Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Physical Sciences and Mathematics

Cyber Frameworks Small Business Application, Sergio Gonzales May 2022

Cyber Frameworks Small Business Application, Sergio Gonzales

Electronic Theses, Projects, and Dissertations

This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a small business environment. Small businesses suffer significantly from malware attacks like ransomware. This analysis looks at the Cyber Kill Chain framework and the MITRE ATT&CK framework by looking at how each compare when applied to a simple small network and a malware attack. Each framework broke down the cyber-attack differently and by looking at how the frameworks performed within the simplified network provided insights to when small businesses should focus on malware risk reduction. Each framework, despite having different methods of analysis, arrived …


College Of Education Filemaker Extraction And End-User Database Development, Andrew Tran May 2022

College Of Education Filemaker Extraction And End-User Database Development, Andrew Tran

Electronic Theses, Projects, and Dissertations

The College of Education (CoE) at the California State University San Bernardino (CSUSB) developed a system to keep track of both state and national accreditation requirements using FileMaker 5, a database system. This accreditation data is crucial for reporting and record-keeping for the CSU Chancellor’s Office as well as the State of California. However, the database system was developed several decades ago, and software support has long since been dropped, causing the CoE’s legacy accreditation data to be at risk of being lost should the software or hardware suffer permanent failure. The purpose of this project was to perform extraction …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Beginning The Information Security Journey For Small And Medium Enterprises Through Business Continuity Planning And Infrastructure Automation, Aaron Chamberlain Dec 2021

Beginning The Information Security Journey For Small And Medium Enterprises Through Business Continuity Planning And Infrastructure Automation, Aaron Chamberlain

Electronic Theses, Projects, and Dissertations

Technology has become an essential component of enterprises, driving productivity, innovation, and defining entire processes and product categories. However, these advances come with additional risk; the devices that drive an enterprise can fail at any time or be attacked by malicious actors. Larger enterprises have learned to deal with these risks, but small and medium-sized enterprises (SMEs) have been largely left behind. This project sought to investigate the cybersecurity-related problems SMEs experience and what SMEs can do to solve them. In addition, the project examines the types of information security incidents that occur within SMEs and their financial preparedness for …


Cybersecurity: Creating A Cybersecurity Culture, Steven Edward Ogden Aug 2021

Cybersecurity: Creating A Cybersecurity Culture, Steven Edward Ogden

Electronic Theses, Projects, and Dissertations

Human error has been identified as one of the highest contributing factors to successful cyber-attacks and security incidents that result in data leaks and theft of sensitive information. Human error has been caused by employees not behaving securely when interacting with information systems. This culminating experience project investigated how a cybersecurity culture can be developed to address the human error problem. The research was based on several key questions that focus on influencing factors of human behavior and best practices that have been used to develop a cybersecurity culture so that employees engage in secure behaviors. Social Cognitive Theory was …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar Jul 2020

Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar

Electronic Theses, Projects, and Dissertations

Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …


Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo Jan 2020

Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo

Journal of International Technology and Information Management

The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …


Modern Cryptography, Samuel Lopez Jun 2018

Modern Cryptography, Samuel Lopez

Electronic Theses, Projects, and Dissertations

We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers.

An extremely important …


Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish Jun 2016

Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish

Electronic Theses, Projects, and Dissertations

Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories …


A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio Mar 2015

A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio

Electronic Theses, Projects, and Dissertations

In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.

The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …


Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough Jan 2013

Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough

Theses Digitization Project

The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.


The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In Jan 2013

The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In

Theses Digitization Project

The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.


Quantum Cryptography, Razvan Augustin Dinu Jan 2013

Quantum Cryptography, Razvan Augustin Dinu

Theses Digitization Project

This study builds a case for using a quantum computer for solving cryptographic problems. It looks at the quantum turing machine concept, explores why use quantum computers and presents Deutsch's problem which allows one to select from amongst the parallel paths a quantum computer calculates.


Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman Jan 2013

Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman

Theses Digitization Project

The purpose of this project is to present the findings of the work that has been completed on exploring the possibilities of speedup gained when using General Purpose Graphical Processing Units for the Blowfish encryption algorithm with the use of the CUDA (Computer Unified Device Architecture) programming language and architecture.


Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li Jan 2012

Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li

Theses Digitization Project

This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.


Linear Analysis Of Binary Data As An Aid To Anomaly Detection, Marc Leonard Santoro Jan 2012

Linear Analysis Of Binary Data As An Aid To Anomaly Detection, Marc Leonard Santoro

Theses Digitization Project

This research focused on spreading packed load in increase throughput, rather than the analysis of the packets themselves. Using singular value decomposition to examine the binary structure of the individual packets, it is possible to perform frequency analysis to identify and classify data, thereby potentially allowing for a new type of paradigm for malicious packet/data identification.


Identity Theft: A Problem Of Complex Systems Or Moral Panic?, Matthew Timothy Tracy Jan 2012

Identity Theft: A Problem Of Complex Systems Or Moral Panic?, Matthew Timothy Tracy

Theses Digitization Project

The purpose of this project showed that identity theft can take on many forms including the theft of bank account numbers, photo ID's, drivers licenses, social security numbers, or credit card numbers. This problem deserves more attention and research than it is currently receiving. Some people view identity theft as an unstoppable crime.


Metrics Framework For Computer Security Incident Response: A Practical Guide For The Federal Government, Vincent Nithi Sritapan Jan 2011

Metrics Framework For Computer Security Incident Response: A Practical Guide For The Federal Government, Vincent Nithi Sritapan

Theses Digitization Project

The purpose of this project is to provide middle management with a framework for measuring results of incident reporting in a CSIR (Computer Security Incident Response) program.


The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen Jan 2008

The Development Of A Framework For Enterprise Security Architecture And Its Application In Organizations, Yi-Ting Shen

Theses Digitization Project

The main purpose of this study is to develop an enterprise security framework that is based on a comprehensive following the Zachman EA architecture. The enterprise architecture (EA) is a long-term view or blueprint for an organization. It is a very important blueprint for balancing business and IT technology and for adding value to an organization. Security is also an essential dimension for enterprises nowadays. This paper will incorporate the security dimension with the Zachman EA framework, which intends to serve as an enterprise security framework in assisting an organization to successfully and effectively implement security.


Minica: A Web-Based Certificate Authority, James Patrick Macdonell Jan 2007

Minica: A Web-Based Certificate Authority, James Patrick Macdonell

Theses Digitization Project

The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to public-key encryption technologies. The audience for whom the software project is intended includes, technical staff requiring certificates for use in SSL applications (i.e. a secure web-site) at California State University, San Bernardino.


Webisms: (Web-Based Information Security Management System): A Prevention Information Security Tool, Nam Kim Jan 2006

Webisms: (Web-Based Information Security Management System): A Prevention Information Security Tool, Nam Kim

Theses Digitization Project

The impetus for this project came from five years of experience working as a system and network administrator in the California State University, San Bernardino's (CSUSB's) College of Natural Sciences. The college and campus in general are under continual cyber attack, usually by direct-penetration methods and all kinds of viruses, worms, and spywares. This project developed WebISMS as a prevention approach in information security. WebISMS is now deployed in the CSUSB Institute of Applied Supercomputing lab, where it is working efficiently as an information security assessment / audit tool.


Mathematical Security Models For Multi-Agent Distributed Systems, Chunyan Ma Jan 2004

Mathematical Security Models For Multi-Agent Distributed Systems, Chunyan Ma

Theses Digitization Project

This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.


A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb Jan 2004

A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb

Theses Digitization Project

The purpose of this project is to develop a generic Java Application Programming Interface (API) that would be used to provide security and user privacy to functions such as data transfer, key management, digital signature, etc.


Information Security Program Development, William Ward Wells Jan 2004

Information Security Program Development, William Ward Wells

Theses Digitization Project

This project reviews Arrowhead Credit Union's Information Security Program structure and contents.


The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions, Galen Asher Thomas Stocking Jan 2004

The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions, Galen Asher Thomas Stocking

Theses Digitization Project

This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.


A Secure Lightweight Currency Service Provider, Chih-Wen Hsiao, David Turner, Keith Ross Jan 2004

A Secure Lightweight Currency Service Provider, Chih-Wen Hsiao, David Turner, Keith Ross

Theses Digitization Project

The main purpose of this project is to build a bank system that offers a friendly and simple interface to let users easily manage their lightweight currencies. The Lightweight Currency Protocol (LCP) was originally proposed to solve the problem of fairness in resource cooperatives. However, there are other possible applications of the protocol, including the control of spam and as a general purpose medium of exchange for low value transactions. This project investigates the implementation issues of the LCP, and also investigates LCP bank services to provide human interface to currency operations.