A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs

Street, J. and Olajide, F. 2021. A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs. Journal of Internet Technology and Secured Transactions (JITST). 9 (1), pp. 747-755. https://doi.org/10.20533/jitst.2046.3723.2021.0092

TitleA Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs
TypeJournal article
AuthorsStreet, J. and Olajide, F.
Abstract

In this paper we reviewed the cost-benefit analysis of Information Security and applied to Organisations Responsible for Vulnerable Individuals (ORVIs). Our research investigates the mitigation value and cost effectiveness of mitigation methods which discussed findings based on business focus and evaluation. Research findings indicated metrics for calculations assumptions, as proposed in the research work and thus, determined that the relative data analysis presented for cost comparable scores of the mitigation methods adopted. It is recommended from our analysis that ORVIs implement Internal Penetration Testing alongside Policy implementation due to the added benefit this combination has for this specific use-case.

KeywordsORVIs
Information Security
Vulnerable Individuals
Mitigation Methods
Cost-benefit Analysis
JournalJournal of Internet Technology and Secured Transactions (JITST)
Journal citation9 (1), pp. 747-755
ISSN2046-3723
Year2021
PublisherInfonomics Society
Publisher's version
License
CC BY 4.0
File Access Level
Open (open metadata and files)
Digital Object Identifier (DOI)https://doi.org/10.20533/jitst.2046.3723.2021.0092
Publication dates
Published2021

Related outputs

Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication
Assa-Agyei, Kwame, Kayode Owa, Al-Hadhrami, Tawfik and Olajide, Funminiyi 2024. Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication. International Journal of Advanced Computer Science & Applications . 15 (4), pp. 1037-1047. https://doi.org/10.14569/ijacsa.2024.01504105

Utilising Big Data Analytics in the Insurance Industry for Optimal Business Insight: A Literature Review
Pye, F. and Olajide, F. 2023. Utilising Big Data Analytics in the Insurance Industry for Optimal Business Insight: A Literature Review. International Journal for Infonomics. 16 (1), pp. 2172-2176. https://doi.org/10.20533/iji.1742.4712.2023.0228

Fraud Mitigation in Attendance Monitoring Systems using Dynamic QR Code, Geofencing and IMEI Technologies
Augustine Nwabuwe, Baljinder Sanghera, Temitope Alade and Funminiyi Olajide 2023. Fraud Mitigation in Attendance Monitoring Systems using Dynamic QR Code, Geofencing and IMEI Technologies. International Journal of Advanced Computer Science and Applications(IJACSA). 14 (4), pp. 935-945. https://doi.org/10.14569/IJACSA.2023.01404104

Evaluating a Non-platform-specific OCR/NLP system to detect Online Grooming
Jake Street and Funminiyi Olajide 2023. Evaluating a Non-platform-specific OCR/NLP system to detect Online Grooming. 18th International Conference on Cyber Warfare and Security. Towson University, Baltimore County, Maryland, USA 09 - 10 Mar 2023 Academic Conferences International Limited.

An Empirical Evaluation of Encryption and Decryption Times on Block Cipher Techniques
Funminiyi Olajide, Kwame Assa-Agyei and Christopher Edo 2023. An Empirical Evaluation of Encryption and Decryption Times on Block Cipher Techniques. 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). Las Vegas, USA 27 2023 - 24 Jul 2024 IEEE . https://doi.org/10.1109/CSCE60160.2023.00386

Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review
Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma 2023. Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review. 3rd International Conference on Cryptography and Blockchain (CRBL 2023). Zurich, Switzerland 18 - 19 Nov 2023 AIRCC Publishing Corporation. https://doi.org/10.5121/csit.2023.132103

Optimizing the Performance of the Advanced Encryption Standard Techniques for Secured Data Transmission
Kwame Assa-Agyei, Funminiyi Olajide and Temitope Alade 2023. Optimizing the Performance of the Advanced Encryption Standard Techniques for Secured Data Transmission. International Journal of Computer Applications. 185 (21), pp. 31-36. https://doi.org/10.5120/ijca2023922941

A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission
Assa-Agyei, K. and Olajide, F. 2023. A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission. International Journal of Advanced Computer Science and Applications(IJACSA). 14 (3) 44. https://doi.org/10.14569/IJACSA.2023.0140344

Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies
Assa-Agyei, K., Olajide, F. and Lotfi, A. 2022. Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies. Journal of Internet Technology and Secured Transactions (JITST). 10 (1), pp. 770-779. https://doi.org/10.20533/jitst.2046.3723.2022.0095

Towards the Design of an Intelligent Automation Framework for Business Processes
Olajide, F. 2022. Towards the Design of an Intelligent Automation Framework for Business Processes. The 5th International Conference on Information and Computer Technologies (ICICT 2022). New York City, The United States 04 - 06 Mar 2022 IEEE . https://doi.org/10.1109/ICICT55905.2022.00010

Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud Ecosystem
Awuson-David, K., Al-Hadhrami, T., Olajide, F. and Lotfi, A. 2020. Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud Ecosystem. 4th International Conference of Reliable Information and Communication Technology 2019 (IRICT 2019). Johor, Malaysia 22 - 23 Sep 2019 Springer. https://doi.org/10.1007/978-3-030-33582-3_79

A technological approach towards the measurement of enterprise agility
Williams, O C. and Olajide, F. 2020. A technological approach towards the measurement of enterprise agility. 15th Iberian Conference on Information Systems and Technologies (CISTI). Seville, Spain 24 - 27 Jun 2020 IEEE . https://doi.org/10.23919/CISTI49556.2020.9141142

Sensor Network in Automated Hand Hygiene Systems Using IoT for Public Building
Michael O. Omoyibo, Tawfik Al-Hadhrami, Olajide, F., Ahmad Lotfi and Ahmed M. Elmisery 2020. Sensor Network in Automated Hand Hygiene Systems Using IoT for Public Building. 4th International Conference of Reliable Information and Communication Technology 2019 (IRICT 2019). Johor, Malaysia 22 - 23 Sep 2019 Springer. pp. 463–476 https://doi.org/10.1007/978-3-030-33582-3_44

Exploring process of information systems and information technology for enterprise agility
Williams, O., Olajide, F., Al-Hadhrami, T. and Lotfi, A. 2019. Exploring process of information systems and information technology for enterprise agility. 4th International Conference of Reliable Information and Communication Technology 2019 (IRICT 2019). Johor, Malaysia 22 - 23 Sep 2019 Springer. https://doi.org/10.1007/978-3-030-33582-3_98

Forensic Use Case Analysis of User Input in Windows Application
Olajide, F., Al-hadrami, T. and James-Taylor, A. 2018. Forensic Use Case Analysis of User Input in Windows Application. 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018). Kuala Lumpur, Malaysia 23 - 24 Jul 2018 Springer. https://doi.org/10.1007/978-3-319-99007-1_58

Digital Investigation and Forensic User Analysis
Olajide, F., Al-Hadrami, T. and James-Taylor, A. 2018. Digital Investigation and Forensic User Analysis. 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018). Kuala Lumpur, Malaysia 23 - 24 Jul 2018 Springer. https://doi.org/10.1007/978-3-319-99007-1_59

Power aware routing algorithms (PARA) in wireless mesh networks for emergency management
Olajide, F. 2018. Power aware routing algorithms (PARA) in wireless mesh networks for emergency management. PLoS ONE. 13 (10) e0204751. https://doi.org/10.1371/journal.pone.0204751

Framework Design for Implementation of Secured TPM on E-commerce
Kennedy, C.G., Cho, D., Olajide, F. and John, S. 2017. Framework Design for Implementation of Secured TPM on E-commerce. 12th International Conference on Cyber Warfare and Security ICCWS 2017. Wright State University with the Air Force Institute of Technology, Dayton, USA ACPI.

Forensic investigation and analysis of user input information in business application
Olajide, F. and Misra, S. 2016. Forensic investigation and analysis of user input information in business application. Indian Journal of Science and Technology. 9 (25), pp. 1-7. https://doi.org/10.17485/ijst/2016/v9i25/95211

Network forensics tools in a mixed-network environment and the adoption of e-voting system in developing countries
Olajide, F. 2016. Network forensics tools in a mixed-network environment and the adoption of e-voting system in developing countries. International Journal of Pharmacy and Technology. 8 (4), pp. 23115-23128.

On the investigation of social network analysis for E-commerce transaction in south-west region of Nigeria
Olajide, F., Adeshakin, K., Misra, S. and Ayo, C.K. 2016. On the investigation of social network analysis for E-commerce transaction in south-west region of Nigeria. International Journal of Pharmacy and Technology. 8 (4), pp. 23108-23114.

Towards the investigation of using social network analysis for counter terrorism in West Africa: case study of Boko Haram in Nigeria
Olajide, F. and Adeshakin, K. 2016. Towards the investigation of using social network analysis for counter terrorism in West Africa: case study of Boko Haram in Nigeria. Journal of Engineering Science and Technology. 11 (11), pp. 1629 - 1638.

Developing a state of the art methodology & toolkit for ICS SCADA forensics
Olajide, F. 2016. Developing a state of the art methodology & toolkit for ICS SCADA forensics. International Journal of Industrial Control Systems Security. 1 (2), pp. 44-56. https://doi.org/10.20533/ijicss.9781.9083.20346.2016.0005

Realtime fraud detection in the banking sector using data mining techniques/algorithm
Olajide, F. 2016. Realtime fraud detection in the banking sector using data mining techniques/algorithm. 2016 International Conference on Computational Science and Computational Intelligence (CSCI). Las Vegas, NV 15 - 16 Dec 2016 IEEE . https://doi.org/10.1109/CSCI.2016.0224

Sequences of numbers obtained by digit and iterative digit sums of Sophie Germain primes and its variants
Olajide, F. 2016. Sequences of numbers obtained by digit and iterative digit sums of Sophie Germain primes and its variants. Global Journal of Pure and Applied Mathematics. 12 (2), pp. 1473-1480.

Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128
Olajide, F. 2016. Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128. International Conference on Security and Management (SAM). Las Vegas, USA 25 - 28 Jul 2016 The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

Forensic Live Response: Why an Object May be Evidence in the Court of Law?
Olajide, F. 2015. Forensic Live Response: Why an Object May be Evidence in the Court of Law? International Conference on Cyberspace Governance: The Imperative for National and Economic Security (CyberAbuja2015). Abuja 04 - 07 Nov 2015 IEEE .

On some suggested applications of sudoku in information systems security
Olajide, F. 2015. On some suggested applications of sudoku in information systems security. Asian Journal of Information Technology. 14 (4), pp. 117 - 121. https://doi.org/10.36478/ajit.2015.117.121

An experimental validation of public cloud mobile banking
Olawande Daramola, Folake Olajide, Adewole Adewumi and Charles Ayo 2014. An experimental validation of public cloud mobile banking. Research Journal of Applied Sciences, Engineering and Technology. 7 (24), pp. 5304-5314. https://doi.org/10.19026/rjaset.7.930

FALI: Time Memory Information of Windows Computer Systems
Olajide, F. 2013. FALI: Time Memory Information of Windows Computer Systems. International Journal of Intelligent Computing Research. 4 (4).

On the Analysis of Information Found on Windows Application Memory
Olajide, F., Savage, N., Akmayeva, G. and Shoniregun, C.A. 2013. On the Analysis of Information Found on Windows Application Memory. International Journal of Intelligent Computing Research. 4 (2). https://doi.org/10.20533/ijicr.2042.4655.2013.0042

On the Identification of Information Extracted from Windows Physical Memory
Olajide, F. and Savage, N. 2012. On the Identification of Information Extracted from Windows Physical Memory. International Journal for Information Security Research (IJISR). 2 (3), pp. 164-168. https://doi.org/10.20533/ijisr.2042.4639.2012.0020

Extracting Forensically Relevant Information From Windows Applications
Olajide, F., Savage, N., Akmayeva, G. and Shoniregun, C. 2012. Extracting Forensically Relevant Information From Windows Applications. 2012 International Conference on Information Society (i-Society). London, United Kingdom 25 - 28 Jun 2018 IEEE .

Extracting forensically relevant information from windows application
Olajide, F., Savage, N., Akmayeva, G. and Shoniregun, C. 2012. Extracting forensically relevant information from windows application. 2011 International Conference on Information Society. London, UK 27 - 29 Jun 2011 IEEE .

Forensic memory evidence of windows application
Olajide, F., Savage, N., Akmayeva, G. and Trafford, R. 2012. Forensic memory evidence of windows application. 2012 International Conference for Internet Technology and Secured Transactions. London, UK 10 - 12 Dec 2012 IEEE .

Digital forensic research—The analysis of user input on volatile memory of Windows application
Olajide, F., Savage, N., Akmayeva, G. and Shoniregun, C. 2012. Digital forensic research—The analysis of user input on volatile memory of Windows application. World Congress on Internet Security (WorldCIS-2012). Guelph, ON, Canada 10 - 12 Jun 2012 IEEE .

Digital Forensic Research and Method of Extracting Relevant Information From Physical Memory Of Windows Systems
Olajide, F. 2011. Digital Forensic Research and Method of Extracting Relevant Information From Physical Memory Of Windows Systems. Fourth International Conference on Internet Technologies and Applications (ITA 11). Glyndwr University, North Wales, UK 06 - 09 Sep 2011

Dispersal of time aspect of information stored on physical memory
Olajide, F. and Savage, N. 2011. Dispersal of time aspect of information stored on physical memory. Cyberforensics 2011 - International conference on cybercrime, security and digital forensics. Glasgow, UK 27 - 29 Jun 2011

Extraction of user information by pattern matching techniques in windows physical memory
Olajide, F. and Savage, N. 2011. Extraction of user information by pattern matching techniques in windows physical memory. Digital Enterprise and Information Systems International Conference, DEIS 2011. London, UK 20 - 22 Jul 2011 Springer. https://doi.org/10.1007/978-3-642-22603-8_40

Forensic extraction of user information in continuous block of evidence
Olajide, F. 2011. Forensic extraction of user information in continuous block of evidence. 2011 International Conference on Information Society. London, UK 27 - 29 Jun 2011 IEEE . https://doi.org/10.1109/i-Society18435.2011.5978501

On the extraction of forensically relevant information from physical memory
Olajide, F. 2011. On the extraction of forensically relevant information from physical memory. 2011 World Congress on Internet Security. London, UK 21 - 23 Feb 2011 IEEE . https://doi.org/10.1109/WorldCIS17046.2011.5749861

A Study of Application Level Information From The Volatile Memory of Windows Computer Systems
Olajide, F. 2011. A Study of Application Level Information From The Volatile Memory of Windows Computer Systems. PhD thesis University of Portsmouth

Application Level Evidence and Event Reconstruction
Olajide, F. 2010. Application Level Evidence and Event Reconstruction. Journal of Computing in Systems & Engineering. 10, pp. 171-175.

Application level evidence from volatile memory
Olajide, F. and Savage, N. 2009. Application level evidence from volatile memory. Journal of Computing in Systems & Engineering. 10, pp. 171-175.

Forensic live response and event reconstruction methods in Linux systems
Olajide, F. 2009. Forensic live response and event reconstruction methods in Linux systems. PGNET 2009: The 10th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting. Liverpool John Moores University 12 - 23 Jun 2009

Permalink - https://westminsterresearch.westminster.ac.uk/item/w4v3x/a-cost-benefit-analysis-of-information-security-mitigation-methods-for-orvis


Share this

Usage statistics

51 total views
39 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.