A security officer must be offensive and defensive.Being attacked by an attacker is not an option. They need to be creative and they may need to think like an attacker. That is why learning the art of penetration testing is crucial in education level. The basic fortress of security is to protect a network with firewall. To possess knowledge in security, early exposure must be nurtured from undergraduate level to ease the development of knowledge and learning process. Current scholars who are studying in security field seldom have the opportunity to exercise hands-on activity in class due to time constraint and lack of infrastructure in an educational organization. To support the initiative of providing exposure among the scholars and to overcome the aforementioned problems, an approach to develop a portable penetration testing and firewall configuration toolkit has been proposed as a learning aid for the students to perform simulation on conducting penetration testing and configuring firewall for beginners. From the proposed toolkit, scholars are able to execute basic penetration testing, network monitoring, port scanning, firewall configuration, and web and filtering at anywhere and anytime. By having this proposed toolkit, the teaching and learning process will be much easier, efficient and time saving compared to conventional methods of teaching. As a conclusion, the proposed plug-and-play toolkit implements benefit user in terms of time saving, early exposure and facilitate teaching and learning session effectively.
In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.
A physical security is best described as securing the perimeter of an area. Most organisation tends to focus on securing their data over the wires and overlooked threats coming from inside their premises. Servers are protected with maximum security configurations and firewall, however the server room are accessible by unauthorized personnel, access card often left behind, broken or missing main door entrance although secured with access card system; vendors, consultants and visitors were not accompanied by staff during visitation; piggy-backing, tailgating, shoulder surfing and keylogging cases are common scenario that can be seen inside an organization. To minimize or/and to overcome the mentioned problems, an enhanced type of physical security method is proposed which is authentication using Random Number Generated (RNG) Keypad based on One Time Pad Concept. It is a computational physical device designed to generate a sequence of numbers or symbols that will appear randomly using Pseudo-random numbers algorithm each time One Time Password (OTP) is keyed in. It is typically generated by a token possessed by the user and it is the input to the authentication system. The input OTP is compared to an OTP generated by the system. If it matches, the user is allowed to access the system. It is hoped that by having this prototype system, common physical security countermeasure weaknesses can be minimized while assuring confidentiality, integrity and availability of the data stays protected with minimum cost and minimal configurations.
In the last decade, online newspapers have become a viable alternative to conventional hardcopy papers. Many studies have shown that digital media have increased their share of Internet audience. In this study, we use time series analysis to investigate the user behavior in accessing online newspapers and to describe the important features of the time series pattern. Data was gathered from the daily Malaysian newspaper, Berita Harian for the month of April 2012. In the initial phase, we carried out a basic analysis of time series analysis to identify user access behavior in terms of the days and hours of access. In the next stage, we conducted analysis on the user agent, that is, the different types of browser, devices and external links. This analysis could reveal whether the ubiquitous communication and computing has any effect to the online newspaper industry.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.