You searched for subject:(Computer networks Security measures)
.
Showing records 1 – 30 of
132308 total matches.
◁ [1] [2] [3] [4] [5] … [4411] ▶

Nelson Mandela Metropolitan University
1.
Naudé, Kevin Alexander.
Assessing program code through static structural similarity.
Degree: MSc, Faculty of Science, 2007, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/578
► Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been…
(more)
▼ Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of
computer programs has been important in supporting large classes at universities. The main approaches to the problem are dynamic analysis (testing student programs for expected output) and static analysis (direct analysis of the program code). The former is very sensitive to all kinds of errors in student programs, while the latter has traditionally only been used to assess quality, and not correctness. This research focusses on the application of static analysis, particularly structural similarity, to marking student programs. Existing traditional
measures of similarity are limiting in that they are usually only effective on tree structures. In this regard they do not easily support dependencies in program code. Contemporary
measures of structural similarity, such as similarity flooding, usually rely on an internal normalisation of scores. The effect is that the scores only have relative meaning, and cannot be interpreted in isolation, ie. they are not meaningful for assessment. The SimRank measure is shown to have the same problem, but not because of normalisation. The problem with the SimRank measure arises from the fact that its scores depend on all possible mappings between the children of vertices being compared. The main contribution of this research is a novel graph similarity measure, the Weighted Assignment Similarity measure. It is related to SimRank, but derives propagation scores from only the locally optimal mapping between child vertices. The resulting similarity scores may be regarded as the percentage of mutual coverage between graphs. The measure is proven to converge for all directed acyclic graphs, and an efficient implementation is outlined for this case. Attributes on graph vertices and edges are often used to capture domain specific information which is not structural in nature. It has been suggested that these should influence the similarity propagation, but no clear method for doing this has been reported. The second important contribution of this research is a general method for incorporating these local attribute similarities into the larger similarity propagation method. An example of attributes in program graphs are identifier names. The choice of identifiers in programs is arbitrary as they are purely symbolic. A problem facing any comparison between programs is that they are unlikely to use the same set of identifiers. This problem indicates that a mapping between the identifier sets is required. The third contribution of this research is a method for applying the structural similarity measure in a two step process to find an optimal identifier mapping. This approach is both novel and valuable as it cleverly reuses the similarity measure as an existing resource. In general, programming assignments allow a large variety of solutions. Assessing student programs through structural similarity is only feasible if the diversity in the solution space can…
Advisors/Committee Members: Greyling, Jean Prof, Vogts, Dieter.
Subjects/Keywords: Computer networks – Security measures; Internet – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Naudé, K. A. (2007). Assessing program code through static structural similarity. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/578
Chicago Manual of Style (16th Edition):
Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/578.
MLA Handbook (7th Edition):
Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Web. 02 Mar 2021.
Vancouver:
Naudé KA. Assessing program code through static structural similarity. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/578.
Council of Science Editors:
Naudé KA. Assessing program code through static structural similarity. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/578
2.
Fragkos, Grigorios.
Near real-time threat assessment using intrusion detection system's data.
Degree: PhD, University of Glamorgan, 2012, University of South Wales
URL: http://hdl.handle.net/10265/569
► The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent…
(more)
▼ The concept of Intrusion Detection (ID) and the development of such systems
have been a major concern for scientists since the late sixties. In recent computer
networks, the use of different types of Intrusion Detection Systems (IDS) is
considered essential and in most cases mandatory. Major improvements have been
achieved over the years and a large number of different approaches have been
developed and applied in the way these systems perform Intrusion Detection.
The purpose of the research is to introduce a novel approach that will enable us to
take advantage of the vast amounts of information generated by the large number of
different IDSs, in order to identify suspicious traffic, malicious intentions and
network attacks in an automated manner. In order to achieve this, the research focuses
upon a system capable of identifying malicious activity in near real-time, that is
capable of identifying attacks while they are progressing. The thesis addresses the
near real-time threat assessment by researching into current state of the art solutions.
Based on the literature review, current Intrusion Detection technologies lean towards event correlation systems using different types of detections techniques. Instead of
using linear event signatures or rule sets, the thesis suggests a structured description
of network attacks based on the abstracted form of the attacker’s activity. For that
reason, the design focuses upon the description of network attacks using the
development of footprints. Despite the level of knowledge, capabilities and resources
of the attacker, the system compares occurring network events against predefined
footprints in order to identify potential malicious activity. Furthermore, based on the
implementation of the footprints, the research also focuses upon the design of the
Threat Assessment Engine (TAE) which is capable of performing detection in near
real-time by the use of the above described footprints. The outcome of the research proves that it is possible to have an automated
process performing threat assessment despite the number of different ongoing attacks
taking place simultaneously. The threat assessment process, taking into consideration
the system’s architecture, is capable of acting as the human analyst would do when
investigating such network activity. This automation speeds up the time-consuming
process of manually analysing and comparing data logs deriving from heterogeneous sources, as it performs the task in near real-time. Effectively, by performing the this
task in near real-time, the proposed system is capable of detecting complicated
malicious activity which in other cases, as currently performed, it would be difficult,
maybe impossible or results would be generated too late.
Subjects/Keywords: Computer networks Security measures; 005.8
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Fragkos, G. (2012). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from http://hdl.handle.net/10265/569
Chicago Manual of Style (16th Edition):
Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Doctoral Dissertation, University of South Wales. Accessed March 02, 2021.
http://hdl.handle.net/10265/569.
MLA Handbook (7th Edition):
Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Web. 02 Mar 2021.
Vancouver:
Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2012. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10265/569.
Council of Science Editors:
Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2012. Available from: http://hdl.handle.net/10265/569
3.
Fragkos, Grigorios.
Near real-time threat assessment using intrusion detection system's data.
Degree: PhD, 2011, University of South Wales
URL: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659
► The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent…
(more)
▼ The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent computer networks, the use of different types of Intrusion Detection Systems (IDS) is considered essential and in most cases mandatory. Major improvements have been achieved over the years and a large number of different approaches have been developed and applied in the way these systems perform Intrusion Detection. The purpose of the research is to introduce a novel approach that will enable us to take advantage of the vast amounts of information generated by the large number of different IDSs, in order to identify suspicious traffic, malicious intentions and network attacks in an automated manner. In order to achieve this, the research focuses upon a system capable of identifying malicious activity in near real-time, that is capable of identifying attacks while they are progressing. The thesis addresses the near real-time threat assessment by researching into current state of the art solutions. Based on the literature review, current Intrusion Detection technologies lean towards event correlation systems using different types of detections techniques. Instead of using linear event signatures or rule sets, the thesis suggests a structured description of network attacks based on the abstracted form of the attacker’s activity. For that reason, the design focuses upon the description of network attacks using the development of footprints. Despite the level of knowledge, capabilities and resources of the attacker, the system compares occurring network events against predefined footprints in order to identify potential malicious activity. Furthermore, based on the implementation of the footprints, the research also focuses upon the design of the Threat Assessment Engine (TAE) which is capable of performing detection in near real-time by the use of the above described footprints. The outcome of the research proves that it is possible to have an automated process performing threat assessment despite the number of different ongoing attacks taking place simultaneously. The threat assessment process, taking into consideration the system’s architecture, is capable of acting as the human analyst would do when investigating such network activity. This automation speeds up the time-consuming process of manually analysing and comparing data logs deriving from heterogeneous sources, as it performs the task in near real-time. Effectively, by performing the this task in near real-time, the proposed system is capable of detecting complicated malicious activity which in other cases, as currently performed, it would be difficult, maybe impossible or results would be generated too late.
Subjects/Keywords: 005.8; Computer networks Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Fragkos, G. (2011). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659
Chicago Manual of Style (16th Edition):
Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Doctoral Dissertation, University of South Wales. Accessed March 02, 2021.
https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.
MLA Handbook (7th Edition):
Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Web. 02 Mar 2021.
Vancouver:
Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2011. [cited 2021 Mar 02].
Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.
Council of Science Editors:
Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2011. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659

University of North Carolina – Greensboro
4.
Zou, Xiaocheng.
Ant-based evidence distribution with periodic broadcast in
attacked wireless network.
Degree: 2011, University of North Carolina – Greensboro
URL: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548
► In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so,…
(more)
▼ In order to establish trust among nodes in large
wireless
networks, the trust certicates need to be distributed and
be readily accessible. However, even so, searching for trust
certicates will still become highly cost and delay especially when
wireless network is suering CTS jamming attack. We believe the
individual solution can lead us to solve this combination problems
in the future. Therefore, in this work, we investigate the delay
and cost of searching a distributed certicate and the adverse eects
of fabiricated control packet attacks on channel throughput and
delivery ratio respectively, and propose two techniques that can
improve the eciency of searching for such certicates in the network
and mitigate the CTS jamming attack's eect. Evidence Distribution
based on Periodic Broadcast (EDPB) is the rst solution we presented
to help node to quickly locate trust certicates in a large wireless
sensor network. In this solution, we not only take advantages from
swarm intelligence alogrithm, but also allow nodes that carrying
certicates to periodically announce their existence. Such
announcements, together with a swarm-intelligence pheromone pdate
procedure, will leave traces on the nodes to lead query packets
toward the certicate nodes. We then investigate the salient
features of this schema and evaluate its performance in both static
and mobile
networks. This schema can also be used for other
essential information dissemination in mobile ad hoc
networks. The
second technqiue, address inspection schema (AIS) xes
vulnerabilities exist in distribution coordinating function (DCF)
dened in IEEE 802.11 standard so that each node has the ability to
beat the impact of CTS jamming attack and furthermore, benets
network throughput. We then perform ns-2 simulations to evaluate
the benet of AIS.; Ant-based, CTS JAMMING, IEEE 802.11, Swarm
Intelligence, WSN
Advisors/Committee Members: Jing Deng (advisor).
Subjects/Keywords: Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zou, X. (2011). Ant-based evidence distribution with periodic broadcast in
attacked wireless network. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548
Chicago Manual of Style (16th Edition):
Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in
attacked wireless network.” 2011. Masters Thesis, University of North Carolina – Greensboro. Accessed March 02, 2021.
http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.
MLA Handbook (7th Edition):
Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in
attacked wireless network.” 2011. Web. 02 Mar 2021.
Vancouver:
Zou X. Ant-based evidence distribution with periodic broadcast in
attacked wireless network. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2011. [cited 2021 Mar 02].
Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.
Council of Science Editors:
Zou X. Ant-based evidence distribution with periodic broadcast in
attacked wireless network. [Masters Thesis]. University of North Carolina – Greensboro; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548

Nelson Mandela Metropolitan University
5.
Maharaj, Rahul.
A social networking approach to security awareness in end-user cyber-driven financial transactions.
Degree: 2018, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/48824
► Cyberspace, including the internet and associated technologies have become critical to social users in their day to day lives. Social users have grown to become…
(more)
▼ Cyberspace, including the internet and associated technologies have become critical to social users in their day to day lives. Social users have grown to become reliant on cyberspace and associated cyber services. As such, a culture of users becoming dependent on cyberspace has formed. This cyberculture need to ensure that they can make use of cyberspace and associated cyber services in a safe and secure manner. This is particularly true for those social users involved in cyberdriven financial transactions. Therefore, the aim of this research study is to report on research undertaken, to assist said users by providing them with an alternative educational approach to cyber security, education, awareness and training.
Subjects/Keywords: Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Maharaj, R. (2018). A social networking approach to security awareness in end-user cyber-driven financial transactions. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/48824
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Maharaj, Rahul. “A social networking approach to security awareness in end-user cyber-driven financial transactions.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/48824.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Maharaj, Rahul. “A social networking approach to security awareness in end-user cyber-driven financial transactions.” 2018. Web. 02 Mar 2021.
Vancouver:
Maharaj R. A social networking approach to security awareness in end-user cyber-driven financial transactions. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/48824.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Maharaj R. A social networking approach to security awareness in end-user cyber-driven financial transactions. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/48824
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Nelson Mandela Metropolitan University
6.
Reid, Rayne.
Guidelines for cybersecurity education campaigns.
Degree: 2017, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/14091
► In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does…
(more)
▼ In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process. If these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in these cybersecurity solutions. It is essential that all users be educated to combat any threats. Children are a particularly vulnerable subgroup within society. They are digital natives and make use of ICT, and online services with increasing frequency, but this does not mean they are knowledgeable about or behaving securely in their cyber activities. Children will be exposed to cyberspace throughout their lifetimes. Therefore, cybersecurity and cybersafety should be taught to children as a life-skill. There is a lack of well-known, comprehensive cybersecurity and cybersafety educational campaigns which target school children. Most existing information security and cybersecurity education campaigns limit their scope. Literature reports mainly on education campaigns focused on primary businesses, government agencies and tertiary education institutions. Additionally, most guidance for the design and implementation of security and safety campaigns: are for an organisational context, only target organisational users, and mostly provide high-level design recommendations. This thesis addressed the lack of guidance for designing and implementing cybersecurity and cybersafety educational campaigns suited to school learners as a target audience. The thesis aimed to offer guidance for designing and implementing education campaigns that educate school learners about cybersecurity and cybersafety. This was done through the implementation of an action research process over a five-year period. The action research process involved cybersecurity and cybersafety educational interventions at multiple schools. A total of 18 actionable guidelines were derived from this research to guide the design and implementation of cybersecurity and cybersafety education campaigns which aim to educate school children.
Subjects/Keywords: Computer security; Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Reid, R. (2017). Guidelines for cybersecurity education campaigns. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/14091
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/14091.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Web. 02 Mar 2021.
Vancouver:
Reid R. Guidelines for cybersecurity education campaigns. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/14091.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Reid R. Guidelines for cybersecurity education campaigns. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/14091
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Rhodes University
7.
Mayisela, Simphiwe Hector.
Data-centric security : towards a utopian model for protecting corporate data on mobile devices.
Degree: Faculty of Science, Computer Science, 2014, Rhodes University
URL: http://hdl.handle.net/10962/d1011094
► Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries…
(more)
▼ Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
Subjects/Keywords: Computer security; Computer networks – Security measures; Business enterprises – Computer networks – Security measures; Mobile computing – Security measures; Mobile communication systems – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed March 02, 2021.
http://hdl.handle.net/10962/d1011094.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 02 Mar 2021.
Vancouver:
Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10962/d1011094.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Hong Kong University of Science and Technology
8.
Guo, Ziyang ECE.
Cyber-physical systems security : a control-theoretic approach.
Degree: 2018, Hong Kong University of Science and Technology
URL: http://repository.ust.hk/ir/Record/1783.1-96011
;
https://doi.org/10.14711/thesis-991012637167503412
;
http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html
► This thesis investigates security issues for remote state estimation in the context of cyber-physical systems. Different problems are studied from the perspective of either a…
(more)
▼ This thesis investigates security issues for remote state estimation in the context of cyber-physical systems. Different problems are studied from the perspective of either a malicious attacker or a system designer. In the problem from the attacker's perspective, a sensor monitors a dynamic process and transmits its measurement to a remote estimator through a wireless network where a malicious attacker may intercept and modify the transmitted data. A false-data detector is adopted to monitor system behaviors and check data anomalies. We propose an innovation-based integrity attack and present the feasibility constraint which guarantees the attack stealthiness. Under the proposed attack, the recursion of the remote estimation error covariance is derived. A closed-form expression of the optimal attack strategy that maximizes the remote estimation error covariance is obtained. The problem is then generalized from the following two aspects. On the one hand, we consider an ∈-stealthy innovation-based integrity attack, where the Kullback-Leibler divergence is used as a stealthiness metric. Based on the evolution of remote estimation error covariance, a two-stage optimization problem is formulated to investigate the optimal attack strategy. We first prove that the optimal attack is Gaussian distributed and provide a closed-form expression of the corresponding covariance matrix. Then, the optimal attack is obtained by semi-definite programming. On the other hand, we consider an innovation-based integrity attack under different information sets. It is assumed that the attacker is not only able to compromise the transmitted data but also able to measure the system state itself. The attack strategy thus can be designed based on the intercepted data, the sensing data, or alternatively the combined information. For each attack scenario, we analyze the remote estimation performance and obtain the optimal attack strategy. For scalar systems, we further derive the closed-form expressions of the optimal attacks and compare the attack consequences between different information sets. The secure state estimation problem from the system's perspective is studied in a multi-sensor system. Suppose there are N sensors measuring the same dynamic process and a subset of the sensors can potentially be compromised by an attacker. To locate the compromised sensors and obtain a robust state estimate, we propose a Gaussian-mixture-model-based detection algorithm. It is able to cluster the local state estimate autonomously and provide a belief for each sensor, based on which measurements from different sensors can be fused accordingly. The performance of the proposed detection algorithm is evaluated by the remote estimation performance and the average belief. The applications of the proposed detection algorithm to other attack scenarios are also discussed.
Subjects/Keywords: Computer networks
; Security measures
; Wireless sensor networks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Guo, Z. E. (2018). Cyber-physical systems security : a control-theoretic approach. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Guo, Ziyang ECE. “Cyber-physical systems security : a control-theoretic approach.” 2018. Thesis, Hong Kong University of Science and Technology. Accessed March 02, 2021.
http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Guo, Ziyang ECE. “Cyber-physical systems security : a control-theoretic approach.” 2018. Web. 02 Mar 2021.
Vancouver:
Guo ZE. Cyber-physical systems security : a control-theoretic approach. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2018. [cited 2021 Mar 02].
Available from: http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Guo ZE. Cyber-physical systems security : a control-theoretic approach. [Thesis]. Hong Kong University of Science and Technology; 2018. Available from: http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Nelson Mandela Metropolitan University
9.
Frauenstein, Edwin Donald.
A framework to mitigate phishing threats.
Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/d1021208
► We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld…
(more)
▼ We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
Subjects/Keywords: Computer networks – Security measures; Mobile computing – Security measures; Online social networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Frauenstein, E. D. (2013). A framework to mitigate phishing threats. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1021208
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/d1021208.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Web. 02 Mar 2021.
Vancouver:
Frauenstein ED. A framework to mitigate phishing threats. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/d1021208.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Frauenstein ED. A framework to mitigate phishing threats. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1021208
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
10.
Joshuva, Justin.
Identifying users on social networking using pattern recognition in messages.
Degree: 2017, University of Tennessee – Chattanooga
URL: https://scholar.utc.edu/theses/539
► Online social networks, such as Facebook and Twitter, have become a huge part of many people's lives, often as their main means of communication with…
(more)
▼ Online social
networks, such as Facebook and Twitter, have become a huge part of many people's lives, often as their main means of communication with other people. Because of frequency of use and the apparent
security measures of these sites, users often falsely believe the proffered identity of the person they are talking to. This blind belief sometimes results in
security threats due to the passing of private or confidential information to the wrong user. This may lead to malicious readers getting a user's private information and using it illegally. This work proposes a mathematical model for identifying
security threats using pattern recognition with the aid of an extension of the Naive Bayes method called the Friendship Naive Bayes. Since specific patterns could be observed by examining the communication history between users, the proposed scheme uses these patterns to authenticate that the new message was written by the same person from the history. The scheme then calculates the probability of identifying the person as either the correct or incorrect user.
Advisors/Committee Members: Kandah, Farah, Tanis, Craig, Gunesakara, Sumith, College of Engineering and Computer Science.
Subjects/Keywords: Online social networks – Security measures; Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Joshuva, J. (2017). Identifying users on social networking using pattern recognition in messages. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/539
Chicago Manual of Style (16th Edition):
Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Masters Thesis, University of Tennessee – Chattanooga. Accessed March 02, 2021.
https://scholar.utc.edu/theses/539.
MLA Handbook (7th Edition):
Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Web. 02 Mar 2021.
Vancouver:
Joshuva J. Identifying users on social networking using pattern recognition in messages. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2017. [cited 2021 Mar 02].
Available from: https://scholar.utc.edu/theses/539.
Council of Science Editors:
Joshuva J. Identifying users on social networking using pattern recognition in messages. [Masters Thesis]. University of Tennessee – Chattanooga; 2017. Available from: https://scholar.utc.edu/theses/539

Nelson Mandela Metropolitan University
11.
Webster, Zynn.
An information security governance model for industrial control systems.
Degree: 2018, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/36383
► Industrial Control Systems (ICS) is a term used to describe several types of control systems, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control…
(more)
▼ Industrial Control Systems (ICS) is a term used to describe several types of control systems, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and Programmable Logic Controllers (PLC). These systems consist of a combination of control components (e.g. electrical, mechanical, pneumatic) which act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy). ICS play a fundamental role in critical infrastructures such as electricity grids, oil, gas and manufacturing industries. Initially ICS had little resemblance to typical enterprise IT systems; they were isolated and running proprietary control protocols using specialized hardware and software. However, with initiatives such as Industry 4.0 and Industrial Internet of Things (IIoT), the nature of ICS has changed significantly. There is an ever-increasing use of commercial operating systems and standard protocols like TCP/IP and Ethernet. Consequently, modern ICS are more and more resembling conventional enterprise IT systems, and it is a well-known fact that these IT systems and networks are known to be vulnerable and that they require extensive management to ensure Confidentiality, Integrity, and Availability. Since ICS are now adopting conventional IT characteristics they are also accepting the associated risks. However, owing to the functional area of ICS, the consequences of these threats are much more severe than those of enterprise IT systems. The need to manage security for these systems with highly skilled IT personnel has become essential. Therefore, this research was focussed to identify which unique security controls for ICS and enterprise IT systems can be combined and/or tailored to provide the organization with a single set of comprehensive security controls. By doing an investigation on existing standards and best practices for both enterprise IT and ICS environments, this study has produced a single set of security controls and presented how the security controls can be integrated into an existing information security governance model which organizations can use as a basis for generating a security framework, used not only to secure their enterprise IT systems, but also including the security of their ICS.
Subjects/Keywords: Computer networks – Security measures; Data protection; Computer security; Business enterprises – Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Webster, Z. (2018). An information security governance model for industrial control systems. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/36383
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Webster, Zynn. “An information security governance model for industrial control systems.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/36383.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Webster, Zynn. “An information security governance model for industrial control systems.” 2018. Web. 02 Mar 2021.
Vancouver:
Webster Z. An information security governance model for industrial control systems. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/36383.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Webster Z. An information security governance model for industrial control systems. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/36383
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
12.
Van Buuren, Suzi.
Information security in a distributed banking environment, with specific reference to security protocols.
Degree: 2012, University of Johannesburg
URL: http://hdl.handle.net/10210/6484
► M.Comm.
The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment…
(more)
▼ M.Comm.
The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
Subjects/Keywords: Banks and banking - Security measures; Intranets (Computer networks) - Security measures; Internet - Security measures; Computer networks - Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Van Buuren, S. (2012). Information security in a distributed banking environment, with specific reference to security protocols. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6484
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Thesis, University of Johannesburg. Accessed March 02, 2021.
http://hdl.handle.net/10210/6484.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Web. 02 Mar 2021.
Vancouver:
Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10210/6484.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6484
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Rutgers University
13.
Liu, Xiruo, 1983-.
Integrating security and privacy protection into a mobility-centric internet architecture.
Degree: PhD, Electrical and Computer Engineering, 2016, Rutgers University
URL: https://rucore.libraries.rutgers.edu/rutgers-lib/50038/
► The Internet is a well-noted technological success that has significantly impacted the dissemination of information and brought human society closer together than it ever had…
(more)
▼ The Internet is a well-noted technological success that has significantly impacted the dissemination of information and brought human society closer together than it ever had been. While many of the initial design choices associated with the Internet led to its successful rise to prominence, the Internet was not designed to face many of the challenges that have emerged in the modern era in which people access information while on the move from anywhere, at any time. Notably, one of the primary hurdles challenging the continued success of the Internet is the security of the communications crossing the Internet. In order to address the challenges facing the evolution of the Internet, several clean-slate future Internet architectures have been proposed, each attempting to address certain aspects in which the Internet needs to evolve, and each with varying advantages. Across all of these different architectures, there remains a need to examine and address fundamental aspects related to ensuring the security of these architectures. This thesis examines several of the key security challenges facing several of the emerging future Internet designs, and specifically explores aspects related to securing the MobilityFirst future Internet design. In particular, one of the core contributions of this thesis is a thorough exploration of aspects related to securing new naming services intended to support more dynamic associations between users, their names and their network addresses. This thesis provides a thorough exploration of the protocol-level security challenges facing the administration of new name resolution services that separate names from network addresses, and further examines the possibility of using such a name resolution service as a mechanism to apply access control in the future Internet. A further contribution of this thesis is the exploration of security services for mobile ad hoc networks and the Internet of Things, which represent two important and emerging network modalities that will become part of the future Internet.
Advisors/Committee Members: Trappe, Wade (chair), Raychaudhuri, Dipankar (internal member), Martin, Rich (internal member), Miller, Rob (outside member).
Subjects/Keywords: Computer networks – Security measures; Computer network architectures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Liu, Xiruo, 1. (2016). Integrating security and privacy protection into a mobility-centric internet architecture. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/50038/
Chicago Manual of Style (16th Edition):
Liu, Xiruo, 1983-. “Integrating security and privacy protection into a mobility-centric internet architecture.” 2016. Doctoral Dissertation, Rutgers University. Accessed March 02, 2021.
https://rucore.libraries.rutgers.edu/rutgers-lib/50038/.
MLA Handbook (7th Edition):
Liu, Xiruo, 1983-. “Integrating security and privacy protection into a mobility-centric internet architecture.” 2016. Web. 02 Mar 2021.
Vancouver:
Liu, Xiruo 1. Integrating security and privacy protection into a mobility-centric internet architecture. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2021 Mar 02].
Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/50038/.
Council of Science Editors:
Liu, Xiruo 1. Integrating security and privacy protection into a mobility-centric internet architecture. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/50038/

Nelson Mandela Metropolitan University
14.
Coertze, Jacques Jacobus.
A framework for information security governance in SMMEs.
Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/d1014083
► It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved…
(more)
▼ It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
Subjects/Keywords: Business – Data processing – Security measures; Management information systems – Security measures; Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Coertze, J. J. (2012). A framework for information security governance in SMMEs. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014083
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/d1014083.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Web. 02 Mar 2021.
Vancouver:
Coertze JJ. A framework for information security governance in SMMEs. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/d1014083.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Coertze JJ. A framework for information security governance in SMMEs. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1014083
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
15.
Diakite, Soumaila Dit Moule.
WISP: a wireless information security portal.
Degree: 2010, University of Johannesburg
URL: http://hdl.handle.net/10210/3060
► M.Sc.
Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless…
(more)
▼ M.Sc.
Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless networks at a record pace, making wireless networks the best choice for consumers. This popularity of wireless networks is because of the affordability of wireless networks devices, and the easy installation [11]. In spite of the popularity of the wireless networks, one factor that has prevented them from being even more widespread can be summed up in a single word: security. It comes as no surprise that these two – wireless and security – converge to create one of the most important topics in the IT industry today [11]. Wireless networks by nature bring about new challenges unique to its environment. One example of these new challenges is: “Signal overflow beyond physical walls”, and with these kinds of new challenges unique to wireless networks, we have new security risks. Hence wireless networks lend themselves to a host of attack possibilities and risks. That is because wireless networks provide a convenient network access point for an attacker, potentially beyond the physical security controls of the organization [7]. Therefore it is challenging for managers to introduce wireless networks and properly manage the security of wireless networks, Security problems of wireless networks are the main reason for wireless networks not being rolled out optimally [1]. In this dissertation, we aim to present to both specialist and non–specialists in the IT industry the information needed to protect a wireless network. We will first identify and discuss the different security requirements of wireless networks. After that we shall examine the technology that helps make wireless networks secure, and describe the type of attacks against wireless networks and defense techniques to secure wireless networks. The research will concentrate on wireless LANs (Local Area Networks), and leading wireless LAN protocols and standards. The result of the research will be used to create WISP (A Wireless Information Security Portal). WISP will be a tool to support the management of a secure wireless network, and help assure the confidentiality, integrity, and availability of the information systems in a wireless network environment.
Subjects/Keywords: Wireless communication systems security measures; Wireless LANs security measures; Computer networks security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Diakite, S. D. M. (2010). WISP: a wireless information security portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3060
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Thesis, University of Johannesburg. Accessed March 02, 2021.
http://hdl.handle.net/10210/3060.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Web. 02 Mar 2021.
Vancouver:
Diakite SDM. WISP: a wireless information security portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10210/3060.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Diakite SDM. WISP: a wireless information security portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3060
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
16.
Van der Merwe, Jacobus.
Information security using intelligent software agents.
Degree: PhD, 2012, University of Johannesburg
URL: http://hdl.handle.net/10210/6231
► Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations…
(more)
▼ Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations allow non-employees to connect to their systems and retrieve information - many banks allow customers to retrieve account statements via the Internet. There is a trend towards more open information systems and more distributed processing such as client/server processing. The above are just some of the trends in computer information processing that creates new and complex problems in providing information systems that are both secure and manageable. To add to the complexity of the information security problem, organisations use the Internet to conduct some of their business and use many different applications, each with its own unique access control mechanisms. Central management of information security in a heterogeneous and distributed environments, such as the Internet has become a nightmare. There is a need for an information security model that will allow organisations to make use of the new trends in information processing, but still have confidence that they have adequate security and that the management of their information security systems is fairly easy. In this thesis we propose a model that satisfies the above requirements. We call this model the Intelligent Security Agent Model (ISAM). The ISAM model is based on two technologies: intelligent software agents and distributed objects. The main component of the model is Intelligent Security Agents that act as security brokers for its users in a distributed environment. In chapter 2 of the thesis, we design an Intelligent Security Agent which provides various information security services in open client/server environments. The Intelligent Security Agent Model addresses certain problems/requirements, such as single sign-on, in information security. These problems and possible solutions are described in chapter 4 to chapter 10 of this thesis. An Intelligent Security Agent must be protected from unauthorised modification, theft, etc. Chapter 3 shows how an Intelligent Security Agent is secured by implementing it as a distributed object. We show that the combination of intelligent software agents and distributed objects creates an agent that was not possible before, and solves many information security problems.In short, this thesis documents the results of a study in computer information security. The result of the study is a new information security model in which intelligent software agents and distributed objects are combined to create a security agent which acts on behalf of a user in open environments such as client/server systems and the Internet. The agent provides a set of services to its user and handles all information security related requests on behalf of its user.
Subjects/Keywords: Computer security; Computer networks - Security measures; Internet - Security measures; Intelligent agents (Computer software)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Van der Merwe, J. (2012). Information security using intelligent software agents. (Doctoral Dissertation). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6231
Chicago Manual of Style (16th Edition):
Van der Merwe, Jacobus. “Information security using intelligent software agents.” 2012. Doctoral Dissertation, University of Johannesburg. Accessed March 02, 2021.
http://hdl.handle.net/10210/6231.
MLA Handbook (7th Edition):
Van der Merwe, Jacobus. “Information security using intelligent software agents.” 2012. Web. 02 Mar 2021.
Vancouver:
Van der Merwe J. Information security using intelligent software agents. [Internet] [Doctoral dissertation]. University of Johannesburg; 2012. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10210/6231.
Council of Science Editors:
Van der Merwe J. Information security using intelligent software agents. [Doctoral Dissertation]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6231

University of Johannesburg
17.
Venter, Hein S.
Real-time risk analysis : a modern perspective on network security with a prototype.
Degree: 2012, University of Johannesburg
URL: http://hdl.handle.net/10210/5995
► M.Sc.
The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more…
(more)
▼ M.Sc.
The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more secure network-security process in terms of which possible risks to be incurred by Internet users could be identified and controlled by means of the appropriate countermeasures in real time. On launching the study, however, no such formal risk-analysis model has yet been developed specifically to effect risk analysis in real time. This, then, gave rise to the development of a prototype specifically aimed at the identification of risks that could pose a threat to Internet users' private data — the so-called "Real-time Risk Analysis" (RtRA) prototype. In so doing, the principal aim of the study, namely to implement the RtRA prototype, was realised. Following, an overview of the research method employed to realise the objectives of the study. Firstly, background information on and the preamble to the issues and problems to be addressed were provided, as well as a well-founded motivation for the study. The latter included theoretical studies on current network security and Transmission Control Protocol/Internet Protocol (TCP/IP). Secondly, the study of existing TCP/IP packet-intercepting tools available on the Internet brought deeper insight into how TCP/IP packets are to be intercepted and handled. In the third instance, the most recent development in network security — firewalls — came under discussion. The latter technology represents a "super-developed" TCP/IP packet-intercepting tool that implements the best known security measures. In addition, the entire study was based on firewall technology and the model that was developed related directly to firewalls. Fourthly, a prototype, consisting of three main modules, was implemented in a bid to prove that RtRA is indeed tenable and practicable. In so doing, the second module of the prototype, namely the real-time risk-identification and countermeasure-execution module, was given special emphasis. The modus operandi of the said prototype was then illustrated by means of a case study undertaken in a simulated Internet working environment. The study culminated in a summation of the results of and the conclusions reached on the strength of the research. Further problem areas, which could become the focal points of future research projects, were also touched upon.
Subjects/Keywords: Internet - Security measures.; Computer networks - Security measures.; Risk assessment - Data processing.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Venter, H. S. (2012). Real-time risk analysis : a modern perspective on network security with a prototype. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5995
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Thesis, University of Johannesburg. Accessed March 02, 2021.
http://hdl.handle.net/10210/5995.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Web. 02 Mar 2021.
Vancouver:
Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10210/5995.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5995
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Drexel University
18.
Huang, Tingshan.
Adaptive Sampling and Statistical Inference for Anomaly Detection.
Degree: 2015, Drexel University
URL: http://hdl.handle.net/1860/idea:6647
► Given the rising threat of malware and the increasing inadequacy of signature-based solutions, online performance monitoring has emerged as a critical component of the security…
(more)
▼ Given the rising threat of malware and the increasing inadequacy of signature-based solutions, online performance monitoring has emerged as a critical component of the
security infrastructure of data centers and networked systems. Most of the systems that require monitoring are usually large-scale, highly dynamic and time-evolving. These facts add to the complexity of both monitoring and the underlying techniques for anomaly detection. Furthermore, one cannot ignore the costs associated with monitoring and detection which can interfere with the normal operation of a system and deplete the supply of resources available for the system. Therefore, securing modern systems calls for efficient monitoring strategies and anomaly detection techniques that can deal with massive data with high efficiency and report unusual events effectively. This dissertation contributes new algorithms and implementation strategies toward a significant improvement in the effectiveness and efficiency of two components of
security infrastructure: (1) system monitoring and (2) anomaly detection. For system monitoring purposes, we develop two techniques which reduce the cost associated with information collection: i) a non-sampling technique and ii) a sampling technique. The non-sampling technique is based on compression and employs the best basis algorithm to automatically select the basis for compressing the data according to the structure of the data. The sampling technique improves upon compressive sampling, a recent signal processing technique for acquiring data at low cost. This enhances the technique of compressive sampling by employing it in an adaptive-rate model wherein the sampling rate for compressive sampling is adaptively tuned to the data being sampled. Our simulation results on measurements collected from a data center show that these two data collection techniques achieve small information loss with reduced monitoring cost. The best basis algorithm can select the basis in which the data is most concisely represented, allowing a reduced sample size for monitoring. The adaptive-rate model for compressive sampling allows us to save 70% in sample size, compared with the constant-rate model. For anomaly detection, this dissertation develops three techniques to allow efficient detection of anomalies. In the first technique, we exploit the properties maintained in the samples of compressive sampling and apply state-of-the-art anomaly detection techniques directly to compressed measurements. Simulation results show that the detection rate of abrupt changes using the compressed measurements is greater than 95% when the size of the measurements is only 18%. In our second approach, we characterize performance-related measurements as a stream of covariance matrices, one for each designated window of time, and then propose a new metric to quantify changes in the covariance matrices. The observed changes are then employed to infer anomalies in the system. In our third approach, anomalies in a system are detected using a low-complexity…
Advisors/Committee Members: Kandasamy, Nagarajan, Sethu, Harish.
Subjects/Keywords: Electrical engineering; Cyberinfrastructure – Security measures; Computer networks – Security measures; Data protection
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Huang, T. (2015). Adaptive Sampling and Statistical Inference for Anomaly Detection. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:6647
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Thesis, Drexel University. Accessed March 02, 2021.
http://hdl.handle.net/1860/idea:6647.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Web. 02 Mar 2021.
Vancouver:
Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Internet] [Thesis]. Drexel University; 2015. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/1860/idea:6647.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Thesis]. Drexel University; 2015. Available from: http://hdl.handle.net/1860/idea:6647
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Macquarie University
19.
Sun, Haiyang.
Towards a security management system for composite web services.
Degree: 2013, Macquarie University
URL: http://hdl.handle.net/1959.14/1279090
► "August 2012".
Bibliography: pages 201-213.
A web service can be operated in a distributed environment with a large number of resources with evolving contents. These…
(more)
▼ "August 2012".
Bibliography: pages 201-213.
A web service can be operated in a distributed environment with a large number of resources with evolving contents. These resources can be various types of applications that come from different organizations, e.g., component web services. A web service that composes multiple component services (resources) is called composite web service that can provide comprehensive and value-added function to service consumer. In order to acquire the support from these resources, the composite web service must be able to satisfy authorization policies of these resources. Interacting with service consumers is imperative for the execution of a composite web service. But, a service consumer can access the specific functions of a composite service, only after it can satisfy the authorization policies of the composite web service. Execution policies are used to manage the sequence of operation invocations within a composite web service, i.e., business logic. Therefore, without coordination management on these policies, a composite web service may not be able to perform properly, particularly in a process environment.
Currently, it is still lack of an effective approach to address the issue of security management in composite web service by considering both service consumers and component services, and taking various types of authorization constraints into account to manage and coordinate the service consumer access and component service support. In this thesis, we propose a service oriented conceptual model (SOAC) as an extension of role based access control that can facilitate the administration and management of access for service consumers as well as component services supports in composite web services. Various types of conflict of interest are identified due to the complicated relationships among service consumers and component services. A process model, SOAC-Net, is also developed based on our designed conceptual model SOAC. The SOAC-Net is a Petri-Net based process model that represents an authorization ow, i.e., the sequence of the accesses by service consumers and the sequence of the supports from components services. A set of authorization policies, e.g., authorization synchronization policy and authorization dependency policy, are designed based on SOAC-Net to coordinate the access and the support in a process environment. Verification on improper authorization policy definition is proposed based on SOAC-Net to detect the unreliable execution of composite web service. A service oriented authorization control engine (SOAC engine) is developed as an implementation of the proposed authorization framework of composite web services.
In summary, this research throws new light on the current state of the art in authorization management under the loosely-coupled composite web service environments.
1 online resource (xxiii, 213 pages, bound ) illustrations
Advisors/Committee Members: Macquarie University. Department of Computing.
Subjects/Keywords: Computer networks – Security measures; Web services – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sun, H. (2013). Towards a security management system for composite web services. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1279090
Chicago Manual of Style (16th Edition):
Sun, Haiyang. “Towards a security management system for composite web services.” 2013. Doctoral Dissertation, Macquarie University. Accessed March 02, 2021.
http://hdl.handle.net/1959.14/1279090.
MLA Handbook (7th Edition):
Sun, Haiyang. “Towards a security management system for composite web services.” 2013. Web. 02 Mar 2021.
Vancouver:
Sun H. Towards a security management system for composite web services. [Internet] [Doctoral dissertation]. Macquarie University; 2013. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/1959.14/1279090.
Council of Science Editors:
Sun H. Towards a security management system for composite web services. [Doctoral Dissertation]. Macquarie University; 2013. Available from: http://hdl.handle.net/1959.14/1279090

Ryerson University
20.
Peddi, Rajender D.
Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.
Degree: 2012, Ryerson University
URL: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615
► This thesis proposes two protocols for addressing collaborative blackhole attacks in MANETs, referred to as the Detecting Blackhole Attack-Dynamic Source Routing (DBA- DSR) and…
(more)
▼ This thesis proposes two protocols for addressing collaborative blackhole attacks in MANETs, referred to as the Detecting Blackhole Attack-Dynamic Source Routing (DBA- DSR) and Detecting Collaborative Blackhole Attack (DCBA) algorithms. The DBA-DSR protocol uses fake Route request packets to attract the malicious nodes before the actual routing process. The DCBA protocol uses our so-called suspicious value, which is based on the abnormal difference between the routing messages transmitted through a node, to identify the malicious nodes. In later stage, if the destination node detects significant loss in data packets, the initial detecting mechanism will be triggered again to identify malicious nodes. Simulation results are provided, showing significant improvement over the DSR protocol, as well as the Baited blackhole DSR protocol(chosen as a benchmark scheme), in terms of performance metrics such as packet delivery ratio, network throughput, average-end-to-end delay and routing overhead.
Advisors/Committee Members: Ryerson University (Degree grantor).
Subjects/Keywords: Mobile communication systems; Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Peddi, R. D. (2012). Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1615
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Thesis, Ryerson University. Accessed March 02, 2021.
https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Web. 02 Mar 2021.
Vancouver:
Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Internet] [Thesis]. Ryerson University; 2012. [cited 2021 Mar 02].
Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Thesis]. Ryerson University; 2012. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Nelson Mandela Metropolitan University
21.
Deas, Matthew Burns.
Towards a user centric model for identity and access management within the online environment.
Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/775
► Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks…
(more)
▼ Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering techniques to gain illegal access to user information. Due to this, the need for users to be protected from online threats has increased. Two processes are required to protect the user login information at the time of sign-on. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This treatise looks at the process for identifying and verifying user information, and how the user can verify the system at sign-in. Three models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for system authentication.
Subjects/Keywords: Computers – Access control; Computer networks – Security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/775.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 02 Mar 2021.
Vancouver:
Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/775.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
22.
Nel, Yvette.
'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.
Degree: 2014, University of Johannesburg
URL: http://hdl.handle.net/10210/11576
► M.Com. (Informatics)
The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The…
(more)
▼ M.Com. (Informatics)
The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The greater the dependence of the organization upon information technology, the greater the risk the organization is exposed to in case of an information systems interruption. Computer disasters, such as fires, floods, storms, sabotage and human error, constitute a security threat which could prejudice the survival of an organization. Disaster recovery planning is a realistic and imperative activity for each organization whether large or small. In the light of the potential economic and legal implications o fa disaster, it is no longer acceptable not to be prepared for such an occurrence today.A well designed and tested disaster recovery plan, as part of the total information security strategy of the organization, is therefore not only essential in the terms of the recovery of business functions, but for the SURVIVAL of the organization. In viewpoint above, it can be expected that disaster counterrevolutionary be standard practice for all organizations. However that is not the case. The literature study undertook, as well as exposure in practice, indicate clearly that disaster recovery planning enjoys low priority in most organizations. The majority existentialists are superficial, unstructured and insufficient and will not be successful when real disaster strikes.:The most important single cause for the failure of an organization ~ disaster recovery plan, will be that too much emphasis is being placed on the technical aspects rather than on the management or organizational aspects. The solutions an integrated approach of strategies and the multiple technologies which are available today. These strategies and technologies should be combined to meet the specific needs of the individual organization. The purpose of this dissertation was firstly to identify the most critical problems related to disaster recovery planning and secondly to provide a methodology for the development and implementation of a disaster recovery plan which addresses these problems. This methodology constitutes an enhancement on an existing information security methodology in order to establish a total information security strategy for a large organization with disaster recovery as an essential aspect of this strategy. The final disaster recovery planning methodology as proposed in this dissertation, was developed as a result of an extensive literature study undertook as well as involvement during the development of a disaster recovery system by the company which initiated this study.
Subjects/Keywords: Computer networks - Security measures; Information technology
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nel, Y. (2014). 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/11576
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Nel, Yvette. “'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.” 2014. Thesis, University of Johannesburg. Accessed March 02, 2021.
http://hdl.handle.net/10210/11576.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Nel, Yvette. “'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.” 2014. Web. 02 Mar 2021.
Vancouver:
Nel Y. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10210/11576.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Nel Y. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/11576
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Nelson Mandela Metropolitan University
23.
Westraadt, Lindsay.
A Model for Crime Management in Smart Cities.
Degree: 2019, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/45635
► The main research problem addressed in this study is that South African cities are not effectively integrating and utilising available, and rapidly emerging smart city…
(more)
▼ The main research problem addressed in this study is that South African cities are not effectively integrating and utilising available, and rapidly emerging smart city data sources for planning and management. To this end, it was proposed that a predictive model, that assimilates data from traditionally isolated management silos, could be developed for prediction and simulation at the system-of-systems level. As proof of concept, the study focused on only one aspect of smart cities, namely crime management. Subsequently, the main objective of this study was to develop and evaluate a predictive model for crime management in smart cities that effectively integrated data from traditionally isolated management silos. The Design Science Research process was followed to develop and evaluate a prototype model. The practical contributions of this study was the development of a prototype model for integrated decision-making in smart cities, and the associated guidelines for the implementation of the developed modelling approach within the South African IDP context. Theoretically, this work contributed towards the development of a modelling paradigm for effective integrated decision-making in smart cities. This work also contributed towards developing strategic-level predictive policing tools aimed at proactively meeting community needs, and contributed to the body of knowledge regarding complex systems modelling.
Subjects/Keywords: Smart cities; Computer networks – security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Westraadt, L. (2019). A Model for Crime Management in Smart Cities. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/45635
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Westraadt, Lindsay. “A Model for Crime Management in Smart Cities.” 2019. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/45635.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Westraadt, Lindsay. “A Model for Crime Management in Smart Cities.” 2019. Web. 02 Mar 2021.
Vancouver:
Westraadt L. A Model for Crime Management in Smart Cities. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2019. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/45635.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Westraadt L. A Model for Crime Management in Smart Cities. [Thesis]. Nelson Mandela Metropolitan University; 2019. Available from: http://hdl.handle.net/10948/45635
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Michigan State University
24.
Pongaliur, Kanthakumar Mylsamy.
Security and privacy in resource constrained wireless networks.
Degree: 2012, Michigan State University
URL: http://etd.lib.msu.edu/islandora/object/etd:1489
► Thesis Ph. D. Michigan State University. Computer Science 2012.
Wireless networks use radio waves as a communication medium which allows for faster and cheaper deployment.…
(more)
▼ Thesis Ph. D. Michigan State University. Computer Science 2012.
Wireless networks use radio waves as a communication medium which allows for faster and cheaper deployment. The networks being wireless, are out in the open, which makes them vulnerable to malicious users that can hinder their performance. Of the several types of wireless networks, we focus on security and privacy in wireless sensor networks (WSN) and cognitive radio mobile ad-hoc networks (CR-MANET). The devices in these networks are limited in resources such as energy, low power radio, etc. CR-MANET devices are mobile, requiring them to run on limited amount of energy supplied by batteries, and conserve energy by reducing communication cost using low power radios. In addition, sensor devices have limited storage and a slower CPU. The purpose of a WSN is to sense and report event occurrences, whereas a CR-MANET provides improved spectrum utilization.We studied three kinds of attacks on WSN. The first type of attack is on the source privacy of sensor nodes. This attack happens because an important characteristic of events detected by sensor devices is bound to the location of event occurrence that can be revealed by compromise of detecting sensor device's source privacy. Thus, protecting privacy of event detecting sensor device is of paramount importance for which we present an encryption based solution to protect source privacy under eavesdropping and node compromise attacks. The second type of attack by the malicious entity can be invasive in nature, which could possibly cause damage to the device, or can be passive as in side channel attacks. A comprehensive study of side channel attacks on WSN is presented, along with a process obfuscation technique. The third type of attack is on the propagation of data packet generated by the sensor device. The detected event data is sent to the base station. If a malicious entity is able to prevent such event reporting packets from reaching the base station and segregate the attack zone, it will be able to carry out its malicious activity without getting caught. To cover such scenarios, a proactive dynamic camouflage event generation solution is presented.CR-MANET devices sense for vacant licensed spectrum and improve its utilization in an opportunistic manner. Accurate licensed spectrum occupancy detection by a CR-MANET device is hampered by signal fading, hidden terminal problems, etc. Spectrum occupancy decision can be improved by cooperative spectrum sensing (CSS). However, CSS is made difficult by the presence of malicious users. The malicious users can have two goals: one is to disrupt the network, another is to manipulate the network for its own personal gains. The malicious users can create havoc in a CR-MANET by falsifying spectrum sensing information leading to interference with the primary user. The devices in a CR-MANET are mobile, which gives an opportunity for the malicious entity to hide behind the changing neighborhood. We present three solutions to overcome the spectrum sensing data…
Advisors/Committee Members: Xiao, Li, Mutka, Matt W, Mandrekar, Vidyadhar S, Liu, Alex X.
Subjects/Keywords: Wireless sensor networks; Computer networks – Security measures; Mobile computing – Security measures; Computer science
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Pongaliur, K. M. (2012). Security and privacy in resource constrained wireless networks. (Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:1489
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Pongaliur, Kanthakumar Mylsamy. “Security and privacy in resource constrained wireless networks.” 2012. Thesis, Michigan State University. Accessed March 02, 2021.
http://etd.lib.msu.edu/islandora/object/etd:1489.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Pongaliur, Kanthakumar Mylsamy. “Security and privacy in resource constrained wireless networks.” 2012. Web. 02 Mar 2021.
Vancouver:
Pongaliur KM. Security and privacy in resource constrained wireless networks. [Internet] [Thesis]. Michigan State University; 2012. [cited 2021 Mar 02].
Available from: http://etd.lib.msu.edu/islandora/object/etd:1489.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Pongaliur KM. Security and privacy in resource constrained wireless networks. [Thesis]. Michigan State University; 2012. Available from: http://etd.lib.msu.edu/islandora/object/etd:1489
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Nelson Mandela Metropolitan University
25.
Gcaza, Noluxolo.
A national strategy towards cultivating a cybersecurity culture in South Africa.
Degree: 2017, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/13735
► In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to…
(more)
▼ In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed to a variety of risks. Cyberspace is beset by criminal activities such as cybercrime, fraud, identity theft to name but a few. Nonetheless, the negative impact of these cyber threats does not outweigh the advantages of cyberspace. In light of such threats, there is a call for all entities that reap the benefits of online services to institute cybersecurity. As such, cybersecurity is a necessity for individuals, organisations and nations alike. In practice, cybersecurity focuses on preventing and mitigating certain security risks that might compromise the security of relevant assets. For a long time, technology-centred measures have been deemed the most significant solution for mitigating such risks. However, after a legacy of unsuccessful technological efforts, it became clear that such solutions in isolation are insufficient to mitigate all cyber-related risks. This is mainly due to the role that humans play in the security process, that is, the human factor. In isolation, technology-centred measures tend to fail to counter the human factor because of the perception among many users that security measures are an obstacle and consequently a waste of time. This user perception can be credited to the perceived difficulty of the security measure, as well as apparent mistrust and misinterpretation of the measure. Hence, cybersecurity necessitates the development of a solution that encourages acceptable user behaviour in the reality of cyberspace. The cultivation of a cybersecurity culture is thus regarded as the best approach for addressing the human factors that weaken the cybersecurity chain. While the role of culture in pursuing cybersecurity is well appreciated, research focusing on defining and measuring cybersecurity culture is still in its infancy. Furthermore, studies have shown that there are no widely accepted key concepts that delimit a cybersecurity culture. However, the notion that such a culture is not well-delineated has not prevented national governments from pursuing a culture in which all citizens behave in a way that promotes cybersecurity. As a result, many countries now offer national cybersecurity campaigns to foster a culture of cybersecurity at a national level. South Africa is among the nations that have identified cultivating a culture of cybersecurity as a strategic priority. However, there is an apparent lack of a practical plan to cultivate such a cybersecurity culture in South Africa. Thus, this study…
Subjects/Keywords: Computer networks – Security measures; Cyberspace – Security measures; Computer security – South Africa; Subculture – South Africa
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Gcaza, N. (2017). A national strategy towards cultivating a cybersecurity culture in South Africa. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/13735
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Gcaza, Noluxolo. “A national strategy towards cultivating a cybersecurity culture in South Africa.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/13735.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Gcaza, Noluxolo. “A national strategy towards cultivating a cybersecurity culture in South Africa.” 2017. Web. 02 Mar 2021.
Vancouver:
Gcaza N. A national strategy towards cultivating a cybersecurity culture in South Africa. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/13735.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Gcaza N. A national strategy towards cultivating a cybersecurity culture in South Africa. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/13735
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
26.
Pieterse, Theron Anton.
The computer incident response framework (CIRF).
Degree: 2014, University of Johannesburg
URL: http://hdl.handle.net/10210/12368
► M.Com. (Informatics)
A company’s valuable information assets face many risks from internal and external sources. When these risks are exploited and reports on information assets…
(more)
▼ M.Com. (Informatics)
A company’s valuable information assets face many risks from internal and external sources. When these risks are exploited and reports on information assets are made public, it is usually easy to determine which companies had a contingency plan to deal with the various aspects of these “computer incidents”. This study incorporates important factors of computer incidents into a framework which will assists the company in effectively dealing and managing computer incidents when they occur.
Subjects/Keywords: Information technology - Security measures; Computer networks - Security measures; Risk management; Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Pieterse, T. A. (2014). The computer incident response framework (CIRF). (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12368
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Pieterse, Theron Anton. “The computer incident response framework (CIRF).” 2014. Thesis, University of Johannesburg. Accessed March 02, 2021.
http://hdl.handle.net/10210/12368.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Pieterse, Theron Anton. “The computer incident response framework (CIRF).” 2014. Web. 02 Mar 2021.
Vancouver:
Pieterse TA. The computer incident response framework (CIRF). [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10210/12368.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Pieterse TA. The computer incident response framework (CIRF). [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12368
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Rhodes University
27.
Bernardo, Louis F.
Targeted attack detection by means of free and open source solutions.
Degree: Faculty of Science, Computer Science, 2019, Rhodes University
URL: http://hdl.handle.net/10962/92269
► Compliance requirements are part of everyday business requirements for various areas, such as retail and medical services. As part of compliance it may be required…
(more)
▼ Compliance requirements are part of everyday business requirements for various areas, such as retail and medical services. As part of compliance it may be required to have infrastructure in place to monitor the activities in the environment to ensure that the relevant data and environment is sufficiently protected. At the core of such monitoring solutions one would find some type of data repository, or database, to store and ultimately correlate the captured events. Such solutions are commonly called Security Information and Event Management, or SIEM for short. Larger companies have been known to use commercial solutions such as IBM's Qradar, Logrythm, or Splunk. However, these come at significant cost and arent suitable for smaller businesses with limited budgets. These solutions require manual configuration of event correlation for detection of activities that place the environment in danger. This usually requires vendor implementation assistance that also would come at a cost. Alternatively, there are open source solutions that provide the required functionality. This research will demonstrate building an open source solution, with minimal to no cost for hardware or software, while still maintaining the capability of detecting targeted attacks. The solution presented in this research includes Wazuh, which is a combination of OSSEC and the ELK stack, integrated with an Network Intrusion Detection System (NIDS). The success of the integration, is determined by measuring postive attack detection based on each different configuration options. To perform the testing, a deliberately vulnerable platform named Metasploitable will be used as a victim host. The victim host vulnerabilities were created specifically to serve as target for Metasploit. The attacks were generated by utilising Metasploit Framework on a prebuilt Kali Linux host.
Subjects/Keywords: Computer networks – Security measures; Information technology – Security measures; Computer security – Management; Data protection
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Bernardo, L. F. (2019). Targeted attack detection by means of free and open source solutions. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/92269
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Bernardo, Louis F. “Targeted attack detection by means of free and open source solutions.” 2019. Thesis, Rhodes University. Accessed March 02, 2021.
http://hdl.handle.net/10962/92269.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Bernardo, Louis F. “Targeted attack detection by means of free and open source solutions.” 2019. Web. 02 Mar 2021.
Vancouver:
Bernardo LF. Targeted attack detection by means of free and open source solutions. [Internet] [Thesis]. Rhodes University; 2019. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10962/92269.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Bernardo LF. Targeted attack detection by means of free and open source solutions. [Thesis]. Rhodes University; 2019. Available from: http://hdl.handle.net/10962/92269
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Nelson Mandela Metropolitan University
28.
Sandi, Siyabulela.
Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa.
Degree: 2020, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/47128
► Enterprises of all kinds, regardless of the sector, are directly or indirectly dependent on Information Technology (IT) to carry out their daily activities. With this…
(more)
▼ Enterprises of all kinds, regardless of the sector, are directly or indirectly dependent on Information Technology (IT) to carry out their daily activities. With this in mind, and correlated with the problem statement that it is “the lack of IT governance principles that lead to exposing enterprises to IT-related threats, vulnerabilities, and risks”, the objective of this study was to establish an Information Technology Risk Management Framework for enterprises within the Food manufacturing industry in South Africa that will ensure that IT-related threats, vulnerabilities, and risks are properly managed. In order to accomplish this, the research followed a process called design science research. The design science research paradigm was used to create a design artificial artefact in the form of a framework. The Nelson Mandela University – Design Science Framework Methodology (NMU-DSFM) was adopted since the objective of the study was to develop a framework. The study has revealed that enterprises within the sector are indeed lagging behind in terms of IT governance principles, hence an artefact called the IT Risk Management Framework for Enterprises within Food Manufacturing Industries in South Africa was developed.
Subjects/Keywords: Business enterprises – Computer networks – Security measures; Information technology – Security measures; Computer security; Risk management
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sandi, S. (2020). Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/47128
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Sandi, Siyabulela. “Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa.” 2020. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021.
http://hdl.handle.net/10948/47128.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Sandi, Siyabulela. “Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa.” 2020. Web. 02 Mar 2021.
Vancouver:
Sandi S. Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2020. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10948/47128.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Sandi S. Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa. [Thesis]. Nelson Mandela Metropolitan University; 2020. Available from: http://hdl.handle.net/10948/47128
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Michigan State University
29.
Khakpour, Amir Reza.
Network reachability : quantification, verification, troubleshooting, and optimization.
Degree: 2012, Michigan State University
URL: http://etd.lib.msu.edu/islandora/object/etd:88
► Thesis Ph. D. Michigan State University, Computer Science and Engineering 2012.
Quantifying, verifying, troubleshooting, and optimizing the network reachability is essential for network management and…
(more)
▼ Thesis Ph. D. Michigan State University, Computer Science and Engineering 2012.
Quantifying, verifying, troubleshooting, and optimizing the network reachability is essential for network management and network security monitoring as well as various aspects of network auditing, maintenance, and design. Although attempts to model network reachability have been made, feasible solutions for computing, maintaining and optimally designing network reachability have remained unknown. Network reachability control is very critical because, on one hand, reachability errors can cause network security breaches or service outages, leading to millions of dollars of revenue loss for an enterprise network. On the other hand, network operators suffer from lack of tools that thoroughly examine network access control configurations and audit them to avoid such errors. Besides, finding reachability errors is by no means easy. The access control rules, by which network reachability is restricted, are often very complex and manually troubleshooting them is extremely difficult. Hence, having a tool that finds the reachability errors and fix them automatically can be very useful. Furthermore, flawed network reachability design and deployment can degrade the network performance significantly. Thus, it is crucial to have a tool that designs the network configurations such that they have the least performance impact on the enterprise network.In this dissertation, we first present a network reachability model that considers connectionless and connection-oriented transport protocols, stateless and stateful routers/firewalls, static and dynamic NAT, PAT, IP tunneling, etc. We then propose a suite of algorithms for quantifying reachability based on network configurations (mainly access control lists (ACLs)) as well as solutions for querying network reachability. We further extend our algorithms and data structures for detecting reachability errors, pinpointing faulty access control lists, and fixing them automatically and efficiently. Finally, we propose algorithms to place rules on network devices optimally so that they satisfy the networks central access policies. To this end, we define correctness and performance criteria for rule placement and in turn propose cost-based algorithms with adjustable parameters (for the network operators) to place rules such that the correctness and performance criteria are satisfied.We implemented the algorithms in our network reachability tool called Quarnet and conducted experiments on a university network. Experimental results show that the offline computation of reachability matrices takes a few hours and the online processing of a reachability query takes 75 milliseconds on average. We also examine our reachability error detection and correction algorithms on a few real-life networks to examine their performance and ensure that Quarnet is efficient enough to be practically useful. The results indicate that we can find reachability errors in order of minutes and fix them in order of seconds depending on the…
Advisors/Committee Members: Liu, Alex X, Xiao, Li, Radha, Heydar, Liu, Alex, Esfahanian, Abdol H.
Subjects/Keywords: Computer networks; Computer networks – Access control; Computer networks – Management; Computer networks – Security measures; Computer science
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Khakpour, A. R. (2012). Network reachability : quantification, verification, troubleshooting, and optimization. (Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:88
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Khakpour, Amir Reza. “Network reachability : quantification, verification, troubleshooting, and optimization.” 2012. Thesis, Michigan State University. Accessed March 02, 2021.
http://etd.lib.msu.edu/islandora/object/etd:88.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Khakpour, Amir Reza. “Network reachability : quantification, verification, troubleshooting, and optimization.” 2012. Web. 02 Mar 2021.
Vancouver:
Khakpour AR. Network reachability : quantification, verification, troubleshooting, and optimization. [Internet] [Thesis]. Michigan State University; 2012. [cited 2021 Mar 02].
Available from: http://etd.lib.msu.edu/islandora/object/etd:88.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Khakpour AR. Network reachability : quantification, verification, troubleshooting, and optimization. [Thesis]. Michigan State University; 2012. Available from: http://etd.lib.msu.edu/islandora/object/etd:88
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Ryerson University
30.
Razavi, Sanaz Hafezian.
Evaluating security measures of a layered system.
Degree: 2009, Ryerson University
URL: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196
► Most distributed systems that we use in our daily lives have layered architecture since such architectures allow separation of processing between multiple processes in different…
(more)
▼ Most distributed systems that we use in our daily lives have layered architecture since such architectures allow separation of processing between multiple processes in different layers thereby reducing the complexity of the system. Unauthorized control over such systems can have potentially serious consequences ranging from huge monetary loss to even loss of human life. Hence considerable research attention is being given towards building tools and techniques for quantitative modeling and evaluation of
security properties. This thesis proposes a high-level stochastic model to estimate
security of a layered system. It discusses evaluation of availability and integrity as two major
security properties of a three-layered architecture consisting of Client, Web-server and Database. Using Mobius software, this study models the change in vulnerability of a layer owing to an intrusion in another layer. Furthermore, it analyzes the impact on the
security of the upper layers due to an intruded lower layer. While maintaining a system availability of 97.73%, this study indicates that increasing the system host attack rate in the Database layer from 10 to 20 will reduce system availability to 97.55%. Similar modification made to a Web-server layer will contribute to 97.04% availability. This set of results imply that increasing attack rate in Web Server layer has a more severe impact on system availability, while the same modification in Database layer will less severely influence system availability. Similar results have been gathered when measuring integrity of the system under identical set of modification. At system integrity of 96.88%, increasing host attack rate in Database layer has resulted in achieving integrity of 96.68%, similar experiment for Web server layer resulted in system integrity of 96.57%.
Advisors/Committee Members: Das, Olivia (Thesis advisor), Ryerson University (Degree grantor).
Subjects/Keywords: Computer networks – Security measures; Computer architecture; Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Razavi, S. H. (2009). Evaluating security measures of a layered system. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1196
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Razavi, Sanaz Hafezian. “Evaluating security measures of a layered system.” 2009. Thesis, Ryerson University. Accessed March 02, 2021.
https://digital.library.ryerson.ca/islandora/object/RULA%3A1196.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Razavi, Sanaz Hafezian. “Evaluating security measures of a layered system.” 2009. Web. 02 Mar 2021.
Vancouver:
Razavi SH. Evaluating security measures of a layered system. [Internet] [Thesis]. Ryerson University; 2009. [cited 2021 Mar 02].
Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Razavi SH. Evaluating security measures of a layered system. [Thesis]. Ryerson University; 2009. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
◁ [1] [2] [3] [4] [5] … [4411] ▶
.