Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/3110
Title: | Security Risk Analysis and Management in GSM Operations Using MTN as a Case Study |
Authors: | Ndatsu, Zainab Adebayo, Olawale Surajudeen Ojeniyi, Joseph Adebayo |
Keywords: | Security analysis risk analysis and management MTN operations GSM operation |
Issue Date: | 2018 |
Publisher: | Computing, Information Systems & Development Informatics |
Series/Report no.: | Volume 9;4 |
Abstract: | Risk analysis is a process that helps identify and manage potential problems that could undermine key business processes. Security risk analysis on GSM operations using MTN as a case study was carried out in this research. The objective is to ensure confidentiality, integrity and availability of GSM operations. Our motivation for takling risk analysis is that small business owners take risks every day putting too much at stake and their businesses in the long run could suffer. Qualitative method was used for this research where 70 Questionnaire was prepared and distributed to users of MTN using five components of the business processes measures and 50 were received, as duly completed by the users of the products in context. Chi-square was used in the analysis to determine where there is association between mobile electricity, mobile app., SIM card, recharge card, customer name and security. The p - values of chi square of analysis is greater than 0.05 indicating independence in association between security, mobile electricity, mobile app, recharge card, SIM card and customer name. Findings revealed the sucesptibility to risks by business owners which then necessitate our reccomendations that MTN should put into consideration security of the components |
URI: | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/3110 |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Sec Risk Analysis Zainab v9N4P1 - CISDI JOURNAL - Security of GSM Operations.pdf | 1.06 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.