Search
Skip to Search Results- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2007-01-01
Supervisory Control and Data Acquisition (SCADA) systems within the corporate environment are changing into information systems. As such, they also are becoming information assets within the organization and, therefore, they need to be protected appropriately, possibly via existing IT standards...
-
Scoping ITGCs for SOx 404 audits: Combining frameworks and/or methodologies to achieve efficiencies and effectiveness
Download2008-01-05
Scoping IT general controls (ITGC's) for the purpose of complying with legislation such as Section 404 of the Sarbanes-Oxley Act has been no simple feat. Both management and auditors alike have faced challenges in terms of scoping the work that is to be performed around ITGC's. The Public Company...
-
Securing remote access networks using malware detection tools for industrial control systems
Download2020
With their role as an integral part of its infrastructure, Industrial control systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of information systems (IS) into their processes, connecting them to the...
-
2014-01-01
VoIP technology is rapidly gaining adoption because of its advantage in providing voice services on IP networks. Therefore, it also gains attention of hackers and crackers. In this work, a security issue namely eavesdropping and phrase spotting is handled using a new technique. The proposed...
-
2020
Containers technology has radically changed the ways for packaging applications and deploying them as services in a cloud environment. According to the recent report of TrendMicro security predictions of 2020, the vulnerabilities in container components that are deployed with cloud architecture...
-
2018
Software Defined Networking (SDN) a novel approach to networking has introduced both innovative opportunities and disadvantages in the networking field. The opportunities brought by this technology varies from the facility in configuring and managing a vast and dynamic network while using less...
-
2013-01-01
This paper provides insight into the security of the existing mobile payment system by studying its system architecture and the security architecture. It also reviews the security vulnerabilities in some components of the architecture and studies how these vulnerabilities might be exploited. This...
-
2020
There has been notable proliferation of network-enabled devices. The myriad of security threats and highly publicized data breaches demonstrate the importance of protecting access to the evolving enterprise network. The introduction of Software Defined Network (SDN) has brought about remarkable...
-
2022
This research analyzed selected contact tracing applications to identify potential vulnerabilities and geolocation of services used by these applications. MobSF framework and Android emulators were used to perform static and dynamic analysis of the applications. Security policies of applications...
-
2020
Intelligent Chatbot services become one of the mainstream applications in user help and many other areas. Apart from bringing numerous benefits to users these services may bring additional risks to the companies that employ them. The study starts with the review of the scale of chatbot industry...