Papers by Oluwasanmi R I C H A R D Arogundade

International Advanced Research Journal in Science, Engineering and Technology, 2023
This study investigates the function of cloud computing in disaster recovery and contrasts on-pre... more This study investigates the function of cloud computing in disaster recovery and contrasts on-premises disaster recovery strategies with cloud-based ones. Organizations must have a disaster recovery strategy in place since natural disasters, cyberattacks, and other disruptive events can have disastrous impacts on them. Traditional disaster recoveries techniques like hot and cold sites, clustering, and backup and recovery have drawbacks such as being costly, timeconsuming, and difficult to execute. Disaster recovery solutions based on the cloud and entail storing data and applications in a remote server provide numerous advantages such as expandability, reduced expenses, and adaptability. The report provides an overview of disaster recovery techniques and discusses the importance of disaster recovery for organizations. The report then compares traditional disaster recovery methods with cloud-based solutions and concludes with recommendations for organizations considering cloud-based disaster recovery solutions.

International Advanced Research Journal in Science, Engineering and Technology, 2023
Network security has become a critical global issue for organizations due to the increasing cyber... more Network security has become a critical global issue for organizations due to the increasing cyber-attack rate. To enhance organizations' network security, this paper focuses on categorizing the security threat model, which enables examining the impact of threat classes rather than individual impacts. This paper reviews various threat categorization models and proposes criteria for classifying information system security hazards in cloud computing. It also investigates network security vulnerabilities and classifies security concerns using the CIA (confidentiality, integrity, and availability) triangle. Moreover, this paper explains fundamental concepts and procedures for carrying out various network security operations in cloud computing using both paid and open-source tools. This research aims to educate and enable organizations to reduce security threats while having full visibility and control of their infrastructure both in the cloud and on-premises.

Computer Engineering and Intelligent Systems, 2023
In today's highly interconnected world, network security has become a critical aspect of protecti... more In today's highly interconnected world, network security has become a critical aspect of protecting organizations from cyber-attacks. The increasing sophistication of attackers and their ability to exploit software and firmware vulnerabilities pose significant dangers to the security of networks. However, many organizations often neglect the essential steps required to secure their networks, leading to an increased risk of security breaches. In this research article, we aim to address this issue by investigating network security concepts, potential dangers, and practical defense strategies. We begin by exploring the different types of cyber-attacks and their sources, highlighting the various ways attackers exploit network vulnerabilities. We also examine the reasons why organizations often overlook network security and the consequences of not prioritizing it. To better understand the complexity of network security, we categorize the different security concerns using the CIA (confidentiality, integrity, and availability) triangle. This approach allows us to identify the various areas of vulnerability and their potential impact on network security. Next, we focus on the most crucial basic concepts and steps involved in various network security operations. We outline the best practices and practical approaches organizations can take to improve their network security, including implementing security policies and procedures, using encryption and authentication methods, and conducting regular security assessments. By highlighting the importance of network security and providing practical guidance on how organizations can defend against cyber-attacks, we hope to raise awareness and help prevent security breaches.
Uploads
Papers by Oluwasanmi R I C H A R D Arogundade