online security
Recently Published Documents


TOTAL DOCUMENTS

173
(FIVE YEARS 51)

H-INDEX

13
(FIVE YEARS 2)

2021 ◽  
pp. 535-542
Author(s):  
Nader Abdel Karim ◽  
Hasan Kanaker ◽  
Shadi Almasadeh ◽  
Jamal Zarqou

User authentication in the online environment is promoting a hugely challenging issue. This has contributed to the realization of a user authentication where the exams can be performed over the Internet at any time and from any place and by using any digital device. Consequently, further investigations are required to focus on improving user authentication methods to enhance online security mechanisms, especially in the field of e-exams. This research proposes a new user authentication technique based on the user interface (UI). The novel idea is created based on the design preferences of candidates who are taking the e-exams. Several design features are used to design a special user interface for e-exams, for example, the font attributes, back colour, number of questions per page, group categories for questions based on difficulties, and timer setting. The introduced technique can be used to support the user authentication process in the e-exams environment. Furthermore, the proposed technique provides the ability to login to the e-exam without the need to remember the login information, but to select what the student prefers according to his/her personal information. Based on the literature review, a primary evaluation claiming that the students have differences in their preferences and that each user has stable design preferences within different sessions is revealed. In regard to these facts, they become the resource and essence of this research. The security performance of the proposed method is evaluated. The results of the experiments show a false positive (FP) rate of 0.416% and a false negative (FN) rate of 0%.


2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


Author(s):  
Nafisah Kheshaifaty ◽  
◽  
Adnan Gutub ◽  

Password alone is currently not trusted for user online authentication and security as threats from hackers continue to grow, requiring highly efficient defense safeguard protection against unauthorized users. Therefore, CAPTCHA techniques came into the picture as an automated assistance to distinguish between humans and robots. The CAPTCHA has several applications in the online security domain requiring to be merged with encrypted hash function benefitting from the facility of the graphical password schemes. This paper proposes engineering an authentication technique using graphical CAPTCHA with an AES encrypted hash password to maintain applicable security accessing systems. We propose three layered security system that joins highly efficient security mechanisms to avoid users’ stress of entering password many times or different other hectic routines in order to save account accessing.


Author(s):  
Madan Mohan ◽  
◽  
Aadarsh Malviya ◽  
Anuranjan Mishra ◽  
◽  
...  

Today cloud computing is a very popular technology, and many people use this technology in many ways. it's important to have it safe. This technology was primarily used to keep data safer and safer in the cloud, so in this article we suggest a security framework for large data logs in the cloud. There are many and many risks that threaten the integrity of this information in the great information. Therefore, in line with the development of technology, the level of security has also increased significantly over the years. Various technology techniques access several online activities, such as interaction with different internet sites and services, making the web more accessible to their plug-ins. As a result, these activities have created a global platform for malicious activities to add these devices that expose large data logs harmful attacks. Sky system is an online platform that requires proper security integration. In addition, the current state of online security threatens high data in the cloud, which has affected the performance and service model.


2021 ◽  
Vol 11 (5) ◽  
pp. 201
Author(s):  
Raminta Jutaite ◽  
Brigita Janiunaite ◽  
Jolita Horbacauskiene

The COVID-19 pandemic situation forced to look for other ways to provide continuous education around the world, which highlighted the importance and necessity of online education platforms and digital learning object (DLO) while going through this shift (Zhou et al., 2020; Viner et al., 2020; Wang et al., 2020). Teachers, in primary schools as well, had to reorganize completely their curriculum and assignments to adapt them to the virtual environment. This paper, based on the experiences of primary school teachers, aims to reveal the challenges faced by the teachers when within two weeks all Lithuanian schools and universities had to switch to remote education from face-to-face education and when the adoption of DLOs moved from optional to compulsory ‘mode’ as learning process became remote. The research problem is analyzed primarily by revealing the theoretical aspects of the research, i.e., the concept of the DLO, the specifics of the adoption of DLOs in primary education and the challenges considered through the types of barriers. The findings indicate that teachers experienced challenges of practical training, issues in pupils’ assessment due to the lack of participation in the process of assignment completion, time constrain, different computer systems used, issues of online security, internet access and support. The study also identified the challenges of practical origin, namely, difficulties in keeping pupils’ concentration and attention throughout the lesson, lower level of teacher’s control during lessons as well as differences in pupils’ technical skills to use computers.   Received: 2 August 2021 / Accepted: 20 August 2021 / Published: 5 September 2021


Author(s):  
Chimezie F. Ugwu ◽  
Henry O. Osuagwu ◽  
Donatus I. Bayem

This research developed an Intranet-Based Wiki with Instant Messaging Protocol (IBWIMP) for the Staff of the Department of Computer Science, University of Nigeria, Nsukka to enable them to collaborate on tasks; like writing of documents like, memo, project guidelines, proposal/grants, and circulars with online security consideration. The essence of this work is to improve on the contributions staff make during work, in carrying out tasks with their colleagues irrespective of the person’s location at that point in time. The existing system on ground would always require the presence of the staff within the department before they can carry out the tasks meant for them or respond to the available mails within their mail boxes located within the general office of the department. In regard to such situation, there is always delay in the processing of such mails or documents that could require urgent attention of the supposed staff therefore could cause serious damages. This research established a better internet connection for the security of the system and the documents therein by the use of virtual private server (VPS) hosting on virtual private network (VPN). This system allows the collaboration between the staff of the department and external persons, or partners classified as external staff user on documents like circulars that normally come from outside the department. This system automatically sends emails to the supposed users whenever the admin posts a document via the Short Message Transfer Protocol (SMTP). The system is accessed online by the users from any location once there is accessible internet connection and users can collaborate on the development of any posted document at the same time. This application was designed using Object Oriented Analysis and Design Methodology (OOADM) and implemented using Hypertext Markup Language (HTML), JavaScript, Cascading Style Sheet (CSS), CkEditor, Hypertext Pre-Processor (PHP) and MySQL database management system.


Sign in / Sign up

Export Citation Format

Share Document