
Chisom Elizabeth Alozie- Masters in Cybersecurity, PhD in Infomation Security (ongoing)
- PhD Student at University of the Cumberlands
Chisom Elizabeth Alozie
- Masters in Cybersecurity, PhD in Infomation Security (ongoing)
- PhD Student at University of the Cumberlands
https://orcid.org/0009-0000-0309-3650
About
27
Publications
1,153
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
31
Citations
Introduction
Current institution
Additional affiliations
February 2024 - June 2024
Publications
Publications (27)
This paper presents a comprehensive literature review on integrating big data analytics and business intelligence within Fortune 1000 companies, focusing on enhancing decision-making and operational efficiency. The study explores the challenges and opportunities these organizations face, such as data integration issues, lack of skilled personnel, a...
The rapidly evolving cybersecurity landscape presents complex challenges as adversaries adopt increasingly sophisticated Tactics, Techniques, and Procedures (TTPs) to exploit vulnerabilities across digital infrastructures. This study provides a comprehensive analysis of adversarial TTPs, emphasizing their critical role in modern cyberattacks and th...
Critical infrastructure represents the backbone of societal and economic stability, yet it remains increasingly vulnerable to sophisticated cyber threats. This article develops a comprehensive cybersecurity framework tailored to protect critical infrastructure in organizations. Utilizing a systematic literature review (SLR) and expert consultations...
This literature review examines the use of blockchain technology, specifically Zcash, in the Banking, Financial Services, and Insurance (BFSI) sector. It examines the role of zero-knowledge proofs (ZKPs) in enhancing privacy and identity verification processes. The study uses data from internet sources, whitepapers, and academic publications to ana...
This paper explores the transformative impact of Infrastructure as Code (IaC) on disaster recovery and business continuity in cloud environments. Infrastructure as Code is defined as the practice of managing and provisioning infrastructure through machine-readable code, facilitating automation, consistency, and scalability. The relevance of IaC in...
In the rapidly evolving landscape of cloud computing, disaster recovery (DR) remains a critical aspect of ensuring resilience and business continuity. This review explores the integration of Site Reliability Engineering (SRE) strategies into disaster recovery frameworks, highlighting their role in enhancing cloud-based systems' robustness and recov...
Capacity planning is crucial for optimizing resource allocation in cloud computing environments, ensuring that resources are efficiently utilized to meet demand while minimizing costs. Site Reliability Engineering (SRE) offers a systematic approach to capacity planning by integrating reliability, scalability, and operational efficiency into the man...
This research paper explores innovative cybersecurity strategies for business intelligence (BI), emphasizing their role in transforming data protection and driving competitive superiority. It examines advanced encryption techniques, AI and machine learning, and blockchain technology, highlighting how these strategies enhance data security, operatio...
The section primarily entails an understanding of the following factors: Overview of DDoS attacks, Classification of DDoS attacks, DDoS attacks operating techniques, Cloud computing system, DDoS threats on a cloud system, Owncloud platform, DDoS attack in cloud networks, method of DDoS attacks in the cloud environment DDoS attack tools used in the...
In this chapter, the Implementation design is divided into two sections, the system setup design, and the machine learning flow process design. Both are explained in detail in the section. The dataset used for the experiment was obtained from the open-source database CSE-CIC-IDS2018 (‘IDS 2018’ 2022) and the generated data set. The open-source data...
Tables 10 and 11 show the performance metric result of this experiment. The metrics used to evaluate the machine learning models are accuracy, precision, recall, f1-score, and computation time on new datasets and open-source datasets as shown in Tables 10 and 11. An 80:20 split of the overall dataset was used for the Model building where 80% was us...
In the digital age, energy infrastructure faces unprecedented cybersecurity challenges that threaten the stability and reliability of critical systems. This paper explores the current threat landscape, detailing prevalent cyber threats such as malware, ransomware, and phishing that target energy systems. It examines the technical, organizational, a...
Cloud computing is essential for modern enterprises, offering scalability and flexibility. However, its adoption raises security and privacy concerns, requiring robust frameworks to protect critical assets. This paper explores integrating baseline security measures into cloud systems within an Enterprise Risk Management (ERM) framework. Key securit...
The development of deepfake technology is now threatening the integrity and security of social media platforms. Deepfakes, which create incredibly lifelike but phony audio, video, and image content using sophisticated artificial intelligence (AI) techniques, can cause anything from political influence and disinformation to reputational harm and pri...
This paper explores the intersection of data warehouse architecture, big data, and green computing, highlighting their significance in modern information technology. The introduction emphasizes the growing importance of these fields as organizations strive to
As the world progresses towards a more connected and technologically advanced future, the evolution of wireless communication technologies plays a pivotal role in shaping the landscape of smart cities and the Internet of Things (IoT). This paper provides a comprehensive review of the anticipated impact and potential contributions of 6G technology i...
In recent years, the oil and gas industry has witnessed a significant transformation fueled by the adoption of cloud computing technologies, revolutionizing the way real-time data analysis is conducted to enhance operational efficiency. This review delves into the evolution and profound impact of cloud computing on real-time data analysis within th...
In the rapidly evolving landscape of business analytics and data management, optimizing IT governance and risk management is critical for ensuring data integrity and enhancing business decision-making processes. This paper explores innovative strategies for optimizing IT governance and risk management frameworks within the context of business analy...
In the rapidly evolving landscape of cloud computing, disaster recovery (DR) remains a critical aspect of ensuring resilience and business continuity. This review explores the integration of Site Reliability Engineering (SRE) strategies into disaster recovery frameworks, highlighting their role in enhancing cloud-based systems' robustness and recov...
Capacity planning is crucial for optimizing resource allocation in cloud computing environments, ensuring that resources are efficiently utilized to meet demand while minimizing costs. Site Reliability Engineering (SRE) offers a systematic approach to capacity planning by integrating reliability, scalability, and operational efficiency into the man...
As the world progresses towards a more connected and technologically advanced future, the evolution of wireless communication technologies plays a pivotal role in shaping the landscape of smart cities and the Internet of Things (IoT). This paper provides a comprehensive review of the anticipated impact and potential contributions of 6G technology i...
In recent years, the oil and gas industry has witnessed a significant transformation fueled by the adoption of cloud computing technologies, revolutionizing the way real-time data analysis is conducted to enhance operational efficiency. This review delves into the evolution and profound impact of cloud computing on real-time data analysis within th...
Questions
Question (1)
Trying to analyze pcap files from IOTs for malicious patterns.