Fundamentals of Cyber Security
Cybersecurity is continuously innovating at the same phase as cyber-attacks to match their technology since that is the only way it will effectively stop the risks posed by such attacks to digital data users.
Cybersecurity is continuously innovating at the same phase as cyber-attacks to match their technology since that is the only way it will effectively stop the risks posed by such attacks to digital data users.
Data breaches are a significant part of our everyday lives and understanding their legal and financial impact is important.
This paper describes business continuity planning strategies and processes and elaborates on how to develop, write and execute an effective business continuity plan.
Method of Quantifying the Financial Impact Due to Downtime Incurred from a DDOS Attack
Abstract
In the current day and age, were computing and the internet is crucial for many services, such as bank
The premise for this report is to provide the client with a deeper understanding of the security landscape, by delivering a more comprehensive overview of Defence in Depth, security vulnerabilities in the server and application layers and finally, security recommendations for the client’s website.
The identification of vulnerabilities and assurance of security functionality is an extensively implemented methodology used to assess and progress the security of software applications
A survey of person re-identification using deep learning approach
Abstract:
From the past few years’ person re-identification plays an active role in the automated video surveillance and has been
How can security issues in an online voting system be addressed?
Abstract
This report consist of the tools and techniques that can be utilized to minimize electronic online voting from gaining unauth
In this paper, we propose a multi-layer neural network classifier to detect falsified reports in cooperative spectrum sensing.
Our project is mainly going to focus on developing a tool which would give an output and it will show whether the URL is secure or not.
The following report explores the world of internet privacy and aims to raise awareness to the vulnerability that users face when browsing online.
Abstract
The following report explores the world of internet privacy and aims to ra
4.1 Introduction
This chapter provided the system activity for the image steganography, this includes the hiding/embedding of the secret message the unveiling of the message as well as the systematic
[Information security issues faced by the Healthcare in New Zealand-Possible Solutions]
Table of Contents
I. Abstract
II. Introduction
III. Literature Review
a) Information Security
b) Informatio
This is a research report into all aspects of Fileless Attack Malware. It provides the reader with concise information regarding what a Fileless Malware Threat is, how it infiltrates a machine, how it penetrates through a system, and how to prevent attacks of such kind.
This literature review discussed the most prevailing data mining techniques machine-learning and cluster analysis.
This paper will explore the various security management models available as a framework for illustrating what can make security management successful in enhancing an organization’s physical security.
This dissertation looked at the phishing as a whole and examined various stakeholders and the countermeasures that they recommend to be implemented.
This paper will talk about the internet evolution and how its use has changed the world and the way people live and function and the cause and effect of cybercrime.
The purpose of the study is to secure the 4G LTE networks with a new method/approach. This project is related to network security.
This document describes the security measures for software and hardware implementation in which there will be a detailed configuration, installation and testing.

Subscribe
Join our email list to receive the latest updates and valuable discounts.