Kenneth Okereafor | Universidad Azteca (original) (raw)

Conference Presentations by Kenneth Okereafor

Research paper thumbnail of DIGITAL IDENTITY AND CITIZENSHIP - WHO, WHAT, WHY, WHEN, WHERE AND HOW

Nigeria Legislative -Stakeholder Conference On ICT & Cybersecurity. , 2018

Digital identities play a critical security role in human verification, and their protection in t... more Digital identities play a critical security role in human verification, and their protection in the cyberspace requires methodical approach. This paper sets the foundation and basis for securing digital identities in the new era.

Research paper thumbnail of Enhancing Biometric Liveness Detection Using Trait Randomization Technique

International Journal of Simulation Systems, Science & Technology, 2017

Biometric Authentication Systems (BAS) have several security benefits over traditional password a... more Biometric Authentication Systems (BAS) have several security benefits over traditional password and token authentication including an inherent difficulty to copy, clone and share or distribute authentication credentials (biometric traits). Spoofing or presentation attack remains a major weakness of biometric systems and tackling it at the trait level is still challenging with several different approaches and methods applied in existing systems. In this paper, we focus on the well-known approach of Suspicious Presentation Detection (SPD) and present the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) that further mitigates spoofing or presentations attacks using randomization and combination of several different SPD detection techniques across three different modalities during trait capture. We discuss the detection of life using five distinct properties each from finger, face and eye modalities and present results from a simulation that highlights the improved security based on an impostor's inability to accurately predict the combination of trait liveness properties the system might prompt and test for during capture.

Research paper thumbnail of Impacts Of Cyber Attacks On Corporate Business Continuity: Fostering Cyber Security Consciousness In The Citizenry

National Conference on Cybercrime and Cybersecurity, 2008

Cyberattacks occur in many fashions due to unattended vulnerabilities within organizations' digit... more Cyberattacks occur in many fashions due to unattended vulnerabilities within organizations' digital assets. Understanding their nature and motives is essential to mitigating their impacts. This paper reviews the impacts of successful computer breaches on the survival of government agencies, a case study of Nigeria.

Papers by Kenneth Okereafor

Research paper thumbnail of Role of digital health insurance management systems in scaling health insurance coverage in low- and Middle-Income Countries: A case study from Nigeria

Frontiers in Digital Health

BackgroundIncreasing global commitment to Universal Health Coverage (UHC) in the past decade has ... more BackgroundIncreasing global commitment to Universal Health Coverage (UHC) in the past decade has triggered UHC-inspired reforms and investments to expand health service coverage in many Low- and Middle-Income Countries (LMICs). UHC aims to ensure that all people can access quality health services, safeguard them from public health risks and impoverishment from out-of-pocket payments for healthcare when household members are sickAimThis paper reviews the role of health insurance as a policy tool to address health financing as a contributory mechanism for accelerating the achievement of UHC in LMICs. We focus on Nigeria's legal framework for health insurance coverage for its whole population and the role of technology in facilitating enrollment to health insurance schemes.MethodsFrom May to July 2022, we adopted a cross-sectional case study design combining: (i) a literature review of the effects of UHC with (ii) document analysis of health insurance systems in Nigeria, and (iii) ...

Research paper thumbnail of 5G Technology and the Advent of Future Smart Cities in Nigeria

Research paper thumbnail of Introduction: COVID-19 Pandemic, the Game Changer

Research paper thumbnail of Cyberspace at Risk

Cybersecurity in the COVID-19 Pandemic, 2021

Research paper thumbnail of Cybersecurity Roles in a Pandemic

Cybersecurity in the COVID-19 Pandemic, 2021

Research paper thumbnail of Chapter 5: Challenges of Managing Cybersecurity at COVID-19

Responding efficiently to the nature and sophistication of Cybersecurity incidents during COVID-1... more Responding efficiently to the nature and sophistication of Cybersecurity incidents during COVID-19 crisis turned out to be a herculean task due to peculiar logistic limitations. The measures imposed to contain the pandemic eventually triggered panic reactions by online consumers whose priorities had shifted from online safety to staying healthy and free from coronavirus disease. Most of the online reactions bothering on anxiety and desperation ultimately resulted in social engineering exploitations to the advantage of cyber criminals. Chapter five analyses the challenges encountered in dealing with Cybersecurity incidents during the pandemic. It discusses issues of user authentication, incident response, and telecommuting, especially with the mass adoption of the remote work concept. The chapter highlights the Cybersecurity impacts of COVID-19 in the management of healthcare data.

Research paper thumbnail of Chapter 6: Cyberattack Mitigations During the Pandemic

Responding to cybersecurity incidents during the COVID-19 pandemic was peculiar as it typically r... more Responding to cybersecurity incidents during the COVID-19 pandemic was peculiar as it typically required an approach most suitable for the moment. Chapter six highlights the defense in-depth approach as an appropriate option widely adopted for the scope and sophistication of COVID-19-related threats and security risks that targeted vulnerable computer systems and networks; an approach that combined administrative, physical, and technical countermeasures. Chapter six highlights the simultaneous applications of preventive, detective, responsive, corrective, and deterrent controls to mitigate cyberattacks during the pandemic.

Research paper thumbnail of Chapter 7: Cybersecurity in Post COVID-19 Digital Era

COVID-19 triggered remarkable changes in both the digital behaviour and the socio-cultural outloo... more COVID-19 triggered remarkable changes in both the digital behaviour and the socio-cultural outlook of individuals and organizations. The Cybersecurity domain is a major beneficiary of these changes, which are projected to remain permanent. Notwithstanding the transformation, however, major adjustments are imminent to strengthen the existing protocols and make them suitable to address the emerging technological concepts, given that the existing cyber defence approaches have proved unreliable and insufficient. Chapter seven introduces post-pandemic Cybersecurity projections in artificial intelligence, big data, telemedicine, and aviation. It lays emphasis on the fascinating Cybersecurity research and innovations that will dominate the 2021 to 2025 window.

Research paper thumbnail of Chapter 8: Conclusion and Recommendations

The fallout of COVID-19 pandemic has left an indelible mark on the digital behaviour of the avera... more The fallout of COVID-19 pandemic has left an indelible mark on the digital behaviour of the average online consumer who now understands the extent to which cyberattacks can go. This new awakening has left big lessons behind for individuals and organizations. As remote work has redefined productivity and becomes increasingly institutionalized, new paradigms must evolve to re-evaluate post-COVID-19 cyberspace. This chapter makes recommendations in cyberspace monitoring, the email system, social engineering acculturation, and better management of digital identities. The chapter also addresses some ethical concerns for checkmating ransomware through commensurate attribution.

Research paper thumbnail of Chapter 4: Cyberspace at Risk

At the peak of the pandemic when most countries had embraced the lockdown protocol that triggered... more At the peak of the pandemic when most countries had embraced the lockdown protocol that triggered an overwhelming patronage of online alternatives for business, leisure, and healthcare, every personal and corporate data on the cyberspace became a potential target of cybercrime, as malicious hackers took advantage of and exploited each good-intentioned COVID-19 intervention to deepen their exploits. Cyber risks that arose from the adoption of lockdown interventions and social distancing measures included cyber espionage, email phishing, ransomware, and many more. Chapter four presents a comprehensive review of threats which hackers exploited during the pandemic, including exposures, human factor, and technical vulnerabilities. The chapter particularly examines 21 specific cyber threats alongside their impacts on data privacy, corporate reputation, and revenue loss.

Research paper thumbnail of Chapter 1: Introduction: COVID-19 Pandemic, the Game Changer

COVID-19 pandemic impacted on data security across many domains, nullified all year 2020 technolo... more COVID-19 pandemic impacted on data security across many domains, nullified all year 2020 technology predictions, and resulted in unprecedented levels of cyberattacks on a global scale. Previously ignored vulnerabilities and digital loopholes were exploited by hackers and internet fraudsters to compromise systems' security and launch various cyberspace exploits. Chapter one introduces the book's objective to use real-world COVID-19 cyberattack incidents to educate the reader on Cybersecurity knowledge and concepts. It delivers an overview of expectations from the book, describing the pandemic as a game changer. The chapter also introduces the structure of the book and defines its target audience to include everyone who uses the cyberspace.

Research paper thumbnail of Chapter 3: Cybersecurity Roles in a Pandemic

The exponential rise in cybercrimes during the COVID-19 pandemic triggered a deeper focus on Cybe... more The exponential rise in cybercrimes during the COVID-19 pandemic triggered a deeper focus on Cybersecurity mitigations. Although unchecked cybercrime threatens global economics and undermines digital commerce, the pandemic created a unique opportunity for individuals and organizations to become conscious of the security impacts of cybercrimes on their infrastructure and give more attention to Cybersecurity roles in a crisis situation. Chapter three introduces the concepts of prevention, detection, and response and associates them with the relevance of protecting data against unauthorized access and illegal modification to guarantee confidentiality, integrity, and availability at all times.

Research paper thumbnail of Randomized Multi-Biometric Liveness Detection: Prospects and Applications for Secure Authentication

Biometric systems verify humans using their unique physiological or behavioural patterns to offer... more Biometric systems verify humans using their unique physiological or behavioural patterns to offer more<br>secure authentication over passwords and tokens. Despite their benefits, Biometric Authentication Systems remain vulnerable to spoofing, wherein an impostor presents a forged biometric trait and bypasses security checks. Impacts of successful spoofing can be potentially fatal such as in healthcare and crime investigation systems where insecure authentication can result in patient misdiagnosis and<br>criminal misidentification, respectively. Existing anti-spoofing techniques are mostly uni-modal and predictable, and therefore incapable of coping with the sophistication of modern-day biometric cyberattacks. This paper presents the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) framework which employs a complex trait randomization algorithm to mitigate predictability. Fifteen liveness attributes derived from finger, face and iris traits are used...

Research paper thumbnail of Addressing the Cybersecurity Challenges of Digital Money and the Future Economy

Research paper thumbnail of Exploring the Potentials of Telemedicine and Other Non-Contact Electronic Health Technologies in Controlling the Spread of the Novel Coronavirus Disease (COVID-19)

Telemedicine and Telehealth have great potentials to shield health workers from direct contact wi... more Telemedicine and Telehealth have great potentials to shield health workers from direct contact with patients. Together with related technologies they are suitable strategies for controlling the spread of COVID-19 global health pandemic.

Research paper thumbnail of Multi-biometric liveness detection: A new perspective

A novel prototype software for multi-modal biometrics is presented as an approach to significantl... more A novel prototype software for multi-modal biometrics is presented as an approach to significantly minimize spoofing and to strengthen the overall security of the biometric authentication process.

Research paper thumbnail of Tackling the Cybersecurity Impacts of the Coronavirus Outbreak as a Challenge to Internet Safety

Cybercriminals are exploiting the panic associated with COVID-19 to attack vulnerable digital ass... more Cybercriminals are exploiting the panic associated with COVID-19 to attack vulnerable digital assets using ransomware, email phishing and social engineering scams. The impacts on the cyberspace are examined, and recommendations for digital behaviours are proffered to ensure user privacy and computer security even as the pandemic rages.

Research paper thumbnail of DIGITAL IDENTITY AND CITIZENSHIP - WHO, WHAT, WHY, WHEN, WHERE AND HOW

Nigeria Legislative -Stakeholder Conference On ICT & Cybersecurity. , 2018

Digital identities play a critical security role in human verification, and their protection in t... more Digital identities play a critical security role in human verification, and their protection in the cyberspace requires methodical approach. This paper sets the foundation and basis for securing digital identities in the new era.

Research paper thumbnail of Enhancing Biometric Liveness Detection Using Trait Randomization Technique

International Journal of Simulation Systems, Science & Technology, 2017

Biometric Authentication Systems (BAS) have several security benefits over traditional password a... more Biometric Authentication Systems (BAS) have several security benefits over traditional password and token authentication including an inherent difficulty to copy, clone and share or distribute authentication credentials (biometric traits). Spoofing or presentation attack remains a major weakness of biometric systems and tackling it at the trait level is still challenging with several different approaches and methods applied in existing systems. In this paper, we focus on the well-known approach of Suspicious Presentation Detection (SPD) and present the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) that further mitigates spoofing or presentations attacks using randomization and combination of several different SPD detection techniques across three different modalities during trait capture. We discuss the detection of life using five distinct properties each from finger, face and eye modalities and present results from a simulation that highlights the improved security based on an impostor's inability to accurately predict the combination of trait liveness properties the system might prompt and test for during capture.

Research paper thumbnail of Impacts Of Cyber Attacks On Corporate Business Continuity: Fostering Cyber Security Consciousness In The Citizenry

National Conference on Cybercrime and Cybersecurity, 2008

Cyberattacks occur in many fashions due to unattended vulnerabilities within organizations' digit... more Cyberattacks occur in many fashions due to unattended vulnerabilities within organizations' digital assets. Understanding their nature and motives is essential to mitigating their impacts. This paper reviews the impacts of successful computer breaches on the survival of government agencies, a case study of Nigeria.

Research paper thumbnail of Role of digital health insurance management systems in scaling health insurance coverage in low- and Middle-Income Countries: A case study from Nigeria

Frontiers in Digital Health

BackgroundIncreasing global commitment to Universal Health Coverage (UHC) in the past decade has ... more BackgroundIncreasing global commitment to Universal Health Coverage (UHC) in the past decade has triggered UHC-inspired reforms and investments to expand health service coverage in many Low- and Middle-Income Countries (LMICs). UHC aims to ensure that all people can access quality health services, safeguard them from public health risks and impoverishment from out-of-pocket payments for healthcare when household members are sickAimThis paper reviews the role of health insurance as a policy tool to address health financing as a contributory mechanism for accelerating the achievement of UHC in LMICs. We focus on Nigeria's legal framework for health insurance coverage for its whole population and the role of technology in facilitating enrollment to health insurance schemes.MethodsFrom May to July 2022, we adopted a cross-sectional case study design combining: (i) a literature review of the effects of UHC with (ii) document analysis of health insurance systems in Nigeria, and (iii) ...

Research paper thumbnail of 5G Technology and the Advent of Future Smart Cities in Nigeria

Research paper thumbnail of Introduction: COVID-19 Pandemic, the Game Changer

Research paper thumbnail of Cyberspace at Risk

Cybersecurity in the COVID-19 Pandemic, 2021

Research paper thumbnail of Cybersecurity Roles in a Pandemic

Cybersecurity in the COVID-19 Pandemic, 2021

Research paper thumbnail of Chapter 5: Challenges of Managing Cybersecurity at COVID-19

Responding efficiently to the nature and sophistication of Cybersecurity incidents during COVID-1... more Responding efficiently to the nature and sophistication of Cybersecurity incidents during COVID-19 crisis turned out to be a herculean task due to peculiar logistic limitations. The measures imposed to contain the pandemic eventually triggered panic reactions by online consumers whose priorities had shifted from online safety to staying healthy and free from coronavirus disease. Most of the online reactions bothering on anxiety and desperation ultimately resulted in social engineering exploitations to the advantage of cyber criminals. Chapter five analyses the challenges encountered in dealing with Cybersecurity incidents during the pandemic. It discusses issues of user authentication, incident response, and telecommuting, especially with the mass adoption of the remote work concept. The chapter highlights the Cybersecurity impacts of COVID-19 in the management of healthcare data.

Research paper thumbnail of Chapter 6: Cyberattack Mitigations During the Pandemic

Responding to cybersecurity incidents during the COVID-19 pandemic was peculiar as it typically r... more Responding to cybersecurity incidents during the COVID-19 pandemic was peculiar as it typically required an approach most suitable for the moment. Chapter six highlights the defense in-depth approach as an appropriate option widely adopted for the scope and sophistication of COVID-19-related threats and security risks that targeted vulnerable computer systems and networks; an approach that combined administrative, physical, and technical countermeasures. Chapter six highlights the simultaneous applications of preventive, detective, responsive, corrective, and deterrent controls to mitigate cyberattacks during the pandemic.

Research paper thumbnail of Chapter 7: Cybersecurity in Post COVID-19 Digital Era

COVID-19 triggered remarkable changes in both the digital behaviour and the socio-cultural outloo... more COVID-19 triggered remarkable changes in both the digital behaviour and the socio-cultural outlook of individuals and organizations. The Cybersecurity domain is a major beneficiary of these changes, which are projected to remain permanent. Notwithstanding the transformation, however, major adjustments are imminent to strengthen the existing protocols and make them suitable to address the emerging technological concepts, given that the existing cyber defence approaches have proved unreliable and insufficient. Chapter seven introduces post-pandemic Cybersecurity projections in artificial intelligence, big data, telemedicine, and aviation. It lays emphasis on the fascinating Cybersecurity research and innovations that will dominate the 2021 to 2025 window.

Research paper thumbnail of Chapter 8: Conclusion and Recommendations

The fallout of COVID-19 pandemic has left an indelible mark on the digital behaviour of the avera... more The fallout of COVID-19 pandemic has left an indelible mark on the digital behaviour of the average online consumer who now understands the extent to which cyberattacks can go. This new awakening has left big lessons behind for individuals and organizations. As remote work has redefined productivity and becomes increasingly institutionalized, new paradigms must evolve to re-evaluate post-COVID-19 cyberspace. This chapter makes recommendations in cyberspace monitoring, the email system, social engineering acculturation, and better management of digital identities. The chapter also addresses some ethical concerns for checkmating ransomware through commensurate attribution.

Research paper thumbnail of Chapter 4: Cyberspace at Risk

At the peak of the pandemic when most countries had embraced the lockdown protocol that triggered... more At the peak of the pandemic when most countries had embraced the lockdown protocol that triggered an overwhelming patronage of online alternatives for business, leisure, and healthcare, every personal and corporate data on the cyberspace became a potential target of cybercrime, as malicious hackers took advantage of and exploited each good-intentioned COVID-19 intervention to deepen their exploits. Cyber risks that arose from the adoption of lockdown interventions and social distancing measures included cyber espionage, email phishing, ransomware, and many more. Chapter four presents a comprehensive review of threats which hackers exploited during the pandemic, including exposures, human factor, and technical vulnerabilities. The chapter particularly examines 21 specific cyber threats alongside their impacts on data privacy, corporate reputation, and revenue loss.

Research paper thumbnail of Chapter 1: Introduction: COVID-19 Pandemic, the Game Changer

COVID-19 pandemic impacted on data security across many domains, nullified all year 2020 technolo... more COVID-19 pandemic impacted on data security across many domains, nullified all year 2020 technology predictions, and resulted in unprecedented levels of cyberattacks on a global scale. Previously ignored vulnerabilities and digital loopholes were exploited by hackers and internet fraudsters to compromise systems' security and launch various cyberspace exploits. Chapter one introduces the book's objective to use real-world COVID-19 cyberattack incidents to educate the reader on Cybersecurity knowledge and concepts. It delivers an overview of expectations from the book, describing the pandemic as a game changer. The chapter also introduces the structure of the book and defines its target audience to include everyone who uses the cyberspace.

Research paper thumbnail of Chapter 3: Cybersecurity Roles in a Pandemic

The exponential rise in cybercrimes during the COVID-19 pandemic triggered a deeper focus on Cybe... more The exponential rise in cybercrimes during the COVID-19 pandemic triggered a deeper focus on Cybersecurity mitigations. Although unchecked cybercrime threatens global economics and undermines digital commerce, the pandemic created a unique opportunity for individuals and organizations to become conscious of the security impacts of cybercrimes on their infrastructure and give more attention to Cybersecurity roles in a crisis situation. Chapter three introduces the concepts of prevention, detection, and response and associates them with the relevance of protecting data against unauthorized access and illegal modification to guarantee confidentiality, integrity, and availability at all times.

Research paper thumbnail of Randomized Multi-Biometric Liveness Detection: Prospects and Applications for Secure Authentication

Biometric systems verify humans using their unique physiological or behavioural patterns to offer... more Biometric systems verify humans using their unique physiological or behavioural patterns to offer more<br>secure authentication over passwords and tokens. Despite their benefits, Biometric Authentication Systems remain vulnerable to spoofing, wherein an impostor presents a forged biometric trait and bypasses security checks. Impacts of successful spoofing can be potentially fatal such as in healthcare and crime investigation systems where insecure authentication can result in patient misdiagnosis and<br>criminal misidentification, respectively. Existing anti-spoofing techniques are mostly uni-modal and predictable, and therefore incapable of coping with the sophistication of modern-day biometric cyberattacks. This paper presents the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) framework which employs a complex trait randomization algorithm to mitigate predictability. Fifteen liveness attributes derived from finger, face and iris traits are used...

Research paper thumbnail of Addressing the Cybersecurity Challenges of Digital Money and the Future Economy

Research paper thumbnail of Exploring the Potentials of Telemedicine and Other Non-Contact Electronic Health Technologies in Controlling the Spread of the Novel Coronavirus Disease (COVID-19)

Telemedicine and Telehealth have great potentials to shield health workers from direct contact wi... more Telemedicine and Telehealth have great potentials to shield health workers from direct contact with patients. Together with related technologies they are suitable strategies for controlling the spread of COVID-19 global health pandemic.

Research paper thumbnail of Multi-biometric liveness detection: A new perspective

A novel prototype software for multi-modal biometrics is presented as an approach to significantl... more A novel prototype software for multi-modal biometrics is presented as an approach to significantly minimize spoofing and to strengthen the overall security of the biometric authentication process.

Research paper thumbnail of Tackling the Cybersecurity Impacts of the Coronavirus Outbreak as a Challenge to Internet Safety

Cybercriminals are exploiting the panic associated with COVID-19 to attack vulnerable digital ass... more Cybercriminals are exploiting the panic associated with COVID-19 to attack vulnerable digital assets using ransomware, email phishing and social engineering scams. The impacts on the cyberspace are examined, and recommendations for digital behaviours are proffered to ensure user privacy and computer security even as the pandemic rages.

Research paper thumbnail of Addressing Cybersecurity Challenges of Health Data in the COVID-19 Pandemic.pdf

Health data is sensitive because it relates to life, well-being and vitality. Managing it require... more Health data is sensitive because it relates to life, well-being and vitality. Managing it requires adherence to special Cybersecurity techniques and global standards to preserve its confidentiality, integrity and availability at all times.

Research paper thumbnail of Understanding Cybersecurity Challenges of Telecommuting and Video Conferencing in the COVID-19 Pandemic.pdf

The many Cybersecurity threats and vulnerabilities in remote communications and work from home ap... more The many Cybersecurity threats and vulnerabilities in remote communications and work from home applications are examined including their impacts on organizations.

Research paper thumbnail of Solving Cybersecurity Challenges of Telecommuting and Video Conferencing Applications in the COVID-19 Pandemic

A comprehensive defense in-depth approach to Cybersecurity of WFH and telecommuting applications ... more A comprehensive defense in-depth approach to Cybersecurity of WFH and telecommuting applications is proposed.