Loading

A Holistic Mobile Security Framework for Nigeria
Fidelis C. Obodoeze1, Francis A. Okoye2, Calister N. Mba3, Samuel C. Asogwa4, Frank E. Ozioko5

1F.C. Obodoeze, Dept. of Computer Science, Renaissance University, Enugu, Nigeria.
2Dr. F.A. Okoye, Dept. of Computer Engr., Enugu State University of Science & Technology (ESUT), Enugu, Nigeria,
3S.C. Asogwa, Dept. of Computer Science, Michael Okpara University of Agriculture, Umudike, Nigeria.
4C.N. Mba, Dept. of Computer Engr., Caritas University, Enugu, Nigeria.
5F.E. Ozioko, Dept. of Computer and Information Science, Enugu State University of Science & Technology (ESUT), Enugu, Nigeria.

Manuscript received on 07 February 2013 | Revised Manuscript received on 21 February 2013 | Manuscript Published on 28 February 2013 | PP: 5-11 | Volume-2 Issue-3, February 2013 | Retrieval Number: B0370012213/2013©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Since the inception of mobile telecommunication in Nigeria in 2002 as Global System for mobile Telecommunication(GSM) and Code Division for Multiple Access(CDMA), there has been a meteoric rise in the number of subscribers as well as the security challenges affecting the mobile telecommunication platforms. Security challenges such as hackers’ attacks to personal data and corporate networks leading to loss of privacy and funds, the threats of malicious programs such as virus, worms, Trojans, bombs, etc as a result of massive interconnectivity to the internet by the majority of the subscribers using mobile phones as well as synchronization of mobile equipment to Personal Computers(PCs) and corporate networks , and the rampant theft of mobile equipment have been identified to constitute the greatest security challenges. This paper examines these challenges and carefully deduced from them the current existing attack models or patterns in the Nigeria telecommunication industry in order to formulate counter solutions to them. This paper finally proposed a five-model corrective and preventive security framework that can tackle and mitigate these identified security challenges if implemented.
Keywords: holistic mobile security, Nigeria, malicious program, CDMA, GSM, smart phone, SIM, IMEI, intranet, security-triad, attack models

Scope of the Article: Mobile App Security and Privacy