Adekunle E . Durosinmi - Academia.edu (original) (raw)

Uploads

Conference Presentations by Adekunle E . Durosinmi

Research paper thumbnail of Social Engineering Threats and Applicable Countermeasures

African Journal of Computing & ICT , 2015

The Information and Communication Technology (ICT) security in a socio-technical world was explor... more The Information and Communication Technology (ICT) security in a socio-technical world was explored and focus made in particular on the susceptibility to social engineering attacks, Social engineering is the most commonly used tactic across all levels of adversaries to gain unauthorized access into a network. While many organizations attempt to implement a policy and technical capabilities to mitigate against this threat, network intrusions through social engineering attacks are often still highly successful. A proven way to assess an organization's risk to these threats is to test the effectiveness of existing technical and organizational protections, starting with the security awareness of personnel. Most social engineering takes place via email, text message and phone. However, tactics can include simply walking in the front door behind someone possessing a valid badge, or dropping portable USB drives in the parking lot and waiting for an unsuspecting employee to plug them into their work computer. Whatever form social engineering takes, businesses and organizations are largely unprepared for how to effectively counter these attempts across their workforces. Getting employees' attention and commitment to vigilance can be difficult without proving how easy those employees can be exploited. This paper explores this social engineering attack; analyze counter measures against the attack and makes recommendations on how it can be mitigated.

Research paper thumbnail of Understanding Cyber Criminals Multifaceted Techniques for Phishing and Pharming

Proceedings of the iSTEAMS Multidisciplinary Cross-Border Conference University of Professional Studies, Accra Ghana, 2016

The challenges associated with the phishing & Pharming problems are presente. Their typologies ar... more The challenges associated with the phishing & Pharming problems are presente. Their typologies are also identified and recommendations on how both can be mitigated are proferred.

Research paper thumbnail of The Benefits and Challenges of E-Health Applications in Developing Nations: A Review

14th ISTEAMS CONFERENCE, AL-HIKMAH UNIVERSITY, ILORIN, 2018

This paper is presented to contribute to the benefits and challenges of the Healthcare system in ... more This paper is presented to contribute to the benefits and challenges of the Healthcare system in developing nations with daily increase in population, how ICT could be of important aid to the cause. First, its argues that the health sector is best conceptualized as a 'knowledge economy'. This supports a broadened view health service provision that includes formal and informal arrangements for the provision of medical advice and drugs, this is particularly important in countries with a pluralistic health system with relatively underdeveloped institutional arrangement. By using ICT, the quality of healthcare can be increased, or standards can be maintained with fewer people and at lower cost. Many companies are now working on excellent eHealth innovations, as we all know the aim of Information and Communication Technologies (ICT) for Health (also known as eHealth) is to improve significantly the quality, access and efficacy of healthcare for all citizens. ICT for Health describes the application of information and communication technologies across the whole range of functions that affect the health sector.

Papers by Adekunle E . Durosinmi

Research paper thumbnail of Digitalising Healthcare in Developing Economies

There is an increasing demand for the healthcare industry in developing economies to reform their... more There is an increasing demand for the healthcare industry in developing economies to reform their existing fragmented paper-based systems to take advantage of the several opportunities that digitalisation brings. However, the existence of specific contextual factors constrains the process of digitalisation in most developing economies. Underpinned by the concepts of installed base and cultivation, this chapter adopts a qualitative multiple-case study approach to examine the contextual factors that influence the development, implementation, and adoption of digital health systems in the Ghanaian and Nigerian contexts. Results of this chapter reveal 13 key challenges and their corresponding mitigating strategies that were adopted in specific instances to facilitate digitalisation in both contexts. A comparison of findings for the two contexts is also discussed.

Research paper thumbnail of Framework for The Development of a Low-Cost Radio Frequency Identification (RFID) Based-System for Supporting Vaccine Immunization and Uptake in a Developing Country

advances in multidisciplinary & scientific research journal publication

Research paper thumbnail of Phishing & Anti-phishing Techniques: An Exposition

AIMS JOURNAL, 2015

Phishing is a current social engineering attack that results in online identity theft. Although a... more Phishing is a current social engineering attack that results in online identity theft. Although a simple attack, phishing has become a large problem for organizations that are doing online business. The number of phishing scams is continuously growing, and the cost of the resulting damage is increasing. Researchers, as well as the IT industry, have identified the urgent need for anti-phishing solutions and recently, some solutions to mitigate phishing attacks have been proposed. We analyze these attacks and identify that most of them exploit the fact that users are not sufficiently aware of the secure site identification mechanisms in browsers. Some of these anti-phishing solutions are browser-based and have been implemented as plug-ins. In fact, it appears that even web designers are often confused about the need to identify login forms securely; we show several sites that prompt users for passwords using unprotected forms. In this paper we presented phishing in detail (including attack process and classification of phishing attack) and reviewed some of the existing anti-phishing techniques along with their advantages and disadvantages and also make recommendations on how both can be mitigated.

Research paper thumbnail of Social Engineering Threats and Applicable Countermeasures

African Journal of Computing & ICT , 2015

The Information and Communication Technology (ICT) security in a socio-technical world was explor... more The Information and Communication Technology (ICT) security in a socio-technical world was explored and focus made in particular on the susceptibility to social engineering attacks, Social engineering is the most commonly used tactic across all levels of adversaries to gain unauthorized access into a network. While many organizations attempt to implement a policy and technical capabilities to mitigate against this threat, network intrusions through social engineering attacks are often still highly successful. A proven way to assess an organization's risk to these threats is to test the effectiveness of existing technical and organizational protections, starting with the security awareness of personnel. Most social engineering takes place via email, text message and phone. However, tactics can include simply walking in the front door behind someone possessing a valid badge, or dropping portable USB drives in the parking lot and waiting for an unsuspecting employee to plug them into their work computer. Whatever form social engineering takes, businesses and organizations are largely unprepared for how to effectively counter these attempts across their workforces. Getting employees' attention and commitment to vigilance can be difficult without proving how easy those employees can be exploited. This paper explores this social engineering attack; analyze counter measures against the attack and makes recommendations on how it can be mitigated.

Research paper thumbnail of Understanding Cyber Criminals Multifaceted Techniques for Phishing and Pharming

Proceedings of the iSTEAMS Multidisciplinary Cross-Border Conference University of Professional Studies, Accra Ghana, 2016

The challenges associated with the phishing & Pharming problems are presente. Their typologies ar... more The challenges associated with the phishing & Pharming problems are presente. Their typologies are also identified and recommendations on how both can be mitigated are proferred.

Research paper thumbnail of The Benefits and Challenges of E-Health Applications in Developing Nations: A Review

14th ISTEAMS CONFERENCE, AL-HIKMAH UNIVERSITY, ILORIN, 2018

This paper is presented to contribute to the benefits and challenges of the Healthcare system in ... more This paper is presented to contribute to the benefits and challenges of the Healthcare system in developing nations with daily increase in population, how ICT could be of important aid to the cause. First, its argues that the health sector is best conceptualized as a 'knowledge economy'. This supports a broadened view health service provision that includes formal and informal arrangements for the provision of medical advice and drugs, this is particularly important in countries with a pluralistic health system with relatively underdeveloped institutional arrangement. By using ICT, the quality of healthcare can be increased, or standards can be maintained with fewer people and at lower cost. Many companies are now working on excellent eHealth innovations, as we all know the aim of Information and Communication Technologies (ICT) for Health (also known as eHealth) is to improve significantly the quality, access and efficacy of healthcare for all citizens. ICT for Health describes the application of information and communication technologies across the whole range of functions that affect the health sector.

Research paper thumbnail of Digitalising Healthcare in Developing Economies

There is an increasing demand for the healthcare industry in developing economies to reform their... more There is an increasing demand for the healthcare industry in developing economies to reform their existing fragmented paper-based systems to take advantage of the several opportunities that digitalisation brings. However, the existence of specific contextual factors constrains the process of digitalisation in most developing economies. Underpinned by the concepts of installed base and cultivation, this chapter adopts a qualitative multiple-case study approach to examine the contextual factors that influence the development, implementation, and adoption of digital health systems in the Ghanaian and Nigerian contexts. Results of this chapter reveal 13 key challenges and their corresponding mitigating strategies that were adopted in specific instances to facilitate digitalisation in both contexts. A comparison of findings for the two contexts is also discussed.

Research paper thumbnail of Framework for The Development of a Low-Cost Radio Frequency Identification (RFID) Based-System for Supporting Vaccine Immunization and Uptake in a Developing Country

advances in multidisciplinary & scientific research journal publication

Research paper thumbnail of Phishing & Anti-phishing Techniques: An Exposition

AIMS JOURNAL, 2015

Phishing is a current social engineering attack that results in online identity theft. Although a... more Phishing is a current social engineering attack that results in online identity theft. Although a simple attack, phishing has become a large problem for organizations that are doing online business. The number of phishing scams is continuously growing, and the cost of the resulting damage is increasing. Researchers, as well as the IT industry, have identified the urgent need for anti-phishing solutions and recently, some solutions to mitigate phishing attacks have been proposed. We analyze these attacks and identify that most of them exploit the fact that users are not sufficiently aware of the secure site identification mechanisms in browsers. Some of these anti-phishing solutions are browser-based and have been implemented as plug-ins. In fact, it appears that even web designers are often confused about the need to identify login forms securely; we show several sites that prompt users for passwords using unprotected forms. In this paper we presented phishing in detail (including attack process and classification of phishing attack) and reviewed some of the existing anti-phishing techniques along with their advantages and disadvantages and also make recommendations on how both can be mitigated.