Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer networks Security measures (6)
- Data protection (4)
- Computer security (3)
- Cryptography (3)
- Data encryption (Computer science) (3)
-
- Client/server computing (2)
- Computer networks -- Security measures (2)
- Computer networks Access control (2)
- Consumer protection (2)
- Cybersecurity (2)
- Cyberterrorism Prevention (2)
- Data protection Security measures (2)
- Information networks Security measures (2)
- Information resources management (2)
- Information technology Management (2)
- Information technology Security measures (2)
- Information technology Security measures. (2)
- Java (Computer program language) (2)
- Privacy (2)
- Security systems. (2)
- Accident (1)
- Advanced Encryption Standard (1)
- Anomaly detection (Computer security) (1)
- Application software -- Development (1)
- Application software Development (1)
- Arduino Uno Temperature Sensor Project (1)
- Arrowhead Credit Union (San Bernardino California) (1)
- Blockchain (1)
- Business Data processing (1)
- Business Data processing Security measures (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 27 of 27
Full-Text Articles in Physical Sciences and Mathematics
Cyber Frameworks Small Business Application, Sergio Gonzales
Cyber Frameworks Small Business Application, Sergio Gonzales
Electronic Theses, Projects, and Dissertations
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a small business environment. Small businesses suffer significantly from malware attacks like ransomware. This analysis looks at the Cyber Kill Chain framework and the MITRE ATT&CK framework by looking at how each compare when applied to a simple small network and a malware attack. Each framework broke down the cyber-attack differently and by looking at how the frameworks performed within the simplified network provided insights to when small businesses should focus on malware risk reduction. Each framework, despite having different methods of analysis, arrived …
College Of Education Filemaker Extraction And End-User Database Development, Andrew Tran
College Of Education Filemaker Extraction And End-User Database Development, Andrew Tran
Electronic Theses, Projects, and Dissertations
The College of Education (CoE) at the California State University San Bernardino (CSUSB) developed a system to keep track of both state and national accreditation requirements using FileMaker 5, a database system. This accreditation data is crucial for reporting and record-keeping for the CSU Chancellor’s Office as well as the State of California. However, the database system was developed several decades ago, and software support has long since been dropped, causing the CoE’s legacy accreditation data to be at risk of being lost should the software or hardware suffer permanent failure. The purpose of this project was to perform extraction …
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Beginning The Information Security Journey For Small And Medium Enterprises Through Business Continuity Planning And Infrastructure Automation, Aaron Chamberlain
Beginning The Information Security Journey For Small And Medium Enterprises Through Business Continuity Planning And Infrastructure Automation, Aaron Chamberlain
Electronic Theses, Projects, and Dissertations
Technology has become an essential component of enterprises, driving productivity, innovation, and defining entire processes and product categories. However, these advances come with additional risk; the devices that drive an enterprise can fail at any time or be attacked by malicious actors. Larger enterprises have learned to deal with these risks, but small and medium-sized enterprises (SMEs) have been largely left behind. This project sought to investigate the cybersecurity-related problems SMEs experience and what SMEs can do to solve them. In addition, the project examines the types of information security incidents that occur within SMEs and their financial preparedness for …
Cybersecurity: Creating A Cybersecurity Culture, Steven Edward Ogden
Cybersecurity: Creating A Cybersecurity Culture, Steven Edward Ogden
Electronic Theses, Projects, and Dissertations
Human error has been identified as one of the highest contributing factors to successful cyber-attacks and security incidents that result in data leaks and theft of sensitive information. Human error has been caused by employees not behaving securely when interacting with information systems. This culminating experience project investigated how a cybersecurity culture can be developed to address the human error problem. The research was based on several key questions that focus on influencing factors of human behavior and best practices that have been used to develop a cybersecurity culture so that employees engage in secure behaviors. Social Cognitive Theory was …
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Electronic Theses, Projects, and Dissertations
This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Electronic Theses, Projects, and Dissertations
Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Journal of International Technology and Information Management
The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …
Modern Cryptography, Samuel Lopez
Modern Cryptography, Samuel Lopez
Electronic Theses, Projects, and Dissertations
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers.
An extremely important …
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Electronic Theses, Projects, and Dissertations
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories …
A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio
A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio
Electronic Theses, Projects, and Dissertations
In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.
The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Theses Digitization Project
The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
Theses Digitization Project
The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.
Quantum Cryptography, Razvan Augustin Dinu
Quantum Cryptography, Razvan Augustin Dinu
Theses Digitization Project
This study builds a case for using a quantum computer for solving cryptographic problems. It looks at the quantum turing machine concept, explores why use quantum computers and presents Deutsch's problem which allows one to select from amongst the parallel paths a quantum computer calculates.
Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman
Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman
Theses Digitization Project
The purpose of this project is to present the findings of the work that has been completed on exploring the possibilities of speedup gained when using General Purpose Graphical Processing Units for the Blowfish encryption algorithm with the use of the CUDA (Computer Unified Device Architecture) programming language and architecture.
Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li
Theses Digitization Project
This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.
Linear Analysis Of Binary Data As An Aid To Anomaly Detection, Marc Leonard Santoro
Linear Analysis Of Binary Data As An Aid To Anomaly Detection, Marc Leonard Santoro
Theses Digitization Project
This research focused on spreading packed load in increase throughput, rather than the analysis of the packets themselves. Using singular value decomposition to examine the binary structure of the individual packets, it is possible to perform frequency analysis to identify and classify data, thereby potentially allowing for a new type of paradigm for malicious packet/data identification.
Identity Theft: A Problem Of Complex Systems Or Moral Panic?, Matthew Timothy Tracy
Identity Theft: A Problem Of Complex Systems Or Moral Panic?, Matthew Timothy Tracy
Theses Digitization Project
The purpose of this project showed that identity theft can take on many forms including the theft of bank account numbers, photo ID's, drivers licenses, social security numbers, or credit card numbers. This problem deserves more attention and research than it is currently receiving. Some people view identity theft as an unstoppable crime.
Metrics Framework For Computer Security Incident Response: A Practical Guide For The Federal Government, Vincent Nithi Sritapan
Metrics Framework For Computer Security Incident Response: A Practical Guide For The Federal Government, Vincent Nithi Sritapan
Theses Digitization Project
The purpose of this project is to provide middle management with a framework for measuring results of incident reporting in a CSIR (Computer Security Incident Response) program.
The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen
The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen
Theses Digitization Project
The main purpose of this study is to develop an enterprise security framework that is based on a comprehensive following the Zachman EA architecture. The enterprise architecture (EA) is a long-term view or blueprint for an organization. It is a very important blueprint for balancing business and IT technology and for adding value to an organization. Security is also an essential dimension for enterprises nowadays. This paper will incorporate the security dimension with the Zachman EA framework, which intends to serve as an enterprise security framework in assisting an organization to successfully and effectively implement security.
Minica: A Web-Based Certificate Authority, James Patrick Macdonell
Minica: A Web-Based Certificate Authority, James Patrick Macdonell
Theses Digitization Project
The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to public-key encryption technologies. The audience for whom the software project is intended includes, technical staff requiring certificates for use in SSL applications (i.e. a secure web-site) at California State University, San Bernardino.
Webisms: (Web-Based Information Security Management System): A Prevention Information Security Tool, Nam Kim
Webisms: (Web-Based Information Security Management System): A Prevention Information Security Tool, Nam Kim
Theses Digitization Project
The impetus for this project came from five years of experience working as a system and network administrator in the California State University, San Bernardino's (CSUSB's) College of Natural Sciences. The college and campus in general are under continual cyber attack, usually by direct-penetration methods and all kinds of viruses, worms, and spywares. This project developed WebISMS as a prevention approach in information security. WebISMS is now deployed in the CSUSB Institute of Applied Supercomputing lab, where it is working efficiently as an information security assessment / audit tool.
Mathematical Security Models For Multi-Agent Distributed Systems, Chunyan Ma
Mathematical Security Models For Multi-Agent Distributed Systems, Chunyan Ma
Theses Digitization Project
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb
A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb
Theses Digitization Project
The purpose of this project is to develop a generic Java Application Programming Interface (API) that would be used to provide security and user privacy to functions such as data transfer, key management, digital signature, etc.
Information Security Program Development, William Ward Wells
Information Security Program Development, William Ward Wells
Theses Digitization Project
This project reviews Arrowhead Credit Union's Information Security Program structure and contents.
The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions, Galen Asher Thomas Stocking
The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions, Galen Asher Thomas Stocking
Theses Digitization Project
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.
A Secure Lightweight Currency Service Provider, Chih-Wen Hsiao, David Turner, Keith Ross
A Secure Lightweight Currency Service Provider, Chih-Wen Hsiao, David Turner, Keith Ross
Theses Digitization Project
The main purpose of this project is to build a bank system that offers a friendly and simple interface to let users easily manage their lightweight currencies. The Lightweight Currency Protocol (LCP) was originally proposed to solve the problem of fairness in resource cooperatives. However, there are other possible applications of the protocol, including the control of spam and as a general purpose medium of exchange for low value transactions. This project investigates the implementation issues of the LCP, and also investigates LCP bank services to provide human interface to currency operations.