Search
Skip to Search Results- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2021-04-01
Adeniyi, Oluwatola, Chauhan, Digvijay, Ezidonye, Ugochukwu, Ayeni, Mojisola, Patel, Vishwa
The evolution of communication technologies led to active virtualization of computer network solutions and proliferation of the Software Defined Networks (SDN) as a centralized network infrastructure management tool. The SDN is a relatively new technology and rush to move products to the market...
-
2007-01-08
The research studied the trend followed by software design error vulnerabilities. Statistical analysis methods were used to analyze software design error vulnerability data that were collected after January 1988 and before January 2007. The source of the data was the U.S Government National...
-
2014-01-01
STK is used in Kenya to facilitate SMS Banking using primarily GSM phones for transmission of the SMS messages. While providing a valuable banking solution it is not without security risk, some of which has been exploited. This paper will describe the underlying architecture of Kenyan STK based...
-
10/31/2011
This paper identifies, investigates, and explores the legal risks associated with migration to "Software-as-a-Service". This paper shows how these risks might impact migration. Based on the legal risks identified, this paper suggests mitigating strategies using, but not limited to, contractual...
-
2012-01-04
Network instability is a big concern when implementing sub-second timers. Implementing First Hop Redundancy Protocol (FHRP) sub-second advertisement interval can increase the potential for network instability. In this paper we studied the impact of sub-second timer implementation on network...
-
2007-01-04
The Enterprise Security Manager / Security Incident Manager (ESM / SIM) solutions were developed to enhance security. They are also called Security Information and Event Management (SIEM) from the merge of Security Event Manager (SEM) and SIM products. Such products were developed in order to...
-
Suggestion of security audit framework for virtual desktop infrastructure: A case study of Citrix XenDesktop
Download2014-01-01
Traditional desktop infrastructures evolve to incorporate new paradigms such as Virtual Desktop Infrastructure (VDI) since it improves agility, security and productivity for business. VDI also creates additional security challenges and risks including data leakage, lack of visibility, and single...
-
Systematic method of achieving Sarbanes-Oxley (SOX) compliance by harmonizing Cobit, ITIL and ISO 27002/17799
Download2008-01-04
The financial industry internationally is under a lot of scrutiny to provide an accurate reporting of their financial statements. Multiple frameworks exist but there are no guidelines for implementation. The guidelines that exist are ambiguous and hard to follow. A robust, compliance process is...
-
The behavioural study of low interaction honeypots: DShield and Glastopf in various web attacks
Download2014-01-01
Web application honey pots are one of the available solutions to track and understand the attack pattern and type of methods/techniques used by the attackers on the application. In this research paper, the study has been conducted to analyze the logging behavior of low interaction honeypots:...