publications/arizona-bankers-association-2015-2/

Gaines C. & Rashleigh J. (2015). Are you taking the right steps when it comes to cyber security? Retrieved from: https://www.pwc.co.uk/issues/cyber-security-data-privacy/are-you-taking-the-right-steps-when-it-comes-to-cyber-security.html

Helms J., Salazar B., Scheibel P., Engels M., & Reiger C., (2017). Safe Active Scanning for Energy Delivery Systems Final Report. Lawrence Livermore National Security https://doi.org/10.2172/1409972

Herrera A., Ron M. & Rabadão C. (2018) ‘National cyber-security policies oriented to BYOD (bring your own device): Systematic review’ Information Systems and Technologies (CISTI), 2017 12th Iberian Conference. DOI: https://doi.org/10.23919/CISTI.2017.7975953

Hollnagel, E. (2018) Safety I and safety II: the past and future of safety management. London: CRC Press

Kohsamut, T. & Sucaromana, U. (2017) ‘Using Blog to Enhance English Writing Skill Among High School Students in Thailand’ PEOPLE: International Journal of Social Sciences. Volume 3 Issue 2, pp.1337-1348. DOI- https://doi.org/10.20319/pijss.2017.32.13371348

Malhotra, Y. (2017) Advancing Cyber Risk Insurance Underwriting Model Risk Management beyond VaR to Pre-Empt and Prevent the Forthcoming Global Cyber Insurance Crisis (December 7, 2017). https://doi.org/10.2139/ssrn.3081492

Nigerian National Petroleum Corporation (2016). Oil Production. Retrieved from: www.nnpcgroup.com/NNPCBusiness/upstreamventures/oilproduction.aspx

Olayemi, O. (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria Vol. 6(3), pp. 116-125, Academic Journals. ISSN 2006- 988x © 2014 https://doi.org/10.5897/IJSA2013.0510

Orji U. (2015) ‘Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation?’ Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference https://doi.org/10.1109/CYCON.2015.7158472

Pereira D., Hirata C., Pagliares R., Nadjm-Tehrani S. (2017) ‘Towards Combined Safety and Security Constraints Analysis’ In: Tonetta S., Schoitsch E., Bitsch F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2017. Computer Science, vol 10489. Springer, Cham Doi: https://doi.org/10.1007/978-3-319-66284-8_7

PM News Nigeria (2015) Cyber Crime in Nigeria. Dated: 6 June, 2018 http://www.pmnewsnigeria.com/2015/06/24/cyber-crime-in-nigeria/

Pwc.co.uk (2015) Information Security Breaches Survey. Dated: 11 August 2015 Retrieved from http://www.pwc.co.uk/audit-assurance/publications/2015-information-security-breaches-survey.jhtml

Raiyn, J. (2014) ‘A survey of Cyber Attack Detection Strategies’ International Journal of Security and Its Applications Vol.8, No.1 (2014), pp.247-256 https://doi.org/10.14257/ijsia.2014.8.1.23

Shahid, A. & Sumbul, M. (2017). ‘Social Evils In Media: Challenges And Solutions In 21st Century.’ People: International Journal Of Social Sciences, 3(3), 854-875. DOI- https://doi.org/10.20319/pijss.2017.33.854875

Stephan R., Stereshkov V., (2018) Systems and methods for detecting and preventing cyber-threats - US Patent App. 15/628,917, 2018 - Google Patents. https://patents.google.com/patent/US20180109558A1/en

Suzuki, T. (2015) ‘Practice of tablet device classes in Keio Yochisha primary school - ICT Education from primary school first grade’ http://grdspublishing.org/PEOPLE/people.html

The Nigerian Voice (2015).‘Cyber Crime; the Greatest Challenge of the Nigerian Youths!!!’ Dated: 10/14/2015. Retrieved from: https://www.thenigerianvoice.com/news/193648/cyber-crime-the-greatest-challenge-of-the-nigerian-youths.html

Trautman, L. (2015) ‘Cybersecurity: What about U.S. Policy?’ U. Ill. JL Tech. & Pol'y 341. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jltp2015&div=15&id=&page=

Xu L., He W. and Li S. (2014). ‘Internet of Things in Industries: A Survey’ IEEE Transactions on Industrial Informatics (Vol.10, Issue: 4, Nov. 2014) Page(s): 2233 – 2243 https://doi.org/10.1109/TII.2014.2300753

Downloads

Published

2018-07-21

How to Cite

ONUNTUEI, E. (2018). SAFETY, RISK, AND RELIABILITY OF CYBER NETWORK IN OIL AND GAS INDUSTRY . PUPIL: International Journal of Teaching, Education and Learning, 2(2), 81–97. https://doi.org/10.20319/pijtel.2018.22.8197