Malaysia recorded its first case of COVID-19 on January 24th, 2020 with a stable number of reported cases until March 2020, where there was an exponential spike due to a massive religious gathering in Kuala Lumpur. This caused Malaysia to be the hardest hit COVID-19 country in South East Asia at the time. In order to curb the transmission and better managed the clusters, Malaysia imposed the Movement Control Order (MCO) which is now in its fourth phase. The MCO together with targeted screening have slowed the spread of COVID-19 epidemic. The government has also provided three economic stimulus packages in order to cushion the impact of the shrinking economy. Nonetheless, early studies have shown that the MCO would greatly affect the lower and medium income groups, together with small and medium businesses.
e-Learning has become the most important supporting tool offering independent learning style among students. The main idea of this paper is to dismantle and analyse factors that influence the acceptance of e-Learning among students in higher education. An online questionnaire link was distributed to a sample comprising 123 respondents. Significant relationships and strength of relationship were observed between the e-Learning acceptance, quality, e-Learning self-efficacy, enjoyment, accessibility, and computer playfulness. The findings showed that all factors were positively correlated to the e-Learning system except the enjoyment of e-learning that did not affect the acceptance of e-learning. Conclusively, all factors stated were considered the main criteria in designing effective e-learning system. Future works such as embedding and integrating multimedia elements in the e-learning system will be additional attraction to learners and instructors for the effective learning style.
Teaching and learning (T&L) computer programming language especially for non-computer science students are challenging. The instructors are facing constraints or obstacles in making the students understand the programming concepts and able to create excellent programming skills to solve the real problem. Lack of logical, creative, and critical thinking among students leads to weaknesses in the implementation of problem-based learning (PBL). The entity of programming language problems such as instructors, students and programming language were examined and analyzed based on related previous studies or research that have been reported. The methodology of Structured Literature Review (SLR) was applied to explore the entities and help to measure the major contributing factors influencing the weaknesses of programming language understanding among students. Hence, SLR can guide researchers to find related information from the articles systematically and extensively in line with the objectives of the research framework.
Deploying IPv6 in the enterprise network will increase the security issues since some of IPv6 features bring vulnerabilities. Thus, mitigating them with appropriate security policy is vital. By having attack scenario testing, it will expose network administrators to the IPv6 potential attack. For example, Bad ACK-Reset attack is used by an attacker to reset a new connection after exploiting network. Also, Packet Fragmentation attack is capable to control over the packet fragmentation services yet can cause problems in security measurement. Hence, this paper tested Bad ACK-Reset and Packet Fragmentation attack scenarios for analysis. This paper used Scapy (2.0.1) to generate packets for testing. A testbed simulation has been designed by using Graphical Network Simulator 3 (GNS3). Several ip6tables rules and access control lists (ACLs) were implemented at the host and the router respectively to counter Bad ACK-Reset and Packet Fragmentation attack scenarios. Information gained from the testing will provide a clear understanding on IPv6 security issues and help to design a proper network security policy. The current results from the testing can be used for future research in generating the security policies. Thus, our further research will focus on modelling the created security policy for IPv6 deployment.
Internet Protocol version 6 (IPv6) is a next generation protocol that is designed to solve the problem of the current Internet Protocol version 4 (IPv4) depletion. With IPv6, almost anything in the world can be assigned an IPv6 address which makes communication between every single person to another possible. Besides, monitoring and sensing every single node or instrument can be done due to each item has its own IPv6 address. Realizing the features of IPv6, enterprise networks have begun deploying IPv6. Although they have not decided to deploy IPv6, IPv6 packet is possibly already in the network due to the most present operating systems supporting IPv6 and IPv6 enable is set as default. Deploying IPv6 in the existing IPv4 network results in coexistence of both protocols in the network. Thus, the coexistence condition exposed enterprise's network to higher probability of vulnerabilities and attacks. Hence, several security policies should be created to maintain security for both IPv4 and IPv6. A proper mechanism to manage the policies to ensure a secure IPv6 deployment is a necessity. Since enterprises have many branches and counterparts, it is essential to have a mechanism to distribute the policies among their branches or subnets. Therefore, the proper mechanism to distribute the security policy which will also support the green computing environment should be formed.Keywords-Distributed security policy, enterprise security policy, IPv6 deployment, enterprise networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.