Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Business

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz Jul 2018

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …


Security Management For Mobile Devices Of Higher Education, Kala Battle May 2018

Security Management For Mobile Devices Of Higher Education, Kala Battle

Mathematics and Computer Science Capstones

Mobile learning has made a major impact on the security of Learning Management Systems (LMS) in higher education. The advancements in mobile technology have made mobile learning one of the top trending topics regarding education and technology. Students appreciate the convenience and flexibility that mobile learning offers. However, there is an added concern with the security in mobile learning. Instructors and students have little say in what software will be used in mobile learning. This paper will address the issues surrounding security management in LMS platforms, the basics of the Family Educational Rights and Privacy Act (FERPA), and the best …


Custom Windows Patching Methodology - Comparative Analysis, Brent Michael Henderson Jan 2018

Custom Windows Patching Methodology - Comparative Analysis, Brent Michael Henderson

Electronic Theses and Dissertations

Windows Server Update Services has been a common mainstay among organizations with a heavy footprint of Windows operating systems since it was originally released as Software Update Services in 2002. While the product has grown in scope, the primary allure remains the same: WSUS offers organizations greater control over the patches that are released to their environment and saves bandwidth by allowing a centralized device to download and offer patches to internal clients rather than having each of those clients download the content they require from the Internet. Unfortunately, the product has a structural limitation in that it lacks the …