41 research outputs found
Analysis of Cyber Attacks in Cloud Technology
We are currently witnessing the maturity of cloud computing from a promising business concept to one of the fastest growing segments in the IT industry. Despite the hype surrounding the cloud, enterprises are still reluctant to adopt the cloud as security, privacy and data protection continue to plague the market. As more and more information about both individuals and businesses is stored in the cloud, there is growing concern about the security of the environment, which cyber attackers can exploit deliberately. Therefore, it is necessary to accurately analyze the causes and effects of cyber-attacks through cloud systems in various application domains. This document presents some models and capabilities that can be used to assess cyberattacks and their impact, as well as some Security Intelligence concepts that can mitigate these cyberthreats</p
Implementation of Efficient Threat free IOT Architecture for Security Purpose
This white paper discusses Internet of Things (IoT) security and describes IoT architecture. It is based on the
theoretical foundations of IoT. This article presents points that may represent potential points of attack on your system.
The proposed architecture is based on the physical organization of devices and sensors and their communication with
servers and applications over various types of networks. In addition to the physical part, this paper proposes a software
architecture that improves the security of Internet devices.</p
Investigation of using Android Phones and Open source tools for Forensic Applications
In recent years, the Android operating system installed on many smartphones, tablets and other devices has
taken the market by storm. After this success, the need to recover and analyze data from the Android operating system
became an important part of mobile forensics. As a result, many commercial and open source mobile forensic tools
have become available to forensic investigators. The theme of this white paper is to introduce free, open-source tools
and explain how to forensically recover data from Android-based devices</p
Identification of Maternity using Biometric Software tools in Health Care system
In this work, an algorithm written in pseudocode is presented. This is presented by the capabilities the device has,
as the algorithmic device shows many diagrams, how the model is made, what the overall state looks like, and how it is
built. It details the possible advantages and benefits, what a qualitative leap in the healthcare system, especially in the place
of birth as part of the healthcare system around the world. A possible type of wireless communication and fingerprint
storage is that mother and baby are scanned together at birth to generate a unique identity reference to her that is encrypted
to ensure parenthood.</p
Investigation of usage of INTERNET OF THINGS and its CHALLENGES in Human Society
The concept of Internet of Things (IoT) implies the interconnection of people, devices, equipment and even
wildlife. With the spread of IoT, society has become more complex, and we are facing new challenges that threaten
social stability. From a human-centric perspective, the question is how his IoT concept will affect organized societies.
We assume that government agencies have institutionalized obligations to prevent security breaches within their
jurisdictions and to ensure the security of sensitive applications such as national infrastructure, security services, and
finance. In this article, we observe the predictable challenges for national administration from the order and political
balance of IoT. IoT information input and time consumption inherently influence decision-making; the ubiquitous
infrastructure environment magnifies state legal and national security concerns; connectivity brings the concept of
conflict into social life; I found to introduce The results show that in order to maintain social stability, states need to
take precautionary measures in terms of creating the educational, legal and technological conditions for the new phase
of technological change. increase</p
IOT and Embedded System based VEHICLE Control in National Highways
Electric vehicle users are constantly looking for new improvements that further improve efficiency, safety and
ease of use. H. Simplicity and enjoyment in operating such vehicles. Computing and communication technologies have
helped facilitate and justify these trends. Given the phenomenon of the massive prevalence of computing microsystems
as embedded components in modern automobiles, we cannot help but recognize the safety and reliability issues of the
operation of such microsystems. Hmm. Here, we provide a brief historical overview of the development of automotive
embedded computing, discussing the complexity of automotive computing, exposure of I/O to benign and malicious
user actions, standardization of automotive computing networks, and their implications. Analyze release-related issues.
Networks for the Internet, that is, H. The problem of networking these networks. Furthermore, we present a unique
model of the malicious attack surface that electric vehicles can present at different levels of the abstraction hierarchy</p
Design of IOT System for SMART HOME Security Purpose
These days we are facing with expansion of off the shelf IoT solutions for SM@RT HOME. Recently,
concept of SM@RT HOME has evolved from simple, separated, products for home automation into complex IoT
systems for home monitoring, automation and security. Unfortunately, this rapid expansion was not followed by proper
set of standards, especially in field of security and protection of system per se.This paper will take into consideration,
and addressed some problems and open issues of personal security, and digital forensic challenges in that respect. It will
show a possible solution through implementation of risk management cycle strengthened by digital forensic enablers
like logging systems.Finally paper will conclude that only proper level of awareness, accompanied by comprehensive
advanced security intelligence concept can provide high level of personal security in SM@RT HOME environment.</p
Android Mobile based Forensic Technique and its Investigations
Mobile device technology has seen revolutionary growth over the past decade. A mobile phone serves not
only as a means of communication, but also as a portable computer with enhanced communication capabilities. The
ability of smartphones to store a wide variety of personal information while providing powerful services such as
location services, internet sharing via tethering, and smart his voice has increased the potential for these devices to be
involved in criminal activities. . Mobile forensics is the science of recovering digital evidence from mobile devices
using recognized methods under forensically sound conditions. In recent years, there has been a considerable amount of
research related to forensics, data collection schemes, and information extraction methods on various mobile device
platforms. This white paper provides a comprehensive overview of the area by presenting a detailed evaluation of the
techniques involved in Android forensic and anti-forensic techniques.</p