Cloud computing has revolutionized how information technology resources and services are used and managed by accelerating innovation and collaboration; however, this revolution comes with a greater attack surface and increased security risk (Bello et al., 2021). Cloud security, which involves using ...
The Blog
The increased rate of intrusive activities on organizations’ networks and the sophistication of cyberattacks present challenges in accurately detecting and preventing cyber intrusions. This calls for the use of various advanced network security devices like intrusion prevention and intrusion d...
Access control is the backbone technology of ensuring information security and privacy (Qiu et al., 2020). As organizations scale up employee count, regulating access permissions is critical in preventing unauthorized access, mitigating data loss and cyber invasions. An effective access control mech...
Steganography is the science of hiding secret data within an ordinary, and non-secret file in order to avoid detection (Mohammed Abdul et al., 2021). It is a form of covert communication that offers a supplementary layer of security for a message in transit. Steganography can be used to conceal any ...
Biometric access control involves using biological, physiological, or behavioral characteristics of individuals for identification and authentication to restrict access to locations where valuable information and vital assets are stored, for instance, a data center (Kennedy Okokpujie et al., 2021). ...
In today’s business environment, the heavy reliance on information technology (IT) by governments, public and private sectors make critical infrastructures like hospitals, electric grids and the financial industry vulnerable to cyber-attacks. As a results, the threats presented by cyberwarfare are...