4 research outputs found

    Initial Investigation on Privacy Preferences: A Preliminary Study on User Priority, Concern, Perception and Expectation

    Get PDF
    This paper reports on the findings of an initial study on the user’s preference towards their own privacy. The study is important in having user’s opinion especially when dealing with security of their privacy. It is vital to know what the most important priorities are when dealing with privacy as this could lead to the requirements that the user expected when using a website. In addition, this study tried to gather information of user perceptions on privacy and the expectations that they have when dealing with organizations through a survey by using questionnaires. Results showed that Malaysians does have privacy concerns when dealing with organizations. Therefore, this study has achieved the objective s of gathering data on user perceptions and expectations towards privacy

    Development of a single honeypot system interface

    Get PDF
    Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing the organization’s security level.Perpetrators of cybercrime will take this advantage to exploit other systems in their network.To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network.This paper focuses on development of batch files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks.Technically, this paper will guide user in Honeypot configuration process

    DEVELOPMENT OF A SINGLE HONEYPOT SYSTEM INTERFACE

    No full text
    ABSTRACT. Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing the organization's security level. Perpetrators of cybercrime will take this advantage to exploit other systems in their network. To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network. This paper focuses on development of batch files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks. Technically, this paper will guide user in Honeypot configuration process
    corecore