Enterprise Scale Continuous Security Validation Models for Regulated Digital Infrastructures

Authors

  • Adetomiwa A. Dosunmu Experian, Allen, Texas, USA Author
  • Peter Olusoji Ogundele Ericsson, Lagos Nigeria Author

Keywords:

Continuous security validation, regulated infrastructures, cybersecurity assurance, enterprise security, compliance analytics

Abstract

Regulated digital infrastructures underpin critical economic and societal functions across sectors such as finance, healthcare, energy, and telecommunications. These environments are subject to stringent regulatory requirements, complex threat landscapes, and rapid technological change, making static or periodic cybersecurity assessments increasingly insufficient. In response, continuous security validation (CSV) has emerged as an approach that enables organizations to systematically test, measure, and validate the effectiveness of security controls on an ongoing basis. This paper develops a conceptual and analytical foundation for enterprise-scale continuous security validation models tailored to regulated digital infrastructures. The study positions CSV as a governance-oriented capability rather than a purely technical function, emphasizing its role in demonstrating regulatory compliance, operational resilience, and risk transparency. Building on established principles from continuous assurance, cyber risk management, and automated testing, the paper proposes a structured framework that integrates threat simulation, control performance measurement, and compliance evidence generation. The framework highlights how continuous validation supports proactive risk identification and enables organizations to align security operations with regulatory expectations and business objectives. Methodologically, the paper adopts a conceptual modeling and scenario-based analytical approach, synthesizing insights from prior research, industry practices, and regulatory guidance. The results illustrate how enterprise-scale CSV models enhance visibility into control effectiveness, reduce assessment blind spots, and support more informed governance decisions. The discussion further explores organizational, technological, and regulatory implications of adopting continuous validation at scale, including challenges related to data interpretation, operational integration, and assurance credibility. Overall, the paper contributes to the evolving discourse on cybersecurity assurance by articulating how continuous security validation can be operationalized as a strategic capability in regulated environments. It offers researchers and practitioners a structured lens for understanding CSV as a foundational element of modern digital infrastructure governance rather than a supplementary security tool.

Downloads

Download data is not yet available.

References

O. Michalec, S. Milyaeva, and A. Rashid, “When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?,” Big Data Soc., vol. 9, no. 1, p. 20539517221108369, Jan. 2022, doi: 10.1177/20539517221108369.

D. K. Holstein and K. Stouffer, “Trust but verify critical infrastructure cyber security solutions,” in 2010 43rd Hawaii International Conference on System Sciences, IEEE, 2010, pp. 1–8. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/5428445/

R. Kumar and R. Goyal, “Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance,” in Computer Networks and Inventive Communication Technologies, vol. 58, S. Smys, R. Palanisamy, Á. Rocha, and G. N. Beligiannis, Eds., in Lecture Notes on Data Engineering and Communications Technologies, vol. 58. , Singapore: Springer Nature Singapore, 2021, pp. 683–705. doi: 10.1007/978-981-15-9647-6_53.

D. Landoll, The security risk assessment handbook: A complete guide for performing security risk assessments. CRC press, 2021. [Online]. Available: https://www.taylorfrancis.com/books/mono/10.1201/9781003090441/security-risk-assessment-handbook-douglas-landoll

A. Bicaku, M. Tauber, and J. Delsing, “Security standard compliance and continuous verification for Industrial Internet of Things,” Int. J. Distrib. Sens. Netw., vol. 16, no. 6, p. 155014772092273, June 2020, doi: 10.1177/1550147720922731.

V. Battula, “Security compliance in hybrid environments using Tripwire and CyberArk,” Int. J. Res. Anal. Rev., vol. 10, no. 2, pp. 788–803, 2023.

N. Karri and S. K. Jangam, “Security and Compliance Monitoring,” Int. J. Emerg. Trends Comput. Sci. Inf. Technol., vol. 2, no. 2, pp. 73–82, 2021.

I. A. Essien, E. Cadet, J. O. Ajayi, E. D. Erigha, and E. Obuse, “Secure configuration baseline and vulnerability management protocol for multi-cloud environments in regulated sectors,” Int. J. Multidiscip. Res. Growth Eval., vol. 2, no. 3, pp. 686–696, 2021.

W. C. Lin and D. Saebeler, “Risk-based v. compliance-based utility cybersecurity-a false dichotomy,” Energy LJ, vol. 40, p. 243, 2019.

S. N. Matheu-García, J. L. Hernández-Ramos, A. F. Skarmeta, and G. Baldini, “Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices,” Comput. Stand. Interfaces, vol. 62, pp. 64–83, 2019.

U. P. D. Ani, H. (Mary) He, and A. Tiwari, “Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective,” J. Cyber Secur. Technol., vol. 1, no. 1, pp. 32–74, Jan. 2017, doi: 10.1080/23742917.2016.1252211.

B. Karabacak, S. O. Yildirim, and N. Baykal, “Regulatory approaches for cyber security of critical infrastructures: The case of Turkey,” Comput. Law Secur. Rev., vol. 32, no. 3, pp. 526–539, 2016.

M. A. Ojuri, “Measuring Software Resilience: A QA Approach to Cybersecurity Incident Response Readiness,” Multidiscip. Innov. Res. Anal., vol. 2, no. 4, pp. 1–24, 2021.

T. P. Layton, Information Security: Design, implementation, measurement, and compliance. Auerbach Publications, 2016. [Online]. Available: https://www.taylorfrancis.com/books/mono/10.1201/9781420013412/information-security-timothy-layton

N. Sun, C.-T. Li, H. Chan, M. Z. Islam, M. R. Islam, and W. Armstrong, “How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond,” Ieee Access, vol. 10, pp. 71749–71763, 2022.

K. Kosmowski and D. Gołębiewski, “Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance,” J. Pol. Saf. Reliab. Assoc., vol. 10, 2019,

E. Y. Gbabo, O. K. Okenwa, and P. E. Chima, “Framework for integrating cybersecurity risk controls into energy system implementation lifecycles,” J. Front. Multidiscip. Res., vol. 3, no. 1, pp. 365–371, 2022.

I. A. Essien et al., “Enforcing regulatory compliance through data engineering: An end-to-end case in fintech infrastructure,” J. Front. Multidiscip. Res., vol. 2, no. 2, pp. 204–221, 2021.

W. Stallings, Effective cybersecurity: a guide to using best practices and standards. Addison-Wesley Professional, 2018.

J. Uddoh, D. Ajiga, B. P. Okare, and T. D. Aduloju, “Digital resilience benchmarking models for assessing operational stability in high-risk, compliance-driven organizations,” Int J Multidiscip Res Growth Eval, vol. 2, no. 3, pp. 598–606, 2021.

N. Sun et al., “Defining security requirements with the common criteria: Applications, adoptions, and challenges,” IEEE Access, vol. 10, pp. 44756–44777, 2022.

M. A. Ojuri, “Cybersecurity Maturity Models as a QA Tool for African Telecommunication Networks,” SAMRIDDHI J. Phys. Sci. Eng. Technol., vol. 14, no. 04, pp. 155–161, 2022.

S. Ahmed, I. Ahmed, M. Kamruzzaman, and R. Saha, “Cybersecurity Challenges in IT Infrastructure and Data Management: A Comprehensive Review of Threats, Mitigation Strategies, and Future Trend,” Glob. Mainstream J. Innov. Eng. Emerg. Technol., vol. 1, no. 01, pp. 36–61, 2022.

O. Ilori, C. I. Lawal, S. C. Friday, N. J. Isibor, and E. C. Chukwuma-Eke, “Cybersecurity auditing in the digital age: A review of methodologies and regulatory implications,” J. Front. Multidiscip. Res., vol. 3, no. 1, pp. 174–187, 2022.

A. U. Patel et al., “Cybersecurity and information assurance for the clinical laboratory,” J. Appl. Lab. Med., vol. 8, no. 1, pp. 145–161, 2023.

C. Onwubiko, “Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy,” in 2015 international conference on cyber situational awareness, data analytics and assessment (cybersa), IEEE, 2015, pp. 1–10. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7166125/

S. A. M. Authority, “Cyber security framework,” Saudi Arab. Monet. Auth. Riyadh Saudi Arab., 2017, [Online]. Available: https://kr-labs.com.ua/books/SAMA%20Cyber%20Security%20Framework.pdf

T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance. O’Reilly Media, Inc., 2009.

A. Dalal, “Building comprehensive cybersecurity policies to protect sensitive data in the digital era,” Available SSRN 5424094, 2023, [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5424094

M. J. I. Saidur and M. K. Khan, “AUTOMATING NIST 800-53 CONTROL IMPLEMENTATION: A CROSS-SECTOR REVIEW OF ENTERPRISE SECURITY TOOLKITS,” ASRC Procedia Glob. Perspect. Sci. Scholarsh., vol. 3, no. 1, pp. 160–195, 2023.

J. P. M. Henriques, “Audit Compliance and Forensics Frameworks for Improved Critical Infrastructure Protection,” PhD Thesis, Universidade de Coimbra (Portugal), 2023.

R. Kumar and R. Goyal, “Assurance of data security and privacy in the cloud: A three-dimensional perspective,” Softw. Qual. Prof., vol. 21, no. 2, pp. 7–26, 2019.

N. H. Lechner, “An overview of cybersecurity regulations and standards for medical device software,” in Central European Conference on Information and Intelligent Systems, Faculty of Organization and Informatics Varazdin, 2017, pp. 237–249. [Online]. Available: https://www.bib.irb.hr:8443/1052156/download/1052156.QSS-3.pdf

M. T. Pham and L. H. Nguyen, “A Comparative Review of Cybersecurity Standards and Frameworks: Supporting Information Assurance in Government and Industry Systems,” Trans. Mach. Learn. Artif. Intell. Adv. Intell. Syst., vol. 13, no. 8, pp. 1–15, 2023.

R. Sabillon, J. Serra-Ruiz, V. Cavaller, and J. Cano, “A comprehensive cybersecurity audit model to improve cybersecurity assurance: The cybersecurity audit model (CSAM),” in 2017 International Conference on Information Systems and Computer Science (INCISCOS), IEEE, 2017, pp. 253–259. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8328116/

S. Yusif and A. Hafeez-Baig, “A Conceptual Model for Cybersecurity Governance,” J. Appl. Secur. Res., vol. 16, no. 4, pp. 490–513, Oct. 2021, doi: 10.1080/19361610.2021.1918995.

A. O. Akinade, P. A. Adepoju, A. B. Ige, A. I. Afolabi, and O. O. Amoo, “A conceptual model for network security automation: Leveraging AI-driven frameworks to enhance multi-vendor infrastructure resilience,” Int. J. Sci. Technol. Res. Arch., vol. 1, no. 1, pp. 39–59, 2021.

H. M. Melaku, “A dynamic and adaptive cybersecurity governance framework,” J. Cybersecurity Priv., vol. 3, no. 3, pp. 327–350, 2023.

A. Joseph, “A holistic framework for unifying data security and management in modern enterprises,” Int. J. Soc. Bus. Sci., vol. 17, no. 10, pp. 602–609, 2023.

M. O. Faruq and M. J. I. Saidur, “ALIGNING FEDRAMP AND NIST FRAMEWORKS IN CLOUD-BASED GOVERNANCE MODELS: CHALLENGES AND BEST PRACTICES,” Rev. Appl. Sci. Technol., vol. 1, no. 01, pp. 01–37, 2022.

Didi P.U., Abass, O.S. & Balogun, O., “‪A Hybrid Channel Acceleration Strategy for Scaling Distributed Energy Technologies in Underserved Regions.‬.” 2022‬‬

Abass, O.S., Balogun, O. & Didi P.U., “‪A Patient Engagement Framework for Vaccination and Wellness Campaigns in Resource-Constrained Settings.‬.” 2023‬‬

M. N. Asata, D. Nyangoma, and C. H. Okolo, “The Impact of Aircraft Type Familiarity on Service Consistency and Passenger Trust,” Int. J. Sci. Res. Sci. Technol., vol. 10, no. 6, pp. 754–772, 2023.

J. O. Ajayi et al., “Strategic Analytics Enablement: Scaling Self-Service BI through Community-Based Training Models”.

M. N. Asata, D. Nyangoma, and C. H. Okolo, “Reducing Passenger Complaints through Targeted Inflight Coaching: A Quantitative Assessment,” Int. J. Sci. Res. Civ. Eng., vol. 7, no. 3, pp. 144–162, 2023.

D. R. E. Ewim et al., “Survey of wastewater issues due to oil spills and pollution in the Niger Delta area of Nigeria: a secondary data analysis,” Bull. Natl. Res. Cent., vol. 47, no. 1, p. 116, July 2023, doi: 10.1186/s42269-023-01090-1.

C. S. Anyanwu and T. Babawarun, “Shear Stress Distribution in a Fuselage of an Aircraft,” J. Eng. Exact Sci., vol. 9, no. 3, pp. 15779–01e, 2023.

A. Hamdan, A. Al-Salaymeh, I. M. AlHamad, S. Ikemba, and D. R. E. Ewim, “Predicting future global temperature and greenhouse gas emissions via LSTM model,” Sustain. Energy Res., vol. 10, no. 1, p. 21, Dec. 2023, doi: 10.1186/s40807-023-00092-x.

O. F. Orikpete, S. Ikemba, and D. R. E. Ewim, “Integration of renewable energy technologies in smart building design for enhanced energy efficiency and self-sufficiency,” J. Eng. Exact Sci., vol. 9, no. 9, pp. 16423–01e, 2023.

C. C. Okoye et al., “Integrating Business principles in STEM Education: fostering entrepreneurship in students and educators in the US and Nigeria,” 2023, [Online]. Available: https://jurnal.narotama.ac.id/index.php/ijebd/article/download/2244/1592

O. A. Onukogu et al., “Impacts of industrial wastewater effluent on Ekerekana Creek and policy recommendations for mitigation,” J. Eng. Exact Sci., vol. 9, no. 4, pp. 15890–01e, 2023.

D. R. E. Ewim, N. Ninduwezuor-Ehiobu, O. F. Orikpete, B. A. Egbokhaebho, A. A. Fawole, and C. Onunka, “Impact of data centers on climate change: a review of energy efficient strategies,” J. Eng. Exact Sci., vol. 9, no. 6, pp. 16397–01e, 2023.

A. A. Fawole, O. F. Orikpete, N. N. Ehiobu, and D. R. E. Ewim, “Climate change implications of electronic waste: strategies for sustainable management,” Bull. Natl. Res. Cent., vol. 47, no. 1, p. 147, Oct. 2023, doi: 10.1186/s42269-023-01124-8.

O. F. Bayeroju, A. N. Sanusi, and Z. Q. S. Nwokediegwu, “Conceptual Framework for Modular Construction as a Tool for Affordable Housing Provision,” Shodhshauryam Int. Sci. Refereed Res. J., vol. 5, no. 4, pp. 302–322, 2022.

O. F. Bayeroju, A. N. Sanusi, and Z. Q. Sikhakhane, “Conceptual Framework for Green Building Certification Adoption in Emerging Economies and Developing Countries,” Shodhshauryam Int. Sci. Refereed Res. J., vol. 5, no. 4, pp. 281–301, 2022.

S. T. Fasasi, Z. S. Nwokediegwu, and O. J. Adebowale, “An Engineering Concept for Digital Permit Management Systems to Improve Compliance across Oil and Gas Operations,” 2022.

T. S. Mogaji, S. T. Fasasi, A. O. Ogundairo, and I. A. Oluwagbemi, “DESIGN AND SIMULATION OF A PICO HYDROELECTRIC TURBINE SYSTEM,” FUTA J. Eng. Eng. Technol., vol. 16, no. 1, pp. 132–139, 2022.

S. T. Fasasi, Z. S. Nwokediegwu, and O. J. Adebowale, “Conceptualization of Air Quality Index Performance Metrics for High-Pollution Industrial Zones Under EPA Oversight,” 2022, [Online]. Available: https://shisrrj.com/paper/SHISRRJ221227.pdf

Daniel Raphael Ejike Ewim, Modestus O Okwu, Ekene Jude Onyiriuka, Aasa Samson Abiodun, Sogo Mayokun Abolarin, Amr Kaood, “View article.”

S. A. Adio, T. A. Alo, R. O. Olagoke, A. E. Olalere, V. R. Veeredhi, and D. R. E. Ewim, “Thermohydraulic and entropy characteristics of Al2 O3 ‐water nanofluid in a ribbed interrupted microchannel heat exchanger,” Heat Transf., vol. 50, no. 3, pp. 1951–1984, May 2021, doi: 10.1002/htj.21964.

S. A. Adio et al., “Thermal and entropy analysis of a manifold microchannel heat sink operating on CuO–water nanofluid,” J. Braz. Soc. Mech. Sci. Eng., vol. 43, no. 2, p. 76, Feb. 2021, doi: 10.1007/s40430-020-02772-x.

M. AFOLABI, O. A. ONUKOGU, T. O. IGUNMA, A. K. ADELEKE, and Z. Q. S. NWOKEDIEGWU, “Systematic Review of Fluidized Bed Reactor Applications for Ammonia and Nitrite Removal in High-Strength Wastewaters,” 2021.

O. F. Bayeroju, A. N. Sanusi, and Z. Q. S. Nwokediegwu, “Review of Circular Economy Strategies for Sustainable Urban Infrastructure Development and Policy Planning,” 2021, [Online]. Available: https://gisrrj.com/paper/GISRRJ1213316.pdf

O. Onaghinor, O. T. Uzozie, O. J. Esan, G. O. Osho, and J. O. Omisola, “Resilient supply chains in crisis situations: A framework for cross-sector strategy in healthcare, tech, and consumer goods,” IRE J., vol. 4, no. 11, pp. 334–335, 2021.

S. T. Fasasi, O. J. Adebowale, A. Abdulsalam, and Z. Q. S. Nwokediegwu, “Predictive risk modeling of high-probability methane leak events in oil and gas networks,” Int. J. Multidiscip. Evol. Res., vol. 2, no. 1, pp. 40–46, 2021.

O. Onaghinor, O. T. Uzozie, O. J. Esan, E. A. Etukudoh, and J. O. Omisola, “Predictive modeling in procurement: A framework for using spend analytics and forecasting to optimize inventory control,” IRE J., vol. 5, no. 6, pp. 312–314, 2021.

DRE Ewim, AO Adelaja, EJ Onyiriuka, JP Meyer, Z Huan, “‪Modelling of heat transfer coefficients during condensation inside an enhanced inclined tube.‬.” 2021‬‬

Daniel RE Ewim, Maxwell E Uduafemhe, “‪Analysis of Students’ Grades in STEM Subjects at Senior School Certificate Examination Before and During COVID-19 Pandemic in Nigeria‬.” 2021‬‬

Michael O Dioha, Atul Kumar, Daniel RE Ewim, Nnaemeka V Emodi, “‪Alternative scenarios for low-carbon transport in Nigeria: a long-range energy alternatives planning system model application‬.” 2021‬‬

D. Bihani, B. C. Ubamadu, A. I. Daraojimba, G. O. Osho, and J. O. Omisola, “AI-Enhanced Blockchain Solutions: Improving Developer Advocacy and Community Engagement through Data-Driven Marketing Strategies,” Iconic Res Eng J, vol. 4, no. 9, 2021.

M. L. Giwah, Z. S. Nwokediegwu, E. A. Etukudoh, and E. Y. Gbabo, “A strategic blueprint model for poverty and unemployment reduction through public policy interventions,” Int. J. Multidiscip. Futur. Dev., vol. 2, no. 2, pp. 1–6, 2021.

M. AFOLABI, O. A. ONUKOGU, T. O. IGUNMA, A. K. ADELEKE, and Z. Q. S. NWOKEDIEGWU, “A Conceptual Framework for Process Intensification in Multi-Stage Chemical Effluent Treatment Units,” 2021.

A. K. Adeleke, “Ultraprecision Diamond Turning of Monocrystalline Germanium,” 2021.

M. AFOLABI, O. A. ONUKOGU, T. O. IGUNMA, A. K. ADELEKE, and Z. Q. S. NWOKEDIEGWU, “Systematic Review of pH-Control and Dosing System Design for Acid-Base Neutralization in Industrial Effluents,” 2021.

Oluwatolani Vivian Akinrinoye Oyenmwen Umoren, Paul Uche Didi, Oluwatosin Balogun, Ololade Shukrah Abass, “‪Strategic Integration of Net Promoter Score Data into Feedback Loops for Sustained Customer Satisfaction and Retention Growth‬.” 2021‬‬

D. Atere, A. O. Shobande, and I. H. Toluwase, “Review of Global Best Practices in Supply Chain Finance Structures for Unlocking Corporate Working Capital,” Int. J. Multidiscip. Res. Growth Eval., vol. 1, no. 3, pp. 232–243, 2020, doi: 10.54660/.IJMRGE.2020.1.3.232-243.

Didi P.U., Abass, O.S. & Balogun, O., “‪Leveraging Geospatial Planning and Market Intelligence to Accelerate Off-Grid Gas-to-Power Deployment.‬.” 2020‬‬

Oluwatolani Vivian Akinrinoye Oyenmwen Umoren, Paul Uche Didi, Oluwatosin Balogun, Ololade Shukrah Abass, “‪Design and Execution of Data-Driven Loyalty Programs for Retaining High-Value Customers in Service-Focused Business Models‬.” 2020‬‬

Abass, O.S., Balogun, O. & Didi P.U., “‪A Sentiment-Driven Churn Management Framework Using CRM Text Mining and Performance Dashboards‬.” 2020 ‬‬

Balogun, O., Abass, O.S. & Didi P.U., “‪A Market-Sensitive Flavor Innovation Strategy for E-Cigarette Product Development in Youth-Oriented Economies.‬.” 2020‬‬

Oluwatolani Vivian Akinrinoye Oyenmwen Umoren, Paul Uche Didi, Oluwatosin Balogun, Ololade Shukrah Abass, “‪A Conceptual Framework for Improving Marketing Outcomes Through Targeted Customer Segmentation and Experience Optimization Models‬.” 2020‬‬

Sunday J Ibrahim, Daniel R Ewim, Okibe A Edeoja, “‪Simulation of safety and transient analysis of a pressurized water reactor using the personal computer transient analyzer‬.” 2020‬‬

Josua P Meyer, Daniel Raphael Ejike Ewim, “‪Heat transfer coefficients during the condensation of low mass fluxes in smooth horizontal tubes‬.” 2020‬‬

Suvanjan Bhattacharyya, Manabendra Pathak, Mohsen Sharifpur, Sunil Chamoli, Daniel RE Ewim, “‪Heat transfer and exergy analysis of solar air heater tube with helical corrugation and perforated circular disc inserts‬.” 2020‬‬

Daniel Raphael Ejike Ewim, R Kombo, Josua P Meyer, “‪Flow pattern and experimental investigation of heat transfer coefficients during the condensation of r134a at low mass fluxes in a smooth horizontal tube.‬.” 2020‬‬

Adecunle O Adelaja, Daniel RE Ewim, Jaco Dirker, Josua Petrus Meyer, “‪Experimental investigation on pressure drop and friction factor in tubes at different inclination angles during the condensation of R134a‬.” 2020‬‬

EJ Onyiriuka, AI Obanor, Mostafa Mahdavi, Daniel Raphael Ejike Ewim, “‪Evaluation of single-phase, discrete, mixture and combined model of discrete and mixture phases in predicting nanofluid heat transfer characteristics for laminar and turbulent flow regimes‬.” 2020‬‬

Daniel Raphael Ejike Ewim, Josua P Meyer, “‪Condensation heat transfer coefficients of enhanced tubes‬.” 2020‬‬

D. R. E. Ewim, J. P. Meyer, and S. N. R. Abadi, “Condensation heat transfer coefficients in an inclined smooth tube at low mass fluxes,” Int. J. Heat Mass Transf., vol. 123, pp. 455–467, 2018.

DRE Ewim, Josua P Meyer, “‪Pressure drop during condensation at low mass fluxes in smooth horizontal and inclined tubes‬.” 2020‬‬

Eunice C Nnaji, Donald Adgidzi, Michael O Dioha, Daniel RE Ewim, Zhongjie Huan, “‪Modelling and management of smart microgrid for rural electrification in sub-saharan Africa: The case of Nigeria‬.” 2020‬‬

Adekunle O Adelaja, Daniel RE Ewim, Jaco Dirker, Josua P Meyer, “‪Heat transfer, void fraction and pressure drop during condensation inside inclined smooth and microfin tubes‬.” 2020‬‬

I. A. Essien, E. Cadet, J. O. Ajayi, E. D. Erigha, and E. Obuse, “Cloud Security Baseline Development Using OWASP, CIS Benchmarks, and ISO 27001 for Regulatory Compliance.,” vol. 2, no. 8, 2019.

A. N. Sanusi, O. F. Bayeroju, Z. Queen, and S. Nwokediegwu, “Circular Economy Integration in Construction: Conceptual Framework for Modular Housing Adoption,” 2019.

O. F. Bayeroju, A. N. Sanusi, Z. Queen, and S. Nwokediegwu, “Bio-Based Materials for Construction: A Global Review of Sustainable Infrastructure Practices,” 2019.

I. A. Essien, E. Cadet, J. O. Ajayi, E. D. Erigha, and E. Obuse, “Cyber Risk Mitigation and Incident Response Model Leveraging ISO 27001 and NIST for Global Enterprises.,” vol. 3, no. 7, 2020.

A. O. Shobande, D. Atere, and I. H. Toluwase, “Conceptual Model for Evaluating Mid-Market M&A Transactions Using Risk-Adjusted Discounted Cash Flow Analysis,” vol. 2, no. 7, 2019.

S. T. Fasasi, O. J. Adebowale, A. Abdulsalam, and Z. Q. S. Nwokediegwu, “Benchmarking performance metrics of methane monitoring technologies in simulated environments,” Iconic Res. Eng. J., vol. 3, no. 3, pp. 193–202, 2019.

S. T. FASASI, O. J. ADEBOWALE, A. ABDULSALAM, and Z. Q. S. NWOKEDIEGWU, “A Techno-Economic Model of Continuous Versus Intermittent Methane Monitoring Programs,” 2019.

EJ Onyiriuka, OO Ighodaro, AO Adelaja, DRE Ewim, S Bhattacharyya, “‪A numerical investigation of the heat transfer characteristics of water-based mango bark nanofluid flowing in a double-pipe heat exchanger‬.” 2019‬‬

I. A. Essien, E. Cadet, J. O. Ajayi, E. D. Erigha, and E. Obuse, “Regulatory Compliance Monitoring System for GDPR, HIPAA, and PCI-DSS Across Distributed Cloud Architectures.,” vol. 3, no. 12, 2020.

Umoren, O., Didi P.U., Balogun, O., Abass, O.S. & Akinrinoye, O.V., “‪Linking Macroeconomic Analysis to Consumer Behavior Modeling for Strategic Business Planning in Evolving Market Environments.‬.” 2019‬‬

D. Atere, A. O. Shobande, and I. H. Toluwase, “Framework for Designing Effective Corporate Restructuring Strategies to Optimize Liquidity and Working Capital,” Iconic Res. Eng. J., vol. 2, no. 10, pp. 555–569, Apr. 2019.

Downloads

Published

12-12-2024

Issue

Section

Research Articles

How to Cite

[1]
Adetomiwa A. Dosunmu and Peter Olusoji Ogundele, “Enterprise Scale Continuous Security Validation Models for Regulated Digital Infrastructures”, Int J Sci Res Humanities and Social Sciences, vol. 1, no. 2, pp. 929–945, Dec. 2024, Accessed: Feb. 06, 2026. [Online]. Available: https://mail.ijsrhss.com/index.php/home/article/view/IJSRSSH242773