Blog Detail

Home

/

Blog Detail

Image

Aleng Duty and Responsibilty

01-Feb-2024

Web Design

47 Comments

Mr. Aleng have organized and achieved so many seminars in his career as Computer Consultant and he is still doing to educate the younger generation who are coming up in the field of study. Computer that we are talking about is just an electronic device that accept data as IN PUT processes it and store it, bring out information as OUT PUT for decision making by the user. He is currently working on a paper title Ransomware Assail, the digital era ushered in the use of computers as a tool of the people and the internet expanse where computers connect, has become known as cyberspace (Aleng, 2024). Many economic outlets, cultural resources, social platforms, as well as government services operate on the internet. Digitization has had positive effects on efficacy. Several types of security issues have revealed exploitation and vulnerabilities in cyberspace. Sophisticated and diverse types of cyberspace based attacks have materialized. Any type of disruption and problem of integrity, authenticity and availability of data or information is termed as a cyberattack. Private companies and government organizations are facing security exploitation issues globally in cyberspace. The purpose of such attacks differ based on what information and data is threatened in the system. Attackers are most often driven by financial gain, government intel, or political influence.

Best Research on Cryptography

Image

An investigation into the conceptions held by the general public about phishing, attempt and ransomware must be assessed. Comparison studies with state of the art field expert’s commentary about threat likelihoods will be reviewed. Knowledge will be obtained through literature reviews of previous attacks to introduce the risks with a combination of interviews with experts. The comparison will include metrics of: i. What are the general perceptions of phishing and ransomware attacks on your device? ii. How likely do individuals think he/she will be affected by phishing and ransomware attacks? iii. What are the main factors that affect public perceptions of these attacks? Survey reviewing will be limited to the scope of phishing and ransomware in cyberspace. The probability of becoming a target by cyberattack will be assessed within these two styles of attack.

Referees:

Image

Dr. Nathan Y. Nachandiya 28 June 2018

Information Security, Lecturer Computer Science Department Adamawa State University, Mubi. nachandiya@yahoo.com, 07068996563

Image

Dr. Bulus Bali 15 Nov. 2021

A.I and Machine Learning, Lecturer Computer Science Department Adamawa State University, Mubi bbyarima@gmail.com 08060356180

Image

Mr. Durowaiye S.O 18 March 2023

Principal BIA Felele Lokoja Kogi State Brigdeheadinternationalacademy20@yahoo.com 08036558960

Leave a comment