41 research outputs found

    Analysis of Cyber Attacks in Cloud Technology

    No full text
    We are currently witnessing the maturity of cloud computing from a promising business concept to one of the fastest growing segments in the IT industry. Despite the hype surrounding the cloud, enterprises are still reluctant to adopt the cloud as security, privacy and data protection continue to plague the market. As more and more information about both individuals and businesses is stored in the cloud, there is growing concern about the security of the environment, which cyber attackers can exploit deliberately. Therefore, it is necessary to accurately analyze the causes and effects of cyber-attacks through cloud systems in various application domains. This document presents some models and capabilities that can be used to assess cyberattacks and their impact, as well as some Security Intelligence concepts that can mitigate these cyberthreats</p

    Implementation of Efficient Threat free IOT Architecture for Security Purpose

    No full text
    This white paper discusses Internet of Things (IoT) security and describes IoT architecture. It is based on the theoretical foundations of IoT. This article presents points that may represent potential points of attack on your system. The proposed architecture is based on the physical organization of devices and sensors and their communication with servers and applications over various types of networks. In addition to the physical part, this paper proposes a software architecture that improves the security of Internet devices.</p

    Investigation of using Android Phones and Open source tools for Forensic Applications

    No full text
    In recent years, the Android operating system installed on many smartphones, tablets and other devices has taken the market by storm. After this success, the need to recover and analyze data from the Android operating system became an important part of mobile forensics. As a result, many commercial and open source mobile forensic tools have become available to forensic investigators. The theme of this white paper is to introduce free, open-source tools and explain how to forensically recover data from Android-based devices</p

    Identification of Maternity using Biometric Software tools in Health Care system

    No full text
    In this work, an algorithm written in pseudocode is presented. This is presented by the capabilities the device has, as the algorithmic device shows many diagrams, how the model is made, what the overall state looks like, and how it is built. It details the possible advantages and benefits, what a qualitative leap in the healthcare system, especially in the place of birth as part of the healthcare system around the world. A possible type of wireless communication and fingerprint storage is that mother and baby are scanned together at birth to generate a unique identity reference to her that is encrypted to ensure parenthood.</p

    Investigation of usage of INTERNET OF THINGS and its CHALLENGES in Human Society

    No full text
    The concept of Internet of Things (IoT) implies the interconnection of people, devices, equipment and even wildlife. With the spread of IoT, society has become more complex, and we are facing new challenges that threaten social stability. From a human-centric perspective, the question is how his IoT concept will affect organized societies. We assume that government agencies have institutionalized obligations to prevent security breaches within their jurisdictions and to ensure the security of sensitive applications such as national infrastructure, security services, and finance. In this article, we observe the predictable challenges for national administration from the order and political balance of IoT. IoT information input and time consumption inherently influence decision-making; the ubiquitous infrastructure environment magnifies state legal and national security concerns; connectivity brings the concept of conflict into social life; I found to introduce The results show that in order to maintain social stability, states need to take precautionary measures in terms of creating the educational, legal and technological conditions for the new phase of technological change. increase</p

    IOT and Embedded System based VEHICLE Control in National Highways

    No full text
    Electric vehicle users are constantly looking for new improvements that further improve efficiency, safety and ease of use. H. Simplicity and enjoyment in operating such vehicles. Computing and communication technologies have helped facilitate and justify these trends. Given the phenomenon of the massive prevalence of computing microsystems as embedded components in modern automobiles, we cannot help but recognize the safety and reliability issues of the operation of such microsystems. Hmm. Here, we provide a brief historical overview of the development of automotive embedded computing, discussing the complexity of automotive computing, exposure of I/O to benign and malicious user actions, standardization of automotive computing networks, and their implications. Analyze release-related issues. Networks for the Internet, that is, H. The problem of networking these networks. Furthermore, we present a unique model of the malicious attack surface that electric vehicles can present at different levels of the abstraction hierarchy</p

    Design of IOT System for SMART HOME Security Purpose

    No full text
    These days we are facing with expansion of off the shelf IoT solutions for SM@RT HOME. Recently, concept of SM@RT HOME has evolved from simple, separated, products for home automation into complex IoT systems for home monitoring, automation and security. Unfortunately, this rapid expansion was not followed by proper set of standards, especially in field of security and protection of system per se.This paper will take into consideration, and addressed some problems and open issues of personal security, and digital forensic challenges in that respect. It will show a possible solution through implementation of risk management cycle strengthened by digital forensic enablers like logging systems.Finally paper will conclude that only proper level of awareness, accompanied by comprehensive advanced security intelligence concept can provide high level of personal security in SM@RT HOME environment.</p

    Android Mobile based Forensic Technique and its Investigations

    No full text
    Mobile device technology has seen revolutionary growth over the past decade. A mobile phone serves not only as a means of communication, but also as a portable computer with enhanced communication capabilities. The ability of smartphones to store a wide variety of personal information while providing powerful services such as location services, internet sharing via tethering, and smart his voice has increased the potential for these devices to be involved in criminal activities. . Mobile forensics is the science of recovering digital evidence from mobile devices using recognized methods under forensically sound conditions. In recent years, there has been a considerable amount of research related to forensics, data collection schemes, and information extraction methods on various mobile device platforms. This white paper provides a comprehensive overview of the area by presenting a detailed evaluation of the techniques involved in Android forensic and anti-forensic techniques.</p
    corecore