223,872 research outputs found

    Designing and optimization of VOIP PBX infrastructure

    Get PDF
    In the recent decade, communication has stirred from the old wired medium such as public switched telephone network (PSTN) to the Internet. Present, Voice over Internet Protocol (VoIP) Technology used for communication on internet by means of packet switching technique. Several years ago, an internet protocol (IP) based organism was launched, which is known as Private Branch Exchange "PBX", as a substitute of common PSTN systems. For free communication, probably you must have to be pleased with starting of domestic calls. Although, fairly in few cases, VoIP services can considerably condense our periodical phone bills. For instance, if someone makes frequent global phone calls, VoIP talk service is the actual savings treat which cannot achieve by using regular switched phone. VoIP talk services strength help to trim down your phone bills if you deal with a lot of long-distance (international) and as well as domestic phone calls. However, with the VoIP success, threats and challenges also stay behind. In this dissertation, by penetration testing one will know that how to find network vulnerabilities how to attack them to exploit the network for unhealthy activities and also will know about some security techniques to secure a network. And the results will be achieved by penetration testing will indicate of proven of artefact and would be helpful to enhance the level of network security to build a more secure network in future

    Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users

    Get PDF
    Over the past few years, we have seen the emergence of a wide range of banking architectures, technologies, and applications made possible by the significant improvements in hardware, software, and networking technologies. Nowadays, innovative solutions are being developed by banks to leverage the benefits of blockchain, to improve their business agility and performance, and to make their business operations more efficient and secure. However, there are still cases where regular access to Internet is impossible or unreliable due to saturated networks or harsh environments, hence limiting the deployment of typical blockchain based solutions. In this context, an approach using a new connectivity technology is needed in order to increase mobile Internet services for any device to reach nearly 95% of the world population, instantly, simply by drawing on existing mobile phone networks, with no additional infrastructure development. We aim to give the user full bank access from their device, even if the device is not a smart one, using ordinary mobile phone networks. However, providing efficient and secure communications over lossy and low bandwidth networks remains a challenge. The main objective of this paper will be to design an end-to-end and low overhead secure solution for the communications between mobile devices and their corresponding remote application servers that using blockchain via ordinary mobile networks

    Protecting your identity: what everyone needs to know

    Get PDF
    This guide provides tips for Australians to reduce their risk of becoming a victim of identity theft. Summary Secure your mailbox with a lock and, when you move, redirect your mail. Be cautious about using social media, and limit the amount of personal information you publish online. Secure your computer and mobile phone with security software and strong passwords, and avoid using public computers for sensitive activities. Secure your personal documents at home and when travelling. Be cautious about requests for your personal information over the internet or phone and in person in case it is a scam. Investigate the arrival of new credit cards you haven’t requested or bills for goods and services you have not purchased. Be alert for any unusual bank transactions or missing mail. If you are a victim of identity theft, report it to the police and any relevant organisations. Order a free copy of your credit report from a credit reporting agency on a regular basis, particularly if your identity has been stolen

    A Purchase Protocol with Multichannel Authentication

    Get PDF
    While online shopping are becoming more accepted by people in modern life, cardholders are more concerned about card fraud and the lack of cardholder authentication in the current online credit card payment. This paper proposes a purchase protocol with live cardholder authentication for online transaction which combines telephone banking and online banking together. The order information and payment information are sent though the Internet and encrypted by asymmetric key encryption. The cardholder is authenticated by the card issuing bank ringing back at the customer’s phone number and the cardholder inputting the secure PIN and the amount to pay. The multichannel authentication makes the cardholder feel secure and card fraud difficult. Furthermore, the protocol does not require the cardholder to obtain public key certificates or install additional software for the online transactionPeer reviewe

    Smart Cities for Real People

    Get PDF
    Accelerating urbanization of the population and the emergence of new smart sensors (the Internet of Things) are combining in the phenomenon of the smart city. This movement is leading to improved quality of life and public safety, helping cities to enjoy economies that help remedy some budget overruns, better health care, and is resulting in increased productivity. The following report summarizes evolving digital technology trends, including smart phone applications, mapping software, big data and sensor miniaturization and broadband networking, that combine to create a technology toolkit available to smart city developers, managers and citizens. As noted above, the benefits of the smart city are already evident in some key areas as the technology sees actual implementation, 30 years after the creation of the broadband cable modem. The challenges of urbanization require urgent action and intelligent strategies. The applications and tools that truly benefit the people who live in cities will depend not on just the tools, but their intelligent application given current systemic obstacles, some of which are highlighted in the article. Of course, all the emerging technologies mentioned are dependent on ubiquitous, economical, reliable, safe and secure networks (wired and wireless) and network service providers

    Security Measures in Mobile Commerce: Problems and Solutions

    Get PDF
    Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will exceed the number of Internet-connected PCs before 2007. The mobile phone will therefore become the most prevalent device for accessing the Internet. Several industry analysts predict that Mcommerce will constitute a multibillion dollar business by 2005. However, M-Commerce brings new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to secure financial transactions via mobile commerce? Generally speaking, M-Commerce creates more security concerns than traditional E-Commerce. In this paper, security measures in M-Commerce, wireless security, and the application of cryptography for key generation, authentication, digital signature and digital certificate are discussed

    Digital Privacy in the Home

    Get PDF
    This workshop covers how to stay safe in a digital environment while using the many conveniences a smart home offers. The first half focuses on understanding where the risks are in the digital environment and how to stay safe by creating secure networks and employing strong security tactics with biometrics, passwords, and other available features. The second half focuses on the Internet of Things, covering everything you are likely to find in a smart home. The presentation offers tips on how to reduce the risk of hackers invading your privacy through smart speakers and TVs, as well as addressing the risks associated with connected cars and smart appliances. teach you how to identify where your PII (personally identifiable information) is at risk and how to protect your privacy in the digital world when using everything from your phone to online bill paying to communicating with the Internet of Things (all those “smart” devices). We will consider questions such as: Are biometrics really more secure than a good password? Is your Alexa listening to you ALL the time? Can you delete your internet presence? Are all privacy browsers created equal? Join us to learn more about these topics and others related to digital privacy

    Letter to the Editor: License Portability for Occupational Audiologists is Essential

    Get PDF
    Occupational audiologists have a crisis in their profession and need advocates. These audiologists are primarily responsible for industrial hearing conservation programs and their compliance with multiple regulations, such as Occupational Safety and Health Administration (OSHA), Mine Safety and Health Administration (MSHA) and the Federal Railroad Administration.  Occupational hearing programs, for the most part, are multi-state programs as companies and corporations are national organizations. Also, companies may contract services across state lines as local services may not be desired or available. Individual state telepractice regulations require audiologists who are professionally supervising these programs via the internet and phone, to secure licensure in each state. For this licensure redundancy, the cost in time and tracking are enormous.  It is imperative that the American Speech-Language-Hearing Association (ASHA), secure multistate licensure for speech-language pathologists and audiologists. For the profession of occupational audiology, it is essential.Keywords: Licensure, Occupational audiologists, Telehealth, Telepractic
    corecore