Journal Article

DEVELOPMENT OF AN EFFICIENT HYBRID ENCRYPTION SCHEME FOR SECURING SHORT MESSAGE SERVICE (SMS)

ABSTRACT Majority of mobile device users will prefer to preserve the privacy of their SMS communication using mobile device SMS encryption solutions. The mobile devices in use however, are highly constrained in terms of memory, power and computing capability to utilize the current SMS encryption solutions. As a result of this, there is a room …

DEVELOPMENT OF AN EFFICIENT HYBRID ENCRYPTION SCHEME FOR SECURING SHORT MESSAGE SERVICE (SMS) Read More »

SECURED APPLICATION BASED MOBILE BANKING MODEL FOR NIGERIA

ABSTRACT Fraud incidences in electronic banking is on continuous rise and if not kept in check can discourage people from embracing the electronic banking option. Nigeria has approximately 140 million active mobile subscribers and if this number should embrace mobile banking, it will promote the Government’s initiative for a cashless society. This research proposes a …

SECURED APPLICATION BASED MOBILE BANKING MODEL FOR NIGERIA Read More »

PROPOSED FRAMEWORK FOR THE EFFECTIVE DETECTION AND PREDICTION OF ADVANCED PERSISTENT THREAT BASED ON THE CYBER KILL CHAIN

ABSTRACT The cost of data breach resulting from cyber attacks is estimated to be $3.62 million dollars worldwide according to a report. Advanced Persistent Threat (APT) is a targeted cyber attack that is tailored, proceeds at a stealth and has a high objective. The state of the art security monitoring tools have failed in their …

PROPOSED FRAMEWORK FOR THE EFFECTIVE DETECTION AND PREDICTION OF ADVANCED PERSISTENT THREAT BASED ON THE CYBER KILL CHAIN Read More »

cyber attack

THE ANATOMY OF CYBER ATTACK – DISSECTING THE CYBER KILL CHAIN

ABSTRACT Cyber-attacks is on continuous rise. Many organization’s information systems have been compromised and their data stolen. Yet the number of Internet users is on the raise daily. The users are exposed to various cyber attacks of various types ranging from phishing, ransomware, cyber bullying, blackmailing and many more. This paper investigates in detail in …

THE ANATOMY OF CYBER ATTACK – DISSECTING THE CYBER KILL CHAIN Read More »

Open chat
1
Hi, how can I help you?