The internet of things (IoT) is everywhere. It's in our homes, cars, offices and most commonly around our wrists. It's changing the way factories are run, how health care is delivered and how cities operate. With an estimated 5.5 million new "things" connected each day, and an expected 6.4 billion in circulation by the end of 2018, the IoT will increasingly become part of our lives. But with the IoT's proliferation comes great responsibility. You cannot take the security of the rapidly expanding IoT ecosystem for granted. Even the smallest, most minimally connected device must have the appropriate safeguards built in throughout its lifecycle. It is time to focus on IoT security at the point of design to securely manage devices from inception through implementation. The potential of IoT devices and sensors is enormous, even in Nigeria, but if the security of each device and application is taken lightly, it is very likely that the exploitation of unguarded vulnerabilities will stop the progress, preventing us from ever fully realizing that potential. This paper takes a comprehensive survey of the security architecture, vulnerabilities and challenges facing the successful implementation of IoT in Nigeria and proposed far-reaching and holistic security solutions to protect IoT devices/se network and applications from being exploited by hackers, malwares and other undesirable elements so that the opportunities from IoT implementations will be realised in Nigeria in the nearest future.
Triple-negative breast cancer is a type of aggressive breast cancer without the immunohistochemical expression of estrogen receptors, progesterone receptors and human epidermal growth factor receptor-2; with poor prognosis, greater relapse risk and worse survival in general. Its proportion in all breast cancer cases ranges from 15 to 20%. Triple negative breast cancer is more prevalent among younger women, particularly African, African-American, Latino and obese women. This observed prevalence, is an age and ethnic related factor which fingers estrogenic agents as a common feature in TNBC occurrence. Inherited variation in the let-7 binding site on the KRAS oncogene has been revealed to confer increased susceptibility to triple negative breast cancer, especially in premenopausal, African-American and Hispanic women. About 15-40% of triple negative breast tumors have BRCA-related epigenetic down-regulation and increased expression of the inhibitors of BRCA1 function, which have be found to be related to indirect
The quest for improved communications among objects interconnected in a network has long been awaited. The current fourth generation network (4G) does not enable the range of services the future require, as the fifth-generation network (5G) will be faster and more flexible. The 5G networks and Internet of Things technology seem to be the reality that best describes the basic principles of the future generation mobile network technology (5G). It is anticipated to let loose a substantial IoT environment where millions of connected devices will get their communication requirements concerning speed, latency, and cost. The fifth-generation network (5G) symbolizes a fundamental change in structural design in the communication network which will open a renowned future revenue generation through groundbreaking services made possible through 5G-enabled devices with laptops, smartphones, smart cities, and tablets. The use of 5G seems to be pictured as a complicated union of future-generation technical improvements on telecommunication networks which will assist 5G to become the mechanism for future-generation IoT services. These include highly developed inflection plans for accessing a wireless network, network sharing abilities, mechanized network request, network function virtualization, and support for cloud-optimized distributed network applications. In this paper, a framework of the expected integration of 5G and internet of things (IoT) will be presented showing how the expected solution of the communication need for millions of people, interconnected devices, smart cities, smartphones in a network will be achieved, and communication among users will be enhanced. The presented framework that would help to understand, evaluate and access the various generations of mobile networks, and view how the 5G network will be an improvement for better performance were discussed.
Abstract-In January 2012, the Nigeria Apex Bank, CentralBank of Nigeria (CBN) rolled out guidelines for the transition of Nigeria's mainly cash-based economy and payment system to cashless and electronic payment (e-payment) system ending over 50 years of mainly cash-based operated economy and payment system. This announcement elicited mixed reactions firstly excitement due to the enormous benefits this transition will impact on Nigeria economy and at the same time elicited panic due to unpreparedness of the economy to transit successfully to electronic payment in a system hitherto filled with bobby trap of security challenges. Ten months later after the introduction of the policy, only a handful of the major stakeholders are fully compliant mainly because of the complexity and the high prohibitive cost of implementation of CBN adopted security framework, the Payment Card Industry Data Security Standard (PCI DSS). This paper surveys the security challenges facing the full implementation of the cashless epayment policy of Nigeria and at the end introduced an enhanced modified security framework for Nigeria's cashless economy that may be easier and cheaper to implement by the majority of the stakeholders after studying the loopholes in the current Nigeria epayment system models.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.