Edith Cowan University

Displaying 1-40 of 56 results

  • White Papers // May 2013

    The Malware Analysis Body of Knowledge (MABOK)

    The ability to forensically analyze malicious software (malware) is becoming an increasingly important discipline in the field of Digital Forensics. This is because malware is becoming stealthier, targeted, profit driven, managed by criminal organizations, harder to detect and much harder to analyze. Malware analysis requires a considerable skill set to...

    Provided By Edith Cowan University

  • White Papers // May 2013

    Malware Forensics: Discovery of the Intent of Deception

    Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    A Preliminary Investigation of Distributed and Cooperative User Authentication

    Smartphones and other highly mobile yet sophisticated technologies are rapidly spreading through society and increasingly finding their way into pockets and handbags. As reliance upon these intensifies and familiarity grows, human nature dictates that more and more personal details and information is now to be found upon such devices. The...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    A Longitudinal Study of Wi-Fi Access Point Security in the Perth Central Business District

    This paper collected data in 2008 and 2011 in relation to the level of apparent security of wireless network access points in the Perth CBD. It also compared this data to a comparable study conducted in 2004. The aim was to determine whether businesses were using an appropriate level of...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Are Existing Security Models Suitable for Teleworking?

    The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Modelling Misuse Cases as a Means of Capturing Security Requirements

    Use cases as part of requirements engineering are often seen as an essential part of systems development in many methodologies. Given that modern, security-oriented software development methods such as SDL, SQUARE and CLASP place security at the forefront of product initiation, design and implementation, the focus of requirements elicitation must...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Security Aspects of Sensor-Based Defence Systems

    The Australian Defence Force (ADF) has IMAP and JMAP to perform planning prior to the deployment of forces, but there is a knowledge gap for on-ground forces during the execution of an operation. Multi-agent based sensor systems can provide on-ground forces with a significant amount of real-time information that can...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Penetration of Zigbee-Based Wireless Sensor Networks

    Wireless Sensor Networks are becoming popular as a simple means of collecting data by public utilities, motor vehicle manufacturers and other organisations. Unfortunately the devices on such networks are often insecure by default, which presents problems in terms of the integrity of the data provided across those networks. This paper...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    A Proposal for Utilising Active Jamming for the Defence of RFID Systems Against Attack

    With a range of documented attacks against RFID systems a majority of the current literature is focused on the encryption of the communication. This paper addresses such attacks by proposing alternative means of protection through utilising some of the same methods that may be used to attack these systems. The...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    An Investigation Into Darknets and the Content Available Via Anonymous Peer-to-Peer File Sharing

    Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouse click away. However, can Darknets really be easily accessed, and do they provide access to material that...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Insecurity by Obscurity Continues: Are ADSL Router Manuals Putting End-Users at Risk

    The quantity and sophistication of threats targeting ADSL routers is on a steady increase. There is a reliance on end-users to ensure that their ADSL router is secure by continually updating the firmware, using strong authentication credentials, and enabling the in-built firewall. However, to do this, the end-user must be...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Security Risk Management in the Asia Pacific Region: What Are Security Professional Using?

    The Asia PACific (APAC) region encompasses a heterogeneous group of nation-states. Like the APAC region, the security industry operates within a diverse and multi-disciplined knowledge base, with risk management being a fundamental knowledge domain within security. Nevertheless, there has been limited understanding of what security professionals use when applying security...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Programmable Logic Controller Based Fibre Bragg Grating In-Ground Intrusion Detection System

    In this paper, the authors present an in-ground intrusion detection system for security applications. Here, an optical fibre pressure switch is directly connected to a standard digital input of a Programmable Logic Controller (PLC). This is achieved using an intensiometric detection system, where a laser diode and Fibre Bragg Grating...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    Empowering Protest Through Social Media

    Advances in personal communications devices including smartphones, are enabling individuals to establish and form virtual communities in cyberspace. Such platforms now allow users to be in continuous contact, enabling them to receive information in real time, which allows them to act in support of other members of their network. This...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    A Comparative Analysis of the Security of Internet Banking in Australia: A Customer Perspective

    Internet has its own inherent security issues in terms of confidentiality, integrity and privacy. The main impact of these kinds of issues is specifically on the banking industry as they have increased their Internet banking facilities in order to reduce costs and provide better services and banking convenience to their...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    A Threat to Cyber Resilience: A Malware Rebirthing Botnet

    This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures that will avoid detection by...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    Geointelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering

    The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information about their day-to-day lives than ever before. In this environment a large amount of personal data is disclosed in a public forum with little to no regard for the...

    Provided By Edith Cowan University

  • White Papers // Jul 2011

    Implementing System Dynamics Models in Java

    For a research project into the value of serious games - games that teach and educate - in software engineering and project management education, a game called Simsoft was developed. Two keys parts of Simsoft were the system dynamics engine that captured the fundamental causal relationships of the software project...

    Provided By Edith Cowan University

  • White Papers // Mar 2011

    Preventing the Acquisition of Data From Virtual Machine Based Secure Portable Execution Environments

    A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure environment that can be loaded into a host PC and an application executed with a degree of confidence that the application is separated, protected and little or no forensic evidence remains after the application has...

    Provided By Edith Cowan University

  • White Papers // Mar 2011

    A Wimax Solution for Real-Time Video Surveillance in Public Transport

    Video surveillance is a highly useful tool to the public transport authorities, which is now widely used as a measure to ensure passenger safety and security. While video surveillance application in static environments like airports, shopping malls, train stations has been a huge success, real-time video surveillance in moving public...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns

    The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    The Use of Governance to Identify Cyber Threats Through Social Media

    Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Making Information Security Acceptable to the User

    The security of information that is processed and stored in Information and Communications Technology systems is an ongoing problem that, as yet, has not been satisfactorily resolved. Software developers, system architects and managers all aspire to use technology to provide improvements in the protection of information that is processed and...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Tracing VNC and RDP Protocol Artefacts on Windows Mobile and Windows Smartphone for Forensic Purpose

    Remote access is the means of acquiring access to a computer or network remotely or from distance. It is typically achieved through the internet which connects people, corporate offices and telecommuters to the internal network of organizations or individuals. In recent years there has been a greater adoption of remote...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Magneto-Optical Visualisation for High-Resolution Forensic Data Recovery Using Advanced Thin Film Nano-Materials

    The authors develop and characterise new high-performance nano-engineered magneto-optic materials for use in laser-microscopy-based magnetic field visualisers featuring high sensitivity and resolution, low cost and small size. This type of visualisers will make it possible for forensic experts to recover erased data previously stored in high- and ultrahigh-density magnetic disks...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Developing Robust VoIP Router Honeypots Using Device Fingerprints

    As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventional switched wire telephone devices, these systems rely on the Internet connectivity for the transmission of voice conversations. This paper is an outline of ongoing preliminary research into malfeasant VoIP activity on the Internet....

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Is Cyber Resilience in Medical Practice Security Achievable?

    Australia is moving to a national e-health system with a high level of interconnectedness. The scenario for recovery of such a system, particularly once it is heavily relied upon, may be complex. Primary care medical practices are a fundamental part of the new e-health environment yet function as separate business...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Small Business - A Cyber Resilience Vulnerability

    Small business in Australia comprise 95% of businesses. As a group this means that they contain increasing volumes of personal and business data. This creates escalating vulnerabilities as information is aggregated by various agencies. These vulnerabilities include identity theft and fraud. The threat environment of small business is extensive with...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Which Organisational Model Meets Best Practice Criterion for Critical Infrastructure Providers: An Examination of the Australian Perspective Based on Case Studies

    While it is recognised that there must be segregation between corporate and process control networks in order to achieve a higher level of security, there is evidence that this is not occurring. Computer and network vulnerability assessments were carried out on three Australian critical infrastructure providers to determine their level...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Threat Modelling With Stride and UML

    Threat modelling as part of risk analysis is seen as an essential part of secure systems development. Microsoft's Security Development Lifecycle (SDL) is a well-known software development method that places security at the forefront of product initiation, design and implementation. As part of SDL, threat modelling produces Data Flow Diagrams...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    An Information Security Governance Framework for Australian Primary Care Health Providers

    The competitive nature of business and society means that the protection of information, and governance of the information security function, is increasingly important. This paper introduces the notion of a governance framework for information security for health providers. It refines the idea of an IT Balanced Scorecard into a scorecard...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Security Information Supplied by Australian Internet Service Providers

    Results from previous studies indicate that numerous Internet Service Providers within Australia either have inadequately trained staff, or refuse to provide security support to end-users. This paper examines the security information supplied by Internet Service Providers on their website. Specifically content relating to securing; a wireless network, an ADSL router,...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Yet Another Symbian Vulnerability Update

    The more the mobile devices are approaching to advance their security, the numbers of vulnerabilities are also becoming more astonishing. The number of mobile phones including smart phones is rising vertically, and so has the amount of malware activity. This paper documents the latest threats in Symbian mobile industry and...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    A Comparison of Laboratory and Vulnerability Evaluation Methods for the Testing Security Equipment

    A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    International Relations and Cyber Attacks: Official and Unofficial Discourse

    The potential for cyberwarfare is vast and is of concern to all nations, and national security defence. It appears that many countries are actively trying to protect their computer networks, whilst looking for ways that might bring down the networks of other countries, although this is not officially acknowledged. Bringing...

    Provided By Edith Cowan University

  • White Papers // Sep 2010

    Android Forensics: Simplifying Cell Phone Examinations

    It is hardly appropriate to call the devices many use to receive the occasional phone call a telephone any more. The capability of these devices is growing, as is the number of people utilizing them. This paper was initially written during the fall of 2009 and since that time, several...

    Provided By Edith Cowan University

  • White Papers // Feb 2010

    Cyber Influence

    This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counter-influence in...

    Provided By Edith Cowan University

  • White Papers // Feb 2010

    When You Can't See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks

    The increasing convergence of corporate and control systems networks creates new challenges for the security of critical infrastructure. There is no argument that whilst this connection of what was traditionally an isolated network, to a usually internet enabled corporate network, is unavoidable, segregation must be maintained. One such challenge presented...

    Provided By Edith Cowan University

  • White Papers // Nov 2009

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying...

    Provided By Edith Cowan University

  • White Papers // Oct 2009

    Minimizing Loss At Times Of Financial Crisis: Quantile Regression As A Tool For Portfolio Investment Decisions

    The worldwide impact of the Global Financial Crisis on stock markets, investors and fund managers has lead to a renewed interest in tools for robust risk management. Quantile regression is a suitable candidate and deserves the interest of financial decision makers given its remarkable capabilities for capturing and explaining the...

    Provided By Edith Cowan University

  • White Papers // Oct 2009

    Minimizing Loss At Times Of Financial Crisis: Quantile Regression As A Tool For Portfolio Investment Decisions

    The worldwide impact of the Global Financial Crisis on stock markets, investors and fund managers has lead to a renewed interest in tools for robust risk management. Quantile regression is a suitable candidate and deserves the interest of financial decision makers given its remarkable capabilities for capturing and explaining the...

    Provided By Edith Cowan University

  • White Papers // Mar 2011

    Preventing the Acquisition of Data From Virtual Machine Based Secure Portable Execution Environments

    A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure environment that can be loaded into a host PC and an application executed with a degree of confidence that the application is separated, protected and little or no forensic evidence remains after the application has...

    Provided By Edith Cowan University

  • White Papers // May 2008

    Portfolio Investment Modeling Using High Frequency Data

    In this paper the contribution and advantages of utilizing high frequency data for optimal portfolio selection purposes are investigated via the application of three different risk measures: Variance, VaR and CVaR in a portfolio selection risk-return framework. A new computational method for the calculation of VaR with smaller dimensions and...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns

    The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    The Use of Governance to Identify Cyber Threats Through Social Media

    Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Making Information Security Acceptable to the User

    The security of information that is processed and stored in Information and Communications Technology systems is an ongoing problem that, as yet, has not been satisfactorily resolved. Software developers, system architects and managers all aspire to use technology to provide improvements in the protection of information that is processed and...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Tracing VNC and RDP Protocol Artefacts on Windows Mobile and Windows Smartphone for Forensic Purpose

    Remote access is the means of acquiring access to a computer or network remotely or from distance. It is typically achieved through the internet which connects people, corporate offices and telecommuters to the internal network of organizations or individuals. In recent years there has been a greater adoption of remote...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Magneto-Optical Visualisation for High-Resolution Forensic Data Recovery Using Advanced Thin Film Nano-Materials

    The authors develop and characterise new high-performance nano-engineered magneto-optic materials for use in laser-microscopy-based magnetic field visualisers featuring high sensitivity and resolution, low cost and small size. This type of visualisers will make it possible for forensic experts to recover erased data previously stored in high- and ultrahigh-density magnetic disks...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Developing Robust VoIP Router Honeypots Using Device Fingerprints

    As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventional switched wire telephone devices, these systems rely on the Internet connectivity for the transmission of voice conversations. This paper is an outline of ongoing preliminary research into malfeasant VoIP activity on the Internet....

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Is Cyber Resilience in Medical Practice Security Achievable?

    Australia is moving to a national e-health system with a high level of interconnectedness. The scenario for recovery of such a system, particularly once it is heavily relied upon, may be complex. Primary care medical practices are a fundamental part of the new e-health environment yet function as separate business...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    Empowering Protest Through Social Media

    Advances in personal communications devices including smartphones, are enabling individuals to establish and form virtual communities in cyberspace. Such platforms now allow users to be in continuous contact, enabling them to receive information in real time, which allows them to act in support of other members of their network. This...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    A Comparative Analysis of the Security of Internet Banking in Australia: A Customer Perspective

    Internet has its own inherent security issues in terms of confidentiality, integrity and privacy. The main impact of these kinds of issues is specifically on the banking industry as they have increased their Internet banking facilities in order to reduce costs and provide better services and banking convenience to their...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Programmable Logic Controller Based Fibre Bragg Grating In-Ground Intrusion Detection System

    In this paper, the authors present an in-ground intrusion detection system for security applications. Here, an optical fibre pressure switch is directly connected to a standard digital input of a Programmable Logic Controller (PLC). This is achieved using an intensiometric detection system, where a laser diode and Fibre Bragg Grating...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Security Risk Management in the Asia Pacific Region: What Are Security Professional Using?

    The Asia PACific (APAC) region encompasses a heterogeneous group of nation-states. Like the APAC region, the security industry operates within a diverse and multi-disciplined knowledge base, with risk management being a fundamental knowledge domain within security. Nevertheless, there has been limited understanding of what security professionals use when applying security...

    Provided By Edith Cowan University

  • White Papers // Feb 2010

    Cyber Influence

    This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counter-influence in...

    Provided By Edith Cowan University

  • White Papers // Feb 2010

    When You Can't See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks

    The increasing convergence of corporate and control systems networks creates new challenges for the security of critical infrastructure. There is no argument that whilst this connection of what was traditionally an isolated network, to a usually internet enabled corporate network, is unavoidable, segregation must be maintained. One such challenge presented...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    Penetration of Zigbee-Based Wireless Sensor Networks

    Wireless Sensor Networks are becoming popular as a simple means of collecting data by public utilities, motor vehicle manufacturers and other organisations. Unfortunately the devices on such networks are often insecure by default, which presents problems in terms of the integrity of the data provided across those networks. This paper...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    A Comparison of Laboratory and Vulnerability Evaluation Methods for the Testing Security Equipment

    A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    A Proposal for Utilising Active Jamming for the Defence of RFID Systems Against Attack

    With a range of documented attacks against RFID systems a majority of the current literature is focused on the encryption of the communication. This paper addresses such attacks by proposing alternative means of protection through utilising some of the same methods that may be used to attack these systems. The...

    Provided By Edith Cowan University

  • White Papers // Dec 2011

    A Preliminary Investigation of Distributed and Cooperative User Authentication

    Smartphones and other highly mobile yet sophisticated technologies are rapidly spreading through society and increasingly finding their way into pockets and handbags. As reliance upon these intensifies and familiarity grows, human nature dictates that more and more personal details and information is now to be found upon such devices. The...

    Provided By Edith Cowan University

  • White Papers // Nov 2008

    Dealing With the Malicious Insider

    This paper looks at a number of issues relating to the malicious insider and the nature of motivation, loyalty and the type of attacks that occur. The paper also examines the changing environmental, social, cultural and business issues that have resulted in an increased exposure to the insider threat. The...

    Provided By Edith Cowan University

  • White Papers // Nov 2008

    Can Intrusion Detection Implementation Be Adapted to End-User Capabilities?

    In an environment where technical solutions for securing networked systems are commonplace, there still exist problems in implementation of such solutions for home and small business users. One component of this protection is the use of intrusion detection systems. Intrusion detection monitors network traffic for suspicious activity, performs access blocking...

    Provided By Edith Cowan University

  • White Papers // Dec 2008

    Data Recovery From PalmmsgV001

    Both SMS and MMS data analysis is an important factor in mobile forensic analysis. Author did not find any mobile forensic tool that is capable of extracting Short Messages (SMS) and Multimedia Messages (MMS) from Palm Treo 750. SMS file of Palm Treo 750 is called PalmMgeV001 and it is...

    Provided By Edith Cowan University

  • White Papers // Jul 2009

    An Anomaly-Based Intrusion Detection Architecture to Secure Wireless Networks

    Ensuring that the appropriate level of security is available in wireless networks is absolutely essential. To aid in the defense and detection of potential threats, WLANs should employ security solutions that include an anomaly-based intrusion detection system (ADS) that identify wireless network intrusions by gathering and analyzing the data that...

    Provided By Edith Cowan University

  • White Papers // Sep 2010

    Android Forensics: Simplifying Cell Phone Examinations

    It is hardly appropriate to call the devices many use to receive the occasional phone call a telephone any more. The capability of these devices is growing, as is the number of people utilizing them. This paper was initially written during the fall of 2009 and since that time, several...

    Provided By Edith Cowan University

  • White Papers // Mar 2011

    A Wimax Solution for Real-Time Video Surveillance in Public Transport

    Video surveillance is a highly useful tool to the public transport authorities, which is now widely used as a measure to ensure passenger safety and security. While video surveillance application in static environments like airports, shopping malls, train stations has been a huge success, real-time video surveillance in moving public...

    Provided By Edith Cowan University

  • White Papers // May 2008

    Teaching Strategies in Large Class Programming Courses

    Teaching programming in higher education has been recognised as extremely challenging for quite some time. The literature attributes the difficulty of learning programming to the development of programming-specific mental models and processes, rather than the memorisation of syntax. This paper explores the core challenges faced by educators teaching programming courses...

    Provided By Edith Cowan University

  • White Papers // May 2008

    Assessment Practice for Mixed Mode Delivery of Web Programming Topics: Increasing Learning and Reducing Cheating

    This paper examines the delivery of web programming courses in a mixed mode format for both in-class and online students. The paper focuses on the development of real-world assessments which require students to analyze non-trivial and non-generic programming problems and deliver authentic coded solutions. Such practice can increase student satisfaction...

    Provided By Edith Cowan University

  • White Papers // Aug 2009

    CVaR And Credit Risk Measurement

    The link between credit risk and the current financial crisis accentuates the importance of measuring and predicting extreme credit risk. Conditional Value at Risk (CVaR) has become an increasingly popular method for measuring extreme market risk. The authors apply these CVaR techniques to the measurement of credit risk and compare...

    Provided By Edith Cowan University

  • White Papers // Sep 2009

    Member Investment Choice Response To The Global Financial Crisis

    In describing the response of a large sample of superannuation fund members to the Global Financial Crisis (GFC), two distinct stories emerge. The first is of the overwhelming majority of members who did not change their superannuation investment strategy in response to the GFC. Despite having the opportunity to change...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Small Business - A Cyber Resilience Vulnerability

    Small business in Australia comprise 95% of businesses. As a group this means that they contain increasing volumes of personal and business data. This creates escalating vulnerabilities as information is aggregated by various agencies. These vulnerabilities include identity theft and fraud. The threat environment of small business is extensive with...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Which Organisational Model Meets Best Practice Criterion for Critical Infrastructure Providers: An Examination of the Australian Perspective Based on Case Studies

    While it is recognised that there must be segregation between corporate and process control networks in order to achieve a higher level of security, there is evidence that this is not occurring. Computer and network vulnerability assessments were carried out on three Australian critical infrastructure providers to determine their level...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    International Relations and Cyber Attacks: Official and Unofficial Discourse

    The potential for cyberwarfare is vast and is of concern to all nations, and national security defence. It appears that many countries are actively trying to protect their computer networks, whilst looking for ways that might bring down the networks of other countries, although this is not officially acknowledged. Bringing...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Threat Modelling With Stride and UML

    Threat modelling as part of risk analysis is seen as an essential part of secure systems development. Microsoft's Security Development Lifecycle (SDL) is a well-known software development method that places security at the forefront of product initiation, design and implementation. As part of SDL, threat modelling produces Data Flow Diagrams...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    An Information Security Governance Framework for Australian Primary Care Health Providers

    The competitive nature of business and society means that the protection of information, and governance of the information security function, is increasingly important. This paper introduces the notion of a governance framework for information security for health providers. It refines the idea of an IT Balanced Scorecard into a scorecard...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Security Information Supplied by Australian Internet Service Providers

    Results from previous studies indicate that numerous Internet Service Providers within Australia either have inadequately trained staff, or refuse to provide security support to end-users. This paper examines the security information supplied by Internet Service Providers on their website. Specifically content relating to securing; a wireless network, an ADSL router,...

    Provided By Edith Cowan University

  • White Papers // Dec 2010

    Yet Another Symbian Vulnerability Update

    The more the mobile devices are approaching to advance their security, the numbers of vulnerabilities are also becoming more astonishing. The number of mobile phones including smart phones is rising vertically, and so has the amount of malware activity. This paper documents the latest threats in Symbian mobile industry and...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    A Threat to Cyber Resilience: A Malware Rebirthing Botnet

    This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures that will avoid detection by...

    Provided By Edith Cowan University

  • White Papers // Nov 2009

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying...

    Provided By Edith Cowan University

  • White Papers // Nov 2011

    Geointelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering

    The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information about their day-to-day lives than ever before. In this environment a large amount of personal data is disclosed in a public forum with little to no regard for the...

    Provided By Edith Cowan University