Ellen A Abanga | University Of Ghana, Accra,Legon (original) (raw)
Uploads
Papers by Ellen A Abanga
Advances in Multidisciplinary and scientific Research Journal Publication
Wireless technology networks are particularly vulnerable to security attacks. Wireless communicat... more Wireless technology networks are particularly vulnerable to security attacks. Wireless communication networks are widely used in education, defense, industry, healthcare, retail, and transportation. These systems rely on wired and cellular networks. In society and industry, wireless sensor networks, actuation networks, and vehicle networks have garnered a lot of attention. The Internet of Things has gotten a lot of research attention in recent years. The Internet of Things is regarded as the internet's future. IoT will play an important role in the future, changing our lifestyles, standards, and business structures. The use of IoT in various applications is likely to skyrocket in the next years. The Internet of Things enables billions of devices, people, and services to communicate and exchange information. IoT networks are vulnerable to several security vulnerabilities as a result of the rising use of IoT devices. It is crucial to implement effective privacy and security protoc...
Advances in Multidisciplinary and Scientific Research Journal, Nov 30, 2022
Wireless technology networks are particularly vulnerable to security attacks. Wireless communicat... more Wireless technology networks are particularly vulnerable to security attacks. Wireless communication networks are widely used in education, defense, industry, healthcare, retail, and transportation. These systems rely on wired and cellular networks. In society and industry, wireless sensor networks, actuation networks, and vehicle networks have garnered a lot of attention. The Internet of Things has gotten a lot of research attention in recent years. The Internet of Things is regarded as the internet's future. IoT will play an important role in the future, changing our lifestyles, standards, and business structures. The use of IoT in various applications is likely to skyrocket in the next years. The Internet of Things enables billions of devices, people, and services to communicate and exchange information. IoT networks are vulnerable to several security vulnerabilities as a result of the rising use of IoT devices. It is crucial to implement effective privacy and security protocols in IoT networks to guarantee, among other things, confidentiality, authentication, access control, and integrity. This paper provides a thorough analysis of the security and privacy challenges in IoT networks.
Conference Presentations by Ellen A Abanga
Internet-based attacks have become common and are anticipated to become more commonplace as techn... more Internet-based attacks have become common and are anticipated to become more commonplace as technology becomes more widely available. As a result, cybersecurity has evolved as a critical notion in everyday life. Cybersecurity awareness (CSA) is an important line of defense in the defense of people and systems. The study described in this article sought to analyze the levels of CSA among students a public university in Ghana. A questionnaire was used to assess students' cybersecurity knowledge, self-perception of cybersecurity skills, and cybersecurity attitudes. The responses revealed various misalignments, including instances of "cognitive dissonance" between variables, which exposes the students to cyber-attacks. The study revealed that majority of the students use internet on a regular basis indicating they are all in the state of experiencing cybersecurity issues of a regular basis. Majority of the students did not know about Phishing attacks and identity theft while in instances of password security, knowledge about malware and cyberbullying they were mostly well informed.
Evidence based reconstruction may often be even more illuminating than other traditional evidence... more Evidence based reconstruction may often be even more illuminating than other traditional evidence gathering strategies, but it is also extremely delicate and unpredictable due to the fact that evidence may not always be conclusive. The integrity of digital evidence is therefore extremely important, particularly when it comes from allegedly unlawful, illegitimate, or harmful activity. Regardless of the good or bad consequences of the acts and activities that created the evidence, the capture and reconstruction of events are critical to the operation of the digital world. Owing to the lack of skill and knowledge of digital forensics in Ghana, it creates a susceptible environment for criminals to continue their operations while avoiding prosecution due to a lack of evidence to prosecute them. The reconstruction of occurrences based on evidence is considered an eminent need for Africa and for that matter Ghana. Hence, the need for well-defined and advanced knowledge in evidence based reconstruction in digital forensics investigation to bridge the gap currently existing. This paper reviews literature on the concept of evidence based reconstruction as a means to advance knowledge on its relevance to the Africa region and Ghana for that matter. This would help forensics investigators to better understand the need for focus on using digital tools for reconstruction and focusing on evidence driven activities in case of crime and investigations. Finally, this paper presents an elaborated view from a literature point of view over the evidence based reconstruction and also helps other fellow colleagues in their quest to further understand the concept.
Advances in Multidisciplinary and scientific Research Journal Publication
Wireless technology networks are particularly vulnerable to security attacks. Wireless communicat... more Wireless technology networks are particularly vulnerable to security attacks. Wireless communication networks are widely used in education, defense, industry, healthcare, retail, and transportation. These systems rely on wired and cellular networks. In society and industry, wireless sensor networks, actuation networks, and vehicle networks have garnered a lot of attention. The Internet of Things has gotten a lot of research attention in recent years. The Internet of Things is regarded as the internet's future. IoT will play an important role in the future, changing our lifestyles, standards, and business structures. The use of IoT in various applications is likely to skyrocket in the next years. The Internet of Things enables billions of devices, people, and services to communicate and exchange information. IoT networks are vulnerable to several security vulnerabilities as a result of the rising use of IoT devices. It is crucial to implement effective privacy and security protoc...
Advances in Multidisciplinary and Scientific Research Journal, Nov 30, 2022
Wireless technology networks are particularly vulnerable to security attacks. Wireless communicat... more Wireless technology networks are particularly vulnerable to security attacks. Wireless communication networks are widely used in education, defense, industry, healthcare, retail, and transportation. These systems rely on wired and cellular networks. In society and industry, wireless sensor networks, actuation networks, and vehicle networks have garnered a lot of attention. The Internet of Things has gotten a lot of research attention in recent years. The Internet of Things is regarded as the internet's future. IoT will play an important role in the future, changing our lifestyles, standards, and business structures. The use of IoT in various applications is likely to skyrocket in the next years. The Internet of Things enables billions of devices, people, and services to communicate and exchange information. IoT networks are vulnerable to several security vulnerabilities as a result of the rising use of IoT devices. It is crucial to implement effective privacy and security protocols in IoT networks to guarantee, among other things, confidentiality, authentication, access control, and integrity. This paper provides a thorough analysis of the security and privacy challenges in IoT networks.
Internet-based attacks have become common and are anticipated to become more commonplace as techn... more Internet-based attacks have become common and are anticipated to become more commonplace as technology becomes more widely available. As a result, cybersecurity has evolved as a critical notion in everyday life. Cybersecurity awareness (CSA) is an important line of defense in the defense of people and systems. The study described in this article sought to analyze the levels of CSA among students a public university in Ghana. A questionnaire was used to assess students' cybersecurity knowledge, self-perception of cybersecurity skills, and cybersecurity attitudes. The responses revealed various misalignments, including instances of "cognitive dissonance" between variables, which exposes the students to cyber-attacks. The study revealed that majority of the students use internet on a regular basis indicating they are all in the state of experiencing cybersecurity issues of a regular basis. Majority of the students did not know about Phishing attacks and identity theft while in instances of password security, knowledge about malware and cyberbullying they were mostly well informed.
Evidence based reconstruction may often be even more illuminating than other traditional evidence... more Evidence based reconstruction may often be even more illuminating than other traditional evidence gathering strategies, but it is also extremely delicate and unpredictable due to the fact that evidence may not always be conclusive. The integrity of digital evidence is therefore extremely important, particularly when it comes from allegedly unlawful, illegitimate, or harmful activity. Regardless of the good or bad consequences of the acts and activities that created the evidence, the capture and reconstruction of events are critical to the operation of the digital world. Owing to the lack of skill and knowledge of digital forensics in Ghana, it creates a susceptible environment for criminals to continue their operations while avoiding prosecution due to a lack of evidence to prosecute them. The reconstruction of occurrences based on evidence is considered an eminent need for Africa and for that matter Ghana. Hence, the need for well-defined and advanced knowledge in evidence based reconstruction in digital forensics investigation to bridge the gap currently existing. This paper reviews literature on the concept of evidence based reconstruction as a means to advance knowledge on its relevance to the Africa region and Ghana for that matter. This would help forensics investigators to better understand the need for focus on using digital tools for reconstruction and focusing on evidence driven activities in case of crime and investigations. Finally, this paper presents an elaborated view from a literature point of view over the evidence based reconstruction and also helps other fellow colleagues in their quest to further understand the concept.