Telecommunication is the transmission of traffic from one place to another in a network through a media using mobile station. Cell site is referred to as the base station of telecommunication, it is part of telecom network that allow subscribers to access services from the telecom service providers.
Cell sites depend on core network and transmission system to function, it is not a standalone network. It is the interface between mobile station and the network (core network and transmission system).
In this research, an automated mobile telecom cell site system will be designed and developed. The system will help to provide accurate and reliable online information about cell sites equipment and determine profit or loss from cell sites.
Qualitative research approach will be used in the study while interview will be employed to collect data.
The emergence of ecommerce almost three decades ago has completely transformed the approach to purchasing goods and services across various countries in the world. Almost every country in the globe, now have some form of ecommerce operations, this has further been enhanced by the stay at home COVID-19 induced lockdowns. The value and volume of transactions has also increased in transactions. However, there has been security concerns impacting ecommerce operations, which has in part, led to increasing adoption of hosting ecommerce systems in the public cloud. Threat modelling offer mechanisms to enhance the security of information technology (IT) systems. In this paper, we apply different threat modelling techniques to decompose the migration of an on-premise hosted ecommerce system to the public cloud and also evaluate these threat modelling techniques.
Telecommunication is the transmission of traffic from one place to another in a network through a media using mobile station. Cell site is referred to as the base station of telecommunication, it is part of telecom network that allow subscribers to access services from the telecom service providers.
Cell sites depend on core network and transmission system to function, it is not a standalone network. It is the interface between mobile station and the network (core network and transmission system).
In this research, an automated mobile telecom cell site system will be designed and developed. The system will help to provide accurate and reliable online information about cell sites equipment and determine profit or loss from cell sites.
Qualitative research approach will be used in the study while interview will be employed to collect data.
It is convenient and the norm to have both data and power cables (battery charge) integrated as a single Universal Serial Bus (USB) cable for today’s mobile devices. While the data component of the cables serves as the channels for data communication, the power channel charges the mobile devices through an adapter connected to an Alternating Current (A/C) socket or directly to a USB port. This convenient and seemingly harmless design could also serve as a medium through which malicious hacks are carried out on the connected mobile devices as studies and recent experimentations has shown. This hacking variant called Juice Jacking now serve as a potential avenue for mobile device exploitation, especially in developing economies where poor power grid infrastructures has allowed for indiscretions in charging devices from any available. This paper formulates a simple architecture for Juice Jacking cyber-crime, review prove-of-concept experimentation for Juice Jacking from available literatures, identifies significant threats and levels of impact of this cyber-crime on the community. It also highlights strategies that could mitigate juice jacking in developing economies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.