Abstract: In attempting to answer the question of whether the Office of the Auditor General is doing enough to protect the sensitive data in its possession, I start off by stating the current information security trends. The trends highlight an upward rise in data breaches despite the numerous traditional approaches to secure data and network resources like firewalls, antiviruses, anti-malware gateways etc. In validation a study is performed at the Office of the Auditor General. Analysis of ...
Abstract: The growth of technology advancement has promoted a borderless environment among users, organizations, global industry and easy access to information. The use of the internet and computer systems in a teaching environment parallel increased the number of threats in today's world. Lack of information security practices is the major cause of security breaches. Information security needs to be addressed amongst users for the protection of organizational assets. Human knowledge, attit...
Abstract: The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert m...
Abstract: In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching the destination through malicious behavior node. To overcome this problem we can present a protocol called SNDP (secure neighbor discovery pro...
Abstract: Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing are playing major role in the shift from the traditional black board teaching to contemporary E-Learning and M-Learning environment. But the major issue with the wireless network is vulnerability, denial of service and in general security compared to the wired ...
Abstract: The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity. The AMI subsystem has smart meters as one of the components and they play a vital role in enabling communication between the utility provider and consumers. Smart meters can report real-time electricity consumption readings of the consumer to the utility. Securing this communication link from attacks remain very important for ...
Phishing attacks are a serious risk to people and businesses because they try to trick users into sending critical information by using phony emails and websites. Users remain susceptible to these assaults because sophisticated phishing websites are frequently difficult for existing preventive measures to identify and block. As a result, a reliable detection system that can recognize and stop phishing assaults is required. The goal of the research is to create a detection system that efficien...
The arithmetic/logic unit is the component of the CPU where data is held temporarily and where calculations take place. The control unit controls and interprets the execution of instructions. Most of these actions are retrievals of instructions from memory followed by movements of data or addresses from one part of the CPU to another. The control unit determines the particular instruction to be executed by reading the contents of a program counter (PC), sometimes called an instruction pointer...
Pipelining is one way of improving the overall processing performance of a processor. This architectural approach allows the simultaneous execution of several instructions. Pipelining is transparent to the programmer; it exploits parallelism at the instruction level by overlapping the execution process of instructions. It is analogous to an assembly line where workers perform a specific task and pass the partially completed product to the next worker. This chapter explains various types of pi...
The world population has increases day by day and projected to reach 9 billion people by 2050, so that the agricultural consumption will also increase. There is extreme need to fulfil the food demand of each and every person. Agriculture sector is the most promising sector, dealing with the lot of problems now a day’s one of the main problems is labour unavailability for farming. Other problems or difficulties are extreme weather events, inadequate amount and inefficient application of fert...
The following study is devoted to the phenomenon of unmanned aerial vehicles used throughout known history on the battlefield or for military purposes. The purpose of the following text is to familiarise the reader with an overview with the contemporary and historical employment of the unmanned vehicles on the battlefield. The study also aims to show that the concept of unmanned combat vehicles, also unmanned aerial combat vehicles, is far more ancient than is it is widely known. The article ...
What is Wireshark? Wireshark is a network packet analyzer. A network packet analyzer used to capture network packets and display that packet data as detailed as possible. My network capturing was done on wireshark on kali linux, Some intended uses of wireshark 1.Network administrators use it to troubleshoot network problems 2.Network security engineers use it to examine security problems 3.Engineers use it to verify network applications 4.Developers use it to debug protocol implementations 5...
Some analytical techniques are required in order to the attempt some relevant information. It gives a broad overview of some of the most commonly used techniques and technologies to help the reader to better understand the tools based on big data analytics. There are many analytic techniques that could be employed when considering a big data project. Which ones are used that depends on the type of data being analyzed, the technology available to you, and the research questions you are trying ...
TABLE OF CONTENTS 1.0.Introduction 1.1.Packet capturing and Analysis 1.2.Definition of key terms. 1.3.Scope of the work. 2.0.Related work. 2.1Aims and objectives of Research work. 3.0.Materials and Method. 3.1Tools and Applications used 3.2Wireshark 3.2.1Uses of Wireshark 3.2.2Features of Wireshark 4.0.Results and Discussion 4.1Packets Capturing using Wireshark 4.2Packets Analyzing using Wireshark 4.3IP address Capturing/Tracing 5.0.Summary & Conclusion 5.1Summary 5.2Conclusion References 1...
Cyber security is a fast growing pace in the society today and as a result of that, its growth is becoming more and more widespread. According to the 2015 (ISC) Global Information Security Workforce Study, a shortfall of 1.8 million cybersecurity jobs will happen by 2022 cite mat 1. Allegedly, the most common reason for this fact is the lack of qualified personnel. As a consequence of this trend even in education sector, Information Technology (IT), Cyber space, Online platform, medical field...