EFFECT OF PHARMING ATTACKS ONTHE FUNCTIONALITIES OF THE UNIVERSITY WEBSITES IN NORTHERN STATES OF NIGERIA
Abstract
This paper investigates ‘the effects of pharming attacks on the functionalities of the University websites in Northern States of Nigeria. Two research objectives were stated: to find out the types of pharming attacks University websites are exposed to; and to identify the effects of pharming attacks on functionalities of the websites of the Universities in Northern States of Nigeria. The literature was reviewed based on research questions raised. Quantitative research methodology was adopted in the study. Multistage sampling technique (i.e. purposive, stratification, cluster, proportionate and simple random sampling) was used to select 9 Universities (3 each Federal, State and Private) with 127 ICT personnel which comprised of the Directors, the staff of the Software Development Units and the staff of the Networks Infrastructure and Security Units from a population of 61 Universities with 713 ICT personnel of the Universities in Northern States of Nigeria. Questionnaire was the instrument used for data collection. The data collected were presented and analysed using mean, standard deviation, frequencies and percentages. The study found that human factors attacks, local host and local networks attacks, domain configuration attack and domain registration attack among others were the types of pharming attacks University websites in Northern States of Nigeria are exposed to; and pharming attacks do affect the functionalities of the websites of the Universities studied by causing existing administrative settings to be incorrectly configured, poisoning an entire Domain Name System server, manipulating legitimate website’s traffic and hijacking search result. Other effects include making communication system to become vulnerable, loss of confidence by stakeholders, tarnishing institution image and tricking unsuspecting individuals into revealing sensitive data among others. The paper concludes that if security safeguards are not adequate, pharmers run little risk of getting caught. They can attack a system using techniques the designers never even considered. The study recommended that Policy statements should be enforced to reduce the effects of pharming attacks on the websites of the Universities. The authorities of the Universities should also provide insurance covers for their ICT technologies and trust worthy Internet Service Providers should be maintained.
Downloads
References
Jakobsson, M., Yang, L & Wetzel, S. (2006). “Warkitting: the Drive-by Subversion of Wireless Home Routers.” The Journal of Digital Forensic Practice.
Michael, E. J. (2014). “Data Breaches: Recent Developments in the Public and Private Sectors,” A Journal of Law and Policy for the Information Society: 556, 567.
Nikiforakis, N., Invernizzi, L., Kapravelos, A., Van Acker, S., Joosen, W., Kruegel, C., Frank Piessens, F., & Vigna, G. (2012). You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). 736–747.
Ollman, G. (2005). “The Pharming Guide”. Understanding and Preventing DNS-Related Attacks by Phishers. Retrieved on 5th, August, 2018 from www.ngssofotware.com
Oshinsky, J., Masters, S.L, Lee, K., J. Briggs, C.J, & Block, J (2010). Fighting Phishing, Pharming, and Other Cyber-Attacks: Coverage for High Tech Liabilities. RMIA Journal.
Patel, J. & Panchal S.D. (2013). A survey on Pharming attack Detection and Prevention Methodology Journal of Computer Engineering (IOSR-JCE). Volume 9, Issue 1. PP 66-72. India. Gujarat Technological University, India.
Talalaev, A. (2018). 12 Web Security Tips from Experts. Retrieved 16th June, 2018 from https://medium.com.
Copyright (c) 2021 GPH - International Journal Of Computer Science and Engineering
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the GPH Journal will have the full right to remove the published article on any misconduct found in the published article.