Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Governors State University

Security

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Mitigation Of Cache Attacks On Cloud Services, Mudassiruddin Mohammed Jan 2023

Mitigation Of Cache Attacks On Cloud Services, Mudassiruddin Mohammed

All Student Theses

Cloud computing is frequently used due to its low cost and flexibility, but it also raises security issues to cloud service providers and customers. Cache attacks are a critical security risk in cloud computing. Cache attacks use weaknesses in cloud servers' cache memory to steal sensitive information, interrupt services, and decrease cloud performance. This study examines the many forms of cache attacks, their possible effects, and known mitigation measures. The study approach includes a review of current methods and their effectiveness in combating cache attack. The report also suggests future research topics for developing more effective and economical methods for …


Ios Device Forensics, Lauren Drish Oct 2014

Ios Device Forensics, Lauren Drish

All Capstone Projects

Many people today have an iPhone, iPad or iPod. Not many would realize that valuable information is stored on these devices. When a crime occurs, an iOS Device could hold key information to help solve said crime that criminals are not aware are present on the device. This can include GPS information as well as application history on the device itself.

The project I wish to do and complete is to create a class where students can learn the about iOS Forensics. Student will be able to learn the basics of an iDevice, as well as how to work with …


A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell Jul 2012

A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell

All Capstone Projects

This project reviews security issues with mobile devices and offers possible solutions from Internet sources. (supplied by OPUS staff)