The Rise of Fileless Malware and Attack Techniques
16th Dec 2019
Introduction:
Abstract
This is a research report into all aspects of Fileless Attack Malware. It provides the reader with concise information regarding what a Fileless Malware Threat is, how it infiltrates a machi...
Tag: Cyber Security
Browse all dissertation content tagged as "Cyber Security" including dissertation examples, dissertation proposals, topic and title ideas, individual dissertation chapter examples, and help guides for both undergraduate and masters students.
Articles
Behavioural Clustering Models to Develop an Enhancement into Online Privacy Concerns
16th Dec 2019
Introduction:
An Investigation into Behavioural Clustering Models to develop an enhancement into online privacy concerns
Abstract
The following report explores the world of internet privacy and aims to ra...
Security Strategies for the Internet
16th Dec 2019
Introduction:
Table of Contents
1. The World Wide Web………………………………………
1.1. URL, URI and URN…………...
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
16th Dec 2019
Introduction:
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Abstract— Cognitive radio technology aims at solving the problem of the spectrum scarcity by enabling secondary use...
Relationship Between Privacy, Security and Trust in E-vendors
16th Dec 2019
Introduction:
Abstract
The development of online retailing has been hampered by a number of factors, the most noticeable being consumers’ lack of trust in the electric commerce environment. Examining two of t...
Cyber Terrorism Trends and Impact on Technology
16th Dec 2019
Introduction:
Cyber Terrorism
Contents
Abstract
Introduction
Terrorism
Cyber Terrorism
Cyber Terrorist Events
The Challenges for Terrorist using Cyber
The Hyperbole around Cyber Terrorism
The Legal Dilemma
Risk As...
Cybersecurity Infrastructure in the NHS and UK Businesses
16th Dec 2019
Introduction:
Electronic devices with networking capabilities make up the critical network infrastructure for governments, businesses, academic agencies and human social interaction on a daily basis. The rapid adv...
Vulnerabilities and Threats for IoT and Security Mechanisms Available
16th Dec 2019
Introduction: IoT/WSN Security
Table of Contents
CHAPTER 1
Introduction and Report Outline
1.1 Aims and Objectives:
1.2 Literature Survey:
CHAPTER 2
Literature Survey
2.1 What is an iot?
2.2 What is a WSN?
2.3 Comp...
Types of Denial of Service Attacks
16th Dec 2019
Introduction:
Chapter One DoS and DDoS attacks
Denial of Service attacks
Availability, confidentiality and integrity are the main aims of computer security [1]. Availability is defined as the capability of using t...
Fundamentals of Cyber Security
16th Dec 2019
Introduction:
Fundamentals of Cyber Security
Table of Contents
INTRODUCTION
LITERATURE REVIEW
RESEARCH METHODOLOGY
Main Body
Explain the core information assurance (IA) principles
1) Identify the critical compone...
VLSI Implementation of a Key Distribution Server based Data Security Scheme for RFID
13th Dec 2019
Introduction:
VLSI Implementation of a Key Distribution Server based Data Security Scheme for RFID
Framework
RFID Technology is now ...
iOS Security Hacks and Government Issues
13th Dec 2019
Introduction:
iOS
Security: Rebelling against Hacks and the Government
Abstract
Apple’s mobile iOS
technology was introduced in 2007 and in eleven years, it has quickly grown to
be one of the top smartphon...
Is Cyber Warfare the Future of War?
13th Dec 2019
Introduction:
Introduction
Undoubtedly, the twentieth century could be counted as the
bloodiest in human history; man has been at war for much longer than he has
been at peace. The death tolls are incalculable ...
Cryptography Process for Secure Storage System
13th Dec 2019
Introduction:
INTRODUCTION
1.1 Purpose of the System
Defence organization operates with huge amount of data where the files or documents contain information which is very confidential and privileged. This pri...
Penetration Testing & Ethical Hacking
13th Dec 2019
Introduction:
Penetration Testing Vs. Ethical Hacking
Contents
Introduction
Penetration Testing & Ethical Hacking
Methodology
Define
Discovery
Exploitation and Reporting
Legal Issues
Conclusion
References
In...
Biometric Applications for Information Security
12th Dec 2019
Introduction: Chapter 1
1 .0 Introduction
In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the ...
Importance of Smartphone Security in Business Environment
12th Dec 2019
Introduction:
1.0 Introduction
The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject ...
Sniffing Attacks Prevention and Detection Techniques
12th Dec 2019
Introduction: Security in Wired/Wireless Networks: Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN)
ABSTRACT
During the past era, Information Technology made a r...
Internet Threats and Security for Protection
12th Dec 2019
Introduction: Introduction
Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major is...
Impact of Spyware on Computers and Mobile Devices
12th Dec 2019
Introduction: 1.0 INTRODUCTION
1.1 PROJECT OUTLINE
The title of the project chosen by the author is “Study on the impact of spyware on computers and mobile devices” which simply means that the author analyzes t...
Analysis of Honeynets and Honeypots for Security
12th Dec 2019
Introduction: Chapter 1 Introduction
Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of ...
Security for Insider Attacks in Mobile Ad Hoc Networks
12th Dec 2019
Introduction: Abstract
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networ...
Technology for Network Security
12th Dec 2019
Introduction: 2.0 CHAPTER TWO
2.1 INTRODUCTION
The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system.
It ...
Types of Cyber Crime and Strategies for Prevention
12th Dec 2019
Introduction: Crimes In cyber Age And Its Response By Indian Judiciary
Table of abbrevaitions
AIR – All India Reporter
AP – Andhra Pradesh
Art. – Article
Bom. – Bombay
ed. – Edition
L...
Computer Network Security within Organisations
12th Dec 2019
Introduction: Networking and Management
Introduction
A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include devices like printers and ot...
Popular Tags
- Browse All Tags
- Accounting
- Banking
- Biology
- Biomedical Science
- Business
- Business Analysis
- Business Strategy
- Cancer
- Chemistry
- Computer Science
- Construction
- Consumer Decisions
- Criminology
- Cultural Studies
- Cyber Security
- Economics
- Education
- Electronics
- Employment
- Energy
- Engineering
- Environmental Science
- Environmental Studies
- Equality
- Finance
- Food And Nutrition
- Health
- Health And Social Care
- History
- Human Resources
- Information Systems
- Information Technology
- International Business
- International Relations
- International Studies
- Law
- Leadership
- Management
- Marketing
- Mechanics
- Media
- Medical
- Medicine
- Mental Health
- Neurology
- Nursing
- Pharmacology
- Physiology
- Politics
- Psychology
- Sciences
- Social Policy
- Sociology
- Sustainability
- Teaching
- Technology
- Tourism
- Young People