Emmanuel Opara

 Emmanuel Opara

Emmanuel Opara

  • Courses2
  • Reviews2

Biography

Prairie View A&M University - Business


Resume

  • 1986

    Chevron

    Prairie View A&M University

    Chevron

    College of Business - Prairie View A&M University

    Prairie View Texas

    Professor of MIS [ curent research in Digital and Windows Forensics - Cyber Security]

    Prairie View A&M University

    Solano Community College

    4000 Suisun Valley Rd

    Fairfield

    CA 94534

    Academic Experience \nNational

    Instructor

    A Fellow of the International Information Management Association [F.I.I.M.A]

    Former President

    Current Board of Directors

    Vice President of Africa Continent

    International Information Management Association

  • 1977

    B.S

    Accounting

    M.B.A

    Business Administration -

    University of Houston-Clear Lake

    President 2003-2005\nGGU Doctor of Business Students Association

    Doctor of Business Administration [DBA]

    Management Science

  • Research

    Management

    Higher Education

    train cyber warriors in how to defend the kinetic assets of a physical

    PowerPoint

    Microsoft Office

    security assessments; anti-virus

    anti-spyware

    Virtual Machine

    and IPS researc

    Teaching

    Cyber Security

    Nonprofits

    Public Speaking

    Curriculum Development

    Leadership Development

    Forensics and Networking

    Community Outreach

    Solution attacks for clients in government

    military

    financial

    high technolog

    Microsoft Excel

    Scalability

    Interoperability and Movement of Data on the Web Using XML Technology.

    Gupta O. PhD

    Scalability

    Interoperability and Movement of Data on the Web Using XML Technology.

    Reginald Bell PhD

    The Relative Frequency of Reported Cases by Information Technology Professional of Breaches on Security Defenses

    Career in Information Technology: An Analysis of Job Satisfaction Among African American Males and African American Females in the United States

    Musa S

    PhD

    Statistical Analysis of VoDSL Technology for the Efficiency of Listening Quality of 640k/640k.

    et.al

    Mahfouz Ahmed PhD

    An Analysis of Historical Transformation of IT Giant Based on Sound Strategic Vision.

    Chong G

    PhD

    Ethical Framework for the Information Technology and Business Professionals.

    Measurement and Test Performance for Integrated Digital Loop Carrier for White Noise Impairment Using Interleaved Mode

    Gupta O. PhD

    Connectivity via Web Services: An Analysis for Interoperabe E-Commerce

    Soluade Oredele PHD

    Effect of Virtualization on Enterprise Network

    Servre/Desktop Systems on Small and Mid-Size Businesses [SMB's]

    Etnyre V

    PhD

    Rob Mohammed

    PhD

    Biometrics and Systems Security: An Overview of End-To-End Security System.

    Mustafa A. Solimon

    PhD

    Reginald Bell

    PhD

    Examining the Effects on Global Business of Women Using Information Technology

    Etnyre V

    PhD

    Enterprise Systems Network: SecurID Solutions

    the Authentication to Global Security Sytems.

    Abstract:\n\nThe war on cyber security issues has exploded exponentially. Persistent attacks are on the rise routinely penetrating perimeter defenses and bypassing antivirus technologies to successfully launch attacks against endpoints and servers. The Internet of Things [IoTs] have motivated hackers to compromise networks but a massive data breach does not have to be. Businesses

    hospitality

    travel

    healthcare

    insurance

    financial institutions

    retails and other big enterprise systems succumbed to lingering

    multistage attacks that siphoned sensitive

    and valuable data out of the respective networks. This study will generate next generation end-point security systems that will identify evil

    or unusual and abnormal patterns in an intrusion scheme. The outcome will know abnormal by finding Evil. Recommendation for best practices will be provided.

    The Unwitting Danger Within - Detection

    Investigation and Mitigation of a Compromised Network.

    Soluade Oredele PhD

    Security Breaches

    Network Exploits and Vulnerabilities: A Conundrum and an Analysis.

    Cyber Security

    Threat Intelligence: Defending the Digital Platform\n\nEmmanuel U Opara\n(Corresponding author: Emmanuel U Opara)\nCollege of Business

    Prairie View A&M University

    Prairie View - Texas U.S.A.1 \n(Email: euopara@pvamu.edu)\n\n\nMohammed T. Hussein\nCollege of Business

    Prairie View A&M University

    Prairie View - Texas U.S.A1 \n(Email: mthussein @pvamu.edu)\n\nABSTRACT\nNetwork breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion

    the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point

    it is proper to note that legacy platforms will no longer stand a chance to defend against the signature-less attacks. This study will create threat awareness

    find out capabilities of threat actors

    their motivations and objectives and identify best practices.\nKeyword: Breaches

    Exploits

    Network Security

    Threats

    Vulnerabilities

    \n

    Cyber Security

    Threat Intelligence: Defending the Digital Platform.

    Abstract\nEnterprise systems are constantly being attacked by cyber criminals in an escalating manner and this threat has continue to grow. The problem remains that mitigation tools are not adequate to keep attackers at bay. This study will outline signature and non-signature oriented threats on computers and network and will recommend ways enterprise systems can prevent and secure organizational network. \nKeyword: Forensic. Hacking

    exploit

    vulnerabilities

    cyber security

    and malware\n

    Network Platforms

    Advanced Persistence Threat – The Changing Patterns of Cyber-Attacks

    Akujuobi C

    PhD

    Musa S

    PhD

    'Utilization of Buffers for Performance Evaluation of Local Area Network Protocols

    Marchewka Jack

    PhD

    Enterprise Integrated Security Platform: Solution for Remote Access and Extranet Virtual Private Network [VPN]

    Vamuri

    V. PhD

    Information Technology and Resource Consumption: Causal Analysis of Paper Use

    Soluade Oredele

    PhD

    Straddling The Next Cyber Frontier: The Empirical Analysis On Network Security

    Exploits

    And Vulnerabilities

    Dr. Emmanuel U Opara is a Professor of MIS at the College of Business

    Prairie View A&M University. He teaches Cyber Securities

    Info & Comm in Digital Age

    Strategic MGMT & Bus Policy. \n\nHe is a distinguished board of Directors member & a “Fellow” [FIIMA] of the International Information Management Association. \n\nHe has interest in Integrated Network Systems Securities

    Windows - Computer Digital Forensics

    Incident Response and Threat Hunting

    Memory Analysis

    Containment of Advanced Adversaries

    Biometrics Technology

    Network and Data Communication \n\nHis passion is in Intrusion forensics

    vulnerability and exploits discovery

    intrusion detection/prevention analysis

    penetration testing while deploying python programming. He employs memory forensics analysis tools such as Rekall

    Volatility

    Memoryze

    Redline

    DumpIT

    FTK

    Hibr2bin [image copy of volatility]\n\nPrior to joining the Texas A&M Systems

    at Prairie View

    he worked for Chevron Corporation.\n\nHe received commendations for his contributions in the field of Information technology

    cyber security and forensics. Listed below are some of his publications:\n\nOpara

    E. & Soluade

    O. (2016). The Unwitting Danger Within - Detection

    Investigation and Mitigation of a Compromised Network. International Journal of Cyber Security & Digital Forensics. 5(4) 208-222 \nOpara

    E. U. & Hussein

    M. T. (2017). Cyber Security

    Threat Intelligence: Defending the Digital Platform. JITIM. 26(1)

    article 7

    2017\nOpara

    E.U. Mahfouz A. Holloway R. Reginald (2017)

    “Network Platforms

    Advanced Persistence Threat – The Changing Patterns of Cyber-Attacks

    Journal of Forensic and Criminal Investigation Science Inquest\nOpara

    E. & Mahfouz

    A. (2016). Conquering the Cyber Attacks: Analysis and Protecting the Enterprise Resources. IJBCRM

    6 (4)

    314-329. \nOpara

    E. & Soluade

    O. (2015). Straddling The Next Cyber Frontier: The Empirical Analysis On Network Security

    Exploits

    And Vulnerabilities Solutions. IJEIE 3 (1)

    10-18\n\n\n

    Dr. Emmanuel U.

    Opara

    DBA F.I.I.M.A.

    College of Business - Prairie View A&M University

    Prairie View A&M University

    Solano Community College

    Prairie View A&M University

MISY 1013

3.5(1)

MISY 2013

3.5(1)