15 research outputs found

    Trusted computing: Challenges & solutions

    Get PDF
    Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. Unfortunately Trusted Computing is a young technology and struggling with some drawbacks. There are major issues related to technical as well commercial that need to be addressed seriously and carefully.From user’s perspective, TC was introduced from desire to prevent users from freely sharing and using potentially technology and seems will introduce more benefits to vendors and large corporations.The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the challenges that currently faced with Trusted Computing in all aspects from different perspective and at the same time provide several solutions to overcome the challenges

    Preventing Web Browser From Cyber Attack

    Get PDF
    Web browser has become a widely used platform for connecting and interacting people or organization with cyberspace. By using the web browser, we can share all the information, and now we can make transaction and pay our bills online. To users, they have to be careful when using internet and web browser to make all the transactions involved money as we know there are some vulnerabilities appear in web browser. This paper provides the discussion of the vulnerabilities appear in Firefox and Internet Explorer browser. It begins by providing an overview of web browser and describes what it is, how it is works, most popular web browser and common vulnerabilities found in web browser that can be used by hackers to attack the system. The paper then proposes some countermeasures to prevent the web browser from cyber attack

    Development of a single honeypot system interface

    Get PDF
    Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing the organization’s security level.Perpetrators of cybercrime will take this advantage to exploit other systems in their network.To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network.This paper focuses on development of batch files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks.Technically, this paper will guide user in Honeypot configuration process

    Impak pameran dan perkhidmatan pandu lalu terhadap pinjaman buku baharu: kajian berasaskan Return on Investment (ROI)

    Get PDF
    The Library has purchased 10,050 copies of printed books for UKM researchers from 2009 to 2013. Nevertheless, the study found only 4,864 (48.4%) of books were borrowed. This problem should be overcome due to the fact that the estimated cost of books purchasing is RM8.72 million compared to the value of the books that were borrowed (RM4.5 million). A preliminary study was conducted by the Management Quality Improvement Team (QIT) with regards to borrowing transactions using Return on Investment (ROI) and Cost Benefit Ratio (CBR) methods. Several suggestions on how to increase books circulation were presented by the Management QIT to the Library. Two suggestions were implemented by the Innovative and Creative Group (ICG) KLIK in 2014/2015 which included new books display and Drive-Thru@PTSL service. The study has proved that new books display and Drive-Thru@PTSL service have increased the borrowing transaction rate from 1.6% up to 46.8% in nine months

    Design and development of trash trap of stream for mini hydro

    Get PDF
    The river became increasingly contaminated over the years and in the wake of rapid development in the town. The purpose of this paper is to invent and provide a trash collector for mini hydro that is readily removable so that the trashes collected can be easily disposed of. Design of the trash trap should be compatible with existing stream structures. Trash trap must prevent any trash and debris from passing through the mini hydro. Fieldwork was done at the stream river to investigate the surrounding and stream structure. The data collected were mass of trash collected with diverter and without diverter. A total of 10.0 kg of trashes were collected. The efficiency of the trash trap was calculated by the proportion of the average mass of diverted trashes by the total mass of trapped trashes. The targeted efficiency for this trash trap project is 70.0%. Based on the data collected, the efficiency of this trash trap is 84.12%. The targeted efficiency was achieved and design improvement of this trash trap will be discussed at the recommendation. In conclusion, the trash trap had been proven as a potential solution for the mini hydro machine problem, diverts and prevents most of the trashes from entering the mini hydro and blocked the turbine from rotating

    Self assessment framework for detecting vulnerability in web applications

    Get PDF
    Security Assessment is widely used to audit the security protection of web applications. However, it is often performed by outside security experts or third party that has been appointed by the company. The problem appears when the assessment involves highly confidential areas that might impact company’s privacy data which directly reveal the important information to the third party. Even though they might have signed an agreement of non-disclosure information, but as they have already had the information on the infrastructure and architecture regardless of the confidential data, it has to be considered as a high risk. It is important to keep the information within the project members to protect the confidential data used by the system. Therefore, due to confidentiality level of the system, we proposed Self- Assessment framework to conduct security assessment internally to ensure the safety of all the assets of the organization. The main objective of this paper is to discuss the activities and processes involve in conducting security assessment

    The impact of big data on firm performance in hotel industry

    No full text
    Big data has increasingly appeared as a frontier of opportunity in enhancing firm performance. However, it still is in early stages of introduction and many enterprises are still un-decisive in its adoption. The aim of this study is to propose a theoretical model based on integration of Human-Organization-Technology fit and Technology-Organization-Environment frameworks to identify the key factors affecting big data adoption and its consequent impact on the firm performance. The significant factors are gained from the literature and the research model is developed. Data was collected from top managers and/or owners of SMEs hotels in Malaysia using online survey questionnaire. Structural Equation Modelling (SEM) is used to assess the developed model and Adaptive Neuro-Fuzzy Inference Systems (ANFIS) technique is used to prioritize adoption factors based on their importance levels. The results showed that relative advantage, management support, IT expertise, and external pressure are the most important factors in the technological, organizational, human, and environmental dimensions. The results further revealed that technology is the most important influential dimension. The outcomes of this study can assist the policy makers, businesses and governments to make well-informed decisions in adopting big data. © 2019 Elsevier B.V

    DEVELOPMENT OF A SINGLE HONEYPOT SYSTEM INTERFACE

    No full text
    ABSTRACT. Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing the organization's security level. Perpetrators of cybercrime will take this advantage to exploit other systems in their network. To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network. This paper focuses on development of batch files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks. Technically, this paper will guide user in Honeypot configuration process
    corecore