Development of Blog on Network Security
10th Dec 2019
Introduction:
Table of Contents
ABSTRACT
1. Introduction
1.1. What is the problem?………………………………….
1.2. Solution a problem via blog on...
Tag: Cyber Security
Browse all dissertation content tagged as "Cyber Security" including dissertation examples, dissertation proposals, topic and title ideas, individual dissertation chapter examples, and help guides for both undergraduate and masters students.
Articles
Storage Services Security in Cloud Computing using Soft and Hard Decoding
10th Dec 2019
Introduction:
Abstract
Cloud Computing is an archetype of net based computing that allocates shared computer processing resources and data to various users. It offers services such as storage, processing, managing...
Utilization of the Lean Six Sigma Methodology to Cyber Security Threats
10th Dec 2019
Introduction:
Contents
Abstract
Acknowledgements
1. Introduction
1.1 Motivation
2. Literature Review
2.1 Lean manufacturing
2.1.1 Background
2.1.2 Lean Manufacturing Methodology
2.1.3 Plan, Do, Check, Act (...
An Investigation of Emotion Induced Phishing Susceptibility
10th Dec 2019
Introduction:
Happy or Fear? An Investigation of Emotion Induced Phishing Susceptibility
Abstract
Phishing has arisen to become the most hazardous threat to data breach and malware propagation with the profess...
Security Procedures for a Small Computer Network
10th Dec 2019
Introduction:
Table of Contents
2. Development Stage
2.1. Implementing the planned solution
Prototype built in Packet Tracer
a. Router Hardening
b. Switch Hardening
c. Hardening the Wireless Router
d. Harde...
Malware and Social Engineering Attacks
10th Dec 2019
Introduction:
SOCIAL ENGINEERING ATTACKS
While social engineering is closely related with cybersecurity today, it is not restricted to vulnerabilities of computer and network systems. Several established practices...
Security Measures for Software and Hardware Implementation
10th Dec 2019
Introduction:
Contents
Overview
Summary of Task
Active Directory, DNS and Print Server
ACTIVE DIRECTORY
PRINT SERVER
EXHANGE SERVER
BARRACUDA EMAIL SPAM FILTER
MICROSOFT OUTLOOK
VPN SITE-TO-SITE
RADIUS SERVER AAA
...
A New Security Method for 4G LTE Networks
10th Dec 2019
Introduction:
A New Security Method for 4G LTE Networks
Abstract
4G networks have been popular for a few years. There are different services that are offered by the service providers to the customers over the tele...
Causes and Effects of Cybercrime
10th Dec 2019
Introduction:
Abstract
This paper will talk about internet evolution, and how its use has changed the world and the way people live and function. The internet has definitely revolutionized the way people conne...
Mitigating the Risk of Phishing Attacks
10th Dec 2019
Introduction:
Abstract
Phishing is a form of cyber attack where the attacker spoof emails and use fraudulent websites to deceive online users into giving out their confidential information .
This dissertation look...
Security Management Models in Information Technology
9th Dec 2019
Introduction:
Abstract
The evolution of physical security has brought about numerous changes to the way security professionals think about security. In the past people associated physical security with a fenced fa...
Information Security Issues Faced by Healthcare in New Zealand
9th Dec 2019
Introduction: [Information security issues faced by the Healthcare in New Zealand-Possible Solutions]
Table of Contents
I. Abstract
II. Introduction
III. Literature Review
a) Information Security
b) Informatio...
Development of New Steganography Algorithm
9th Dec 2019
Introduction:
4.1 Introduction
This chapter provided the system activity for the image steganography, this includes the hiding/embedding of the secret message the unveiling of the message as well as the systematic...
Literature Review on Data Mining
9th Dec 2019
Introduction:
Literature Review on Data Mining
Accounting BISA HBS
Contents
1. Introduction
2. Data mining techniques applied in diverse industry
2.1 Machine learning
2.1.1 Classification
2.1.2 Prediction
2.1...
Theoretical Background for Security of CRNs
9th Dec 2019
Introduction: Chapter Two
2.1 Introduction to CRNs
In the first place, fixed spectrum assignment policies of the wireless applications significantly lead to wasting spectrum resources which are valuable as ...
Mal-Adware Detection for URL Security
9th Dec 2019
Introduction:
Mal-Adware Detection
Executive Summary
Our project is mainly going to focus on developing a tool which would give an output and it will show whether the URL is secure or not.
Let us try to understa...
An Artificial Neural Network Approach for Detecting Spectrum Sensing Data Falsification Attacks
9th Dec 2019
Introduction:
An Artificial Neural Network Approach for Detecting Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks
Abstract—In spectrum sensing data falsification attacks, malicious user...
A Survey of Person Re-identification Using Deep Learning Approach
9th Dec 2019
Introduction:
A survey of person re-identification using deep learning approach
Abstract:
From the past few years’ person re-identification plays an active role in the automated video surveillance and has been...
How Can Security Issues in an Online Voting System Be Addressed?
9th Dec 2019
Introduction:
How can security issues in an online voting system be addressed?
Abstract
This report consist of the tools and techniques that can be utilized to minimize electronic online voting from gaining unauth...
SQL Injection Attacks and Vulnerability Detection
9th Dec 2019
Introduction:
TABLE OF CONTENTS
TABLE OF CONTENTS
1.0 Introduction
2.0 SQL Injection Vulnerability Detection
3.0 SQL Injection Attacks
4.0 Experimental Set-Up
5.0 Conclusion
6.0 References
1.0 Introdu...
Approaches to Applying Defence in Depth to Web Applications
9th Dec 2019
Introduction: The premise for this report is to provide the client with a deeper understanding of the security landscape, by delivering a more comprehensive overview of Defence in Depth, security vulnerabilities in the server and application layers and finally, security recommendations for the client's website....
Relationship between Authentic Leadership of Information/Cyber Security Professionals and Program Outcomes
9th Dec 2019
Introduction:
Exploring the relationship between Authentic Leadership of Information Security/Cyber Security Professionals through Job Satisfaction of Information/Cyber Security Program Outcomes
Abstract
The pur...
Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack
9th Dec 2019
Introduction:
Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack
Abstract
In the current day and age, were computing and the internet is crucial for many services, such as bank...
Android Malware: Dynamic, Static and Hybrid Analysis Approaches On Mobile Phones
9th Dec 2019
Introduction:
Executive Summary:
With the increase of abundance of mobile phones and mobile operating systems, attackers have a larger platform to deploy malicious software. This paper focused on the Android opera...
Intrusion Detection in the Cloud Computing Using Neural Network and Artificial Bee Colony Optimization Algorithm
9th Dec 2019
Introduction:
Intrusion detection in the cloud computing using neural network and artificial bee colony optimization algorithm
Abstract
Recently, cloud computing is employed to solve many problems and fulfill user...
Popular Tags
- Browse All Tags
- Accounting
- Banking
- Biology
- Biomedical Science
- Business
- Business Analysis
- Business Strategy
- Cancer
- Chemistry
- Computer Science
- Construction
- Consumer Decisions
- Criminology
- Cultural Studies
- Cyber Security
- Economics
- Education
- Electronics
- Employment
- Energy
- Engineering
- Environmental Science
- Environmental Studies
- Equality
- Finance
- Food And Nutrition
- Health
- Health And Social Care
- History
- Human Resources
- Information Systems
- Information Technology
- International Business
- International Relations
- International Studies
- Law
- Leadership
- Management
- Marketing
- Mechanics
- Media
- Medical
- Medicine
- Mental Health
- Neurology
- Nursing
- Pharmacology
- Physiology
- Politics
- Psychology
- Sciences
- Social Policy
- Sociology
- Sustainability
- Teaching
- Technology
- Tourism
- Young People