EFFECT OF CYBERSECURITY INCIDENT PREPAREDNESS ON THE EFFICACY OF DIGITAL FORENSIC INVESTIGATIONS IN NIGERIAN FINANCIAL INSTITUTIONS

Authors

  • ADEGBEMI TITILAYO ADESOLA Author
  • SUNDAY MLANGA Author
  • GANIYU A. MUSTAPHA Author

DOI:

https://doi.org/10.65922/ctk97053

Abstract

Cybersecurity preparedness in Nigerian financial institutions faces persistent challenges from evolving cyber threats, inadequate infrastructure, and human-factor vulnerabilities that undermine the effectiveness of digital forensic investigations. This study investigates the effect of incident response planning, cybersecurity awareness and training, infrastructure investment, threat monitoring capability, and communication and coordination mechanisms on the efficacy of digital forensic investigations across banks, fintech firms, and insurance companies in Nigeria. The sample consisted of 120 cybersecurity and digital forensic professionals. Using a quantitative survey design and multiple linear regression, the study examines the influence of the five preparedness dimensions on forensic investigation outcomes. The findings reveal that all five factors significantly enhance forensic efficacy, collectively improving the speed, accuracy, and legal defensibility of digital investigations (p < 0.05). Incident response planning emerged as the strongest predictor (β = 0.328), followed by cybersecurity awareness and training (β = 0.290), threat monitoring capability (β = 0.267), infrastructure investment (β = 0.246), and communication and coordination mechanisms (β = 0.218). Grounded in the Forensic Readiness Model and Socio-Technical Systems Theory, the study recommends institutionalizing structured incident response frameworks, conducting regular cybersecurity training, and investing in forensic infrastructure and real-time monitoring to enhance cyber resilience and digital forensic capacity in Nigeria's financial sector.

Keywords: Communication Coordination Mechanism, Cybersecurity Awareness and Training, Incident Response Planning, Infrastructure Investment, Threat Monitoring Capability

Downloads

Download data is not yet available.

References

Ahmad, I., Akagha, O., Anyanwu, A., Dawodu, S., Ejairu, E., & Onwusinkwue, S. (2024). Cybersecurity challenges in smart cities: A case review of African metropolises. Computer Science & IT Research Journal, 5(2),254–269. https://doi.org/10.51594/csitrj.v5i2.756

Aksoy, C. (2024). BUILDING A CYBER SECURITY CULTURE FOR RESILIENT ORGANIZATIONS AGAINST CYBER ATTACKS. letme Ekonomi ve Yönetim Ara t rmalar Dergisi, 7(1), 96–110. https://doi.org/10.33416/baybem.1374001

Allah Rakha, N. (2024). Cybercrime and the Law: Addressing the challenges of digital forensics in criminal investigations. Mexican Law Review,23–54. https://doi.org/10.22201/iij.24485306e.2024 .2.18892

Arpilleda, J. (2023). Cybersecurity in the Smart Grid: Vulnerabilities, Threats, and Countermeasures. International Journal of Advanced Research in Science, Communication and Technology, 743–750. https://doi.org/10.48175/ijarsct-12364

Ay, O. (2020). Digital Forensics Investigation Jurisprudence: Issues Of Admissibility Of Digital Evidence. Journal of Forensic, Legal & Investigative Sciences, 6(1), 1–8. https://doi.org/10.24966/flis-733x/100045

Badsha, S., Vakilinia, I., & Sengupta, S. (2019).

Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. 0708–0714. https://doi.org/10.1109/ccwc.2019.8666477

Bhoyar, L., Mehar, P., & Chavali, K. (2024). An overview of DNA degradation and its implications in forensic caseworks. Egyptian Journal of Forensic Sciences, 14(1). https://doi.org/10.1186/s41935-024-00389-y

Blanco,C.,Santos-Olmo,A.,&Sánchez,L.E.(2024). QISS: Quantum-Enhanced Sustainable Security Incident Handling in the IoT. Information, 15(4), 181. https://doi.org/10.3390/info15040181

Budowle, B., Chakraborty, R., & Murch, R. (2005). Microbial forensics: the next forensic challenge. International Journal of Legal Medicine, 119(6), 317–330. https://doi.org/10.1007/s00414-005-0535-y

Camacho, N. G. (2024). The Role of AI in Cybersecurity: Addressing Threats in the Digital Age. Journal of Artificial Intelligence General Science (JAIGS) ISSN:3006-4023, 3(1),143–154. https://doi.org/10.60087/jaigs.v3i1.75

Cataldo, M., Herbsleb, J. D., Bass, L., & Bass, M. (2007). On Coordination Mechanisms in Global Software Development. 71–80. https://doi.org/10.1109/icgse.2007.33

Dawodu, S., Akindote, O., Adegbite, A., Omotosho, A., & Ewuga, S. (2023). Cybersecurity risk assessment in banking: Methodologies and best practices. Computer Science & IT Research Journal, 4(3), 220–243. https://doi.org/10.51594/csitrj.v4i3.659

Ebert, N., Schaltegger, T., Ambuehl, B., Schöni, L., Zimmermann, V., & Knieps, M. (2023). Learning from safety science: A way forward for studying cybersecurity incidents in organizations. Computers & Security, 134, 103435.https://doi.org/10.1016/j.cose.2023. 103435

Esposito, M., Roccuzzo, S., Zuccarello, P., Sessa, F., Cocimano, G., & Salerno, M. (2023). Advances in Technologies in Crime Scene Investigation. Diagnostics, 13(20), 3169. https://doi.org/10.3390/diagnostics1320316 9

Et Al, N. K. (2023). AI in Cybersecurity: Threat Detection and Response with Machine Learning. Tuijin Jishu/Journal of Propulsion Technology, 44(3), 38–46. https://doi.org/10.52783/tjjpt.v44.i3.237

Fakiha, B. (2023). Enhancing cyber forensics with AI and Machine Learning: A study on automated threat analysis and classification. International Journal of Safety and Security Engineering, 13(4), 701–707. https://doi.org/10.18280/ijsse.130412

Galinec, D., & Steingartner, W. (2017). Combining cybersecurity and cyber defense to achieve cyberresilience. 87-93. https://doi.org/10.1109/informatics.2 017.8327227

Gcaza, N., & Von Solms, R. (2017). A Strategy for a Cybersecurity Culture: A South African Perspective. THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 80(1), 1–17. https://doi.org/10.1002/j.1681- 4835.2017.tb00590.x

Govea, J., Gaibor-Naranjo, W., & Villegas-Ch, W. (2024). Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence. Systems, 12(5), 165. https://doi.org/10.3390/systems12050165

Hassan, A., Oladeinde, M., Abrahams, T., Abdul, A., Ewuga, S., & Dawodu, S. (2024). Cybersecurity in banking: A global perspective with a focus on Nigerian practices. Computer Science & IT Research Journal, 5(1), 41–59. https://doi.org/10.51594/csitrj.v5i1.701

Hodhod, R., Hardage, H., Abbas, S., & Aldakheel, E. A. (2023). CyberHero: An Adaptive Serious Game to Promote Cybersecurity Awareness. Electronics, 12(17), 3544. https://doi.org/10.3390/electronics12173544

I Alghamdi, M. (2021). Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities. intechopen. https://doi.org/10.5772/intechopen.94452

Kaur, H., Kumar Thakur, R., Kumar Reddy, K. V., Paul, T., Sanjaiy Sl, D., Mahato, J., & Naveen, K. (2024). Evolution of Endpoint Detection and Response (EDR) in Cyber Security: A Comprehensive Review. E3S Web of Conferences, 556, 01006. https://doi.org/10.1051/e3sconf/2024556010 06

Klein, T., & Romano, G. (2025). Optimizing Cybersecurity Incident Response via Adaptive Reinforcement Learning. Journal of Advances in Engineering and Technology, 2(1). https://doi.org/10.62177/jaet.v2i1.212

Kloosterman, A., Van Der Steen, M., Koper, C., Van Asten, A., Geradts, Z., Van Eijk, E., Mapes, A., Van Den Berg, J., & Verheij, S. (2015). The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system. Philosophical Transactions of the Royal Society B: Biological Sciences, 370(1674), 20140264. https://doi.org/10.1098/rstb.2014.0264

Macdermott, A., Shi, Q., & Baker, T. (2018). Iot Forensics: Challenges for the Ioa Era. 1–5. https://doi.org/10.1109/ntms.2018.8328748

Miracle, N. O. (2024). The Importance of Network Security in Protecting Sensitive Data and Information. International Journal of Research and Innovation in Applied Science, 9(6),259–270. https://doi.org/10.51584/ijrias.2024.906024

Mohammed, H., Li, F., & Clarke, N. (2016). An automated approach for digital forensic analysis of heterogeneous big data. Journal of Digital Forensics, Security and Law, 11(2). https://doi.org/10.15394/jdfsl.2016.1384

Mungo, JamaineDr. (2023). Self-paced cybersecurity awareness training educating retail employees to identify phishing attacks. Journal of Cyber Security Technology, 8(2), 71–119.https://doi.org/10.1080/23742917.2 023.2244210

Mustapha, A., & Sinha, A. (2024). Cyberfraud in the Nigerian Banking Sector: The Techniques and Preventive Measures. International Journal of Innovative Science and Research Technology (IJISRT), 171–179. https://doi.org/10.38124/ijisrt/ijisrt24aug395

Mutemwa, M., Mkhonto, N., & Mtsweni, J. (2017).

Developing a cyber threat intelligence sharing platform for South African organisations, 9, 1–6. https://doi.org/10.1109/ictas.2017.7920657

Naseer, H., Desouza, K., Maynard, S. B., & Ahmad, A. Nelson, Okoye, (2023). Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics. European Journal of Information Systems, 33(2),200–220. https://doi.org/10.1080/0960085x.2023.225 7168

A., Rekhi, S., Souppaya, M., & Scarfone, K. (2025). Incident response recommendations and considerations for cybersecurity risk management: National institute of standards technology.https://doi.org/10.6028/nist.sp.8 00-61r3

C., Usman, F., Mhlongo, N., Odeyemi, O., Nwankwo, E., & Ike, C. (2024). Accelerating SME growth in the African context: Harnessing FinTech, AI, and cybersecurity for economic prosperity. International Journal of Science and Research Archive, 11(1),2477–2486. https://doi.org/10.30574/ijsra.2024.11.1.023 1

Olaniyi, O. O., Oladoyinbo, T. O., Alao, A. I., Olaniyi, F. G., & Omogoroye, O. O. (2024). CyberFusion Protocols: Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem. Journal of Engineering Research and Reports, 26(6), 31–49. https://doi.org/10.9734/jerr/2024/v26i61160

Ortiz-Garcés, I., Sánchez-Viteri, S., Govea, J., & Villegas-Ch, W. (2024). CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with Artificial Intelligence. PeerJ. Computer Science, 10, e2041. https://doi.org/10.7717/peerj-cs.2041

Peruch, M., Buffon, M., Jakovski, Z., Spiliopoulou, C., Addobbati, R., Franzin, M., Magni, P. A., & D'Errico, S. (2024). Comparative Toxicological Analyses of Traditional Matrices and Blow Fly Larvae in Four Cases of Highly Decomposed Human Cadavers. Insects, 15(7), 500. https://doi.org/10.3390/insects15070500

Raghavan, S. (2012). Digital forensic research: current state of the art. CSI Transactions on ICT, 1(1), 91–114. https://doi.org/10.1007/s40012-012-0008-7

Ramakrishnan, S., & Chittibala, D. R. (2024). Enhancing Cyber Resilience: Convergence of SIEM, SOAR, and AI in 2024. International Journal of Computing and Engineering, 5(2), 36–44. https://doi.org/10.47941/ijce.1754

Raza, S. A., Tahira, K., & Shaikh, M. (2023). Cryptocurrency Investigations in Digital Forensics: Contemporary Challenges and Methodological Advances. Information Dynamics and Applications, 2(3), 126–134. https://doi.org/10.56578/ida020302

Reis, O., Obi, O., Oliha, J., & Osasona, F. (2024). Cybersecurity dynamics in Nigerian banking: Trends and strategies review. Computer Science & IT Research Journal, 5(2),336–364 https://doi.org/10.51594/csitrj.v5i2.761

Rich, M. S., & Aiken, M. P. (2024). An Interdisciplinary Approach to Enhancing Cyber Threat Prediction Utilizing Forensic Cyberpsychology and Digital Forensics. Forensic Sciences, 4(1), 110–151. https://doi.org/10.3390/forensicsci4010008

Sabillon, R., Serra-Ruiz, J., Mora, J., & Cavaller, V. (2019). An effective cybersecurity training model to support an organizational awareness program. Journal of Cases on Information Technology, 21(3), 26–39. https://doi.org/10.4018/jcit.2019070102

Saeed, S., Almuhaideb, A. M., Suayyid, S. A., Al- Ghamdi, M. S., & Al-Muhaisen, H. (2023). A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors, 23(16), 7273. https://doi.org/10.3390/s23167273

Sankaram, M., Roopesh, M., Rasetti, S., & Nishat, N. (2024). A COMPREHENSIVE REVIEW OF ARTIFICIAL INTELLIGENCE APPLICATIONS IN ENHANCING CYBERSECURITY THREAT DETECTION AND RESPONSE MECHANISMS. GLOBAL MAINSTREAM JOURNAL, 3(5), 1–14. https://doi.org/10.62304/jbedpm.v3i05.180

Saravanan, V., Santhosh, K., Tripathi, K., P, N., & Vidyasri, P. (2025). AI-Driven Cybersecurity: Enhancing Threat Detection and Mitigation with Deep Learning. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1358

Sauzier, G., Van Bronswijk, W., & Lewis, S. W. (2021). Chemometrics in forensic science: approaches and applications. The Analyst, 146(8), 2415–2448. https://doi.org/10.1039/d1an00082a

Sendjaja, T., Irwandi, I., Prastiawan, E., Suryani, Y., & Fatmawati, E. (2024). Cybersecurity In The Digital Age: Developing Robust Strategies To Protect Against Evolving Global Digital Threats And Cyber Attacks. International Journal of Science and Society, 6(1), 1008–1019. https://doi.org/10.54783/ijsoc.v6i1.1098

Serketzis, N., Baltatzis, D., Pangalos, G., Katos, V., & Ilioudis, C. (2019). Improving forensic triage efficiency through cyber threat intelligence. Future Internet, 11(7), 162. https://doi.org/10.3390/fi11070162

Tolossa, D. (2023). IMPORTANCE OF CYBERSECURITY AWARENESS TRAINING FOR EMPLOYEES IN BUSINESS. VIDYA - A JOURNAL OF GUJARAT UNIVERSITY, 2(2), 104–107. https://doi.org/10.47413/vidya.v2i2.206

Vakilinia, I., Sengupta, S., & Tosh, D. K. (2017). Privacy-preserving cybersecurityinformation exchange mechanism. 41, 1–7. https://doi.org/10.23919/spects.2017.804678 3

Werlinger, R., Muldner, K., Beznosov, K., & Hawkey, K. (2010). Preparation, detection, and analysis: the diagnostic work of IT security incident response. Information Management & Computer Security, 18(1), 26–42. https://doi.org/10.1108/09685221011035241

Xiao, J., Xu, Q., & Li, S. (2019). Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation. IEEE Access, 7, 55432–55442. https://doi.org/10.1109/access.2019.291364 8

Zaman, D., & Mazinani, M. (2023). Cybersecurity in Smart Grids: Protecting Critical Infrastructure from Cyber Attacks. SHIFRA, 2023,86–94. https://doi.org/10.70470/shifra/2023/010

Zangana, H. M., Omar, M., & Mohammed, D. (2024). Introduction to Artificial Intelligence in Cybersecurity and Forensic Science (pp. 1–24).igiglobal. https://doi.org/10.4018/979- 8-3373-0588-2.ch001

Zhang, Z. (Justin), Abdous, M., Li, W., & He, W. (2021). Cybersecurity awareness training programs: a cost–benefit analysis framework. Industrial Management & Data Systems, 121(3),613–636. https://doi.org/10.1108/imds-08-2020-0462

Downloads

Published

2025-10-30

How to Cite

ADEGBEMI, T. A., SUNDAY, M., & GANIYU, A. M. (2025). EFFECT OF CYBERSECURITY INCIDENT PREPAREDNESS ON THE EFFICACY OF DIGITAL FORENSIC INVESTIGATIONS IN NIGERIAN FINANCIAL INSTITUTIONS. ANUK College of Private Sector Accounting Journal, 2(3), 48-56. https://doi.org/10.65922/ctk97053

Most read articles by the same author(s)