Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in March 2026 (Volume 29, Issue 3) Submit manuscript

From keyboard to cloud-base network revamped data lifecycle cybersecurity

Breadcrumb

  • Home
  • From keyboard to cloud-base network revamped data lifecycle cybersecurity

Amadi Chukwuemeka Augustine 1, *, Juliet Nnenna Odii 2 and Stanley A Okolie 2

1 Audit & Investigation Department, IIRS, Owerri, Imo State, Nigeria.
2 Department of Computer Science, FUTO, Owerri. Imo State, Nigeria.
 
Review Article
World Journal of Advanced Research and Reviews, 2021, 11(03), 226-233
Article DOI: 10.30574/wjarr.2021.11.3.0442
DOI url: https://doi.org/10.30574/wjarr.2021.11.3.0442
 
Received on 10 August 2021; revised on 17 September 2021; accepted on 19 September 2021
 
This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of information security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.
 
Cybersecurity; Cloud base network; Cyber-attack; Advanced persistent threat; Enterprise security architecture; Malware
 
https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2021-0442.pdf

Preview Article PDF

Amadi Chukwuemeka Augustine, Juliet Nnenna Odii and Stanley A Okolie. From keyboard to cloud-base network revamped data lifecycle cybersecurity. World Journal of Advanced Research and Reviews, 2021, 11(3), 226-233. Article DOI: https://doi.org/10.30574/wjarr.2021.11.3.0442

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution