Babcock University

Displaying 1-7 of 7 results

  • White Papers // Mar 2013

    System and Data Capture Framework Insights Into Breach Data Toward Improved Feedback

    A secure information infrastructure is required to sustain competitive advantage. Despite creditable efforts, there are visible failures of Information Security (IS). Breach data offers necessary relatively unbiased and robust feedback to reveal what is overlooked for apt countermeasures and improved IS decisions. None of the previous works done analyzing breach...

    Provided By Babcock University

  • White Papers // Nov 2011

    Cloud Computing Security Issues and Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages...

    Provided By Babcock University

  • White Papers // Apr 2011

    Multiple Unit GSM Controlled Devices

    The human mind always needs information of interest to control systems of his/her choice. In the age of electronic systems it is important to be able to control and acquire information from everywhere. Remote management of several home and office appliances is a subject of growing interest and in recent...

    Provided By Babcock University

  • White Papers // Sep 2010

    SMS Based Microcomputer Control System (MCS) for Computer Automation and Security

    This paper presents a cost-effective solution that provides a means of controlling microcomputers remotely and also enables computer security against intrusion when an authorized computer user is absent. The system is based on SMS technology and provides an ideal solution to computer users and system administrators who are not always...

    Provided By Babcock University

  • White Papers // Jun 2010

    PC Access Control Using Voice Authentication

    Biometrics is a secure way of carrying out access control authentication as it makes use of a person's characteristics. Voice authentication, a form of biometrics, has become more popular and more accepted in the development of commercial applications. This makes it acceptable as an alternative or complement to other forms...

    Provided By Babcock University

  • White Papers // Dec 2009

    An Improved SMS User Interface Result Checking System

    This paper reviews the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university where student who have written examinations and are anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their...

    Provided By Babcock University

  • White Papers // May 2009

    A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)

    Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different...

    Provided By Babcock University

  • White Papers // Jun 2010

    PC Access Control Using Voice Authentication

    Biometrics is a secure way of carrying out access control authentication as it makes use of a person's characteristics. Voice authentication, a form of biometrics, has become more popular and more accepted in the development of commercial applications. This makes it acceptable as an alternative or complement to other forms...

    Provided By Babcock University

  • White Papers // Mar 2013

    System and Data Capture Framework Insights Into Breach Data Toward Improved Feedback

    A secure information infrastructure is required to sustain competitive advantage. Despite creditable efforts, there are visible failures of Information Security (IS). Breach data offers necessary relatively unbiased and robust feedback to reveal what is overlooked for apt countermeasures and improved IS decisions. None of the previous works done analyzing breach...

    Provided By Babcock University

  • White Papers // May 2009

    A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)

    Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different...

    Provided By Babcock University

  • White Papers // Dec 2009

    An Improved SMS User Interface Result Checking System

    This paper reviews the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university where student who have written examinations and are anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their...

    Provided By Babcock University

  • White Papers // Apr 2011

    Multiple Unit GSM Controlled Devices

    The human mind always needs information of interest to control systems of his/her choice. In the age of electronic systems it is important to be able to control and acquire information from everywhere. Remote management of several home and office appliances is a subject of growing interest and in recent...

    Provided By Babcock University

  • White Papers // Sep 2010

    SMS Based Microcomputer Control System (MCS) for Computer Automation and Security

    This paper presents a cost-effective solution that provides a means of controlling microcomputers remotely and also enables computer security against intrusion when an authorized computer user is absent. The system is based on SMS technology and provides an ideal solution to computer users and system administrators who are not always...

    Provided By Babcock University

  • White Papers // Nov 2011

    Cloud Computing Security Issues and Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages...

    Provided By Babcock University