Videos with tag security
Results 1-5 of 5
 
17:27
17:27
17:27

Secured Architecture Strategy for Fighting Against Bots

S. A. Kouchay, A. Aljumah, Y. Ahmad. “Secured Architecture Strategy for Fighting Against Bots.” Computer Science & Telecommunications, Vol. 40 Issue 4, pp. 16-23, 2013. Available: http://0-eds.a.ebscohost.com.aupac.lib.athabascau.ca/eds/pdfviewer/pdfviewer?sid=e95f41e2-2814-4b08-8716-10884477a66c%40sessionmgr4002&vid=3&hid=4102 [September 8, 2014].

Added: 1091 days ago by Jeve

Views: 486 | Comments: 0 | Not yet rated

 
13:28
13:28
13:28

Modular Component Development and PHP Frameworks: reasons, advantages and shortcomings

PHP is the most common web language due to its broad availability and attractive price structure – it is free. Unlike small projects or scripts, most of the web applications used in a revenue-making company are predominantly written using some kind of a PHP framework. To accommodate various technological and business needs, most frameworks provide unique features and fill a specific niche. There has been numerous research done on individual products or comparison of two or three for a specific task; however, current literature leaves the question of what is the best framework unanswered. This paper applies an empirical analysis to compare six major PHP frameworks: Yii, CodeIgniter, CakePHP, Symfony, Laravel and Zend. The criteria by which frameworks are assessed include execution performance (apache benchmark), memory usage (unit testing), security and popularity (Google trends and online surveys). As a conclusion, we assign a score to each product in each category; this score is used to rank a subject and to formulate the overall outlook as to what product to use in particular situation.

Added: 1389 days ago by paulb

Views: 1367 | Comments: 0 | star star star star star 

 
12:04
12:04
12:04

TMA 4 Presentation: Social Computing Privacy and Security

Computer and human interaction has evolved and reached new levels with the advent of social networks and social computing. This paper investigates challenges with social computing, particularly technical challenges around the collection and management of data, security and privacy and mobile social computing. The number of users of social computing systems has grown exponentially and managing all the data produced by all the users presents a monumental infrastructure challenge. Social computing organizations have deployed hundreds of thousands of servers to safely store and quickly retrieve data. Privacy and security manifest themselves in many different ways, a level of confidence in the organizations handling of private data is necessary to attract users. Organizations user privacy policy set the legal limits to what and organization intends and is allowed to do with a user’s private info. Additionally an organization needs to protect the data’s confidentiality, availability and integrity from malicious hackers. Finally and organization needs to protect users from other users, mainly minor or vulnerable users from predators and bullies. Finally there is the challenge of mobile computing which introduces an extra dimension of physical space in addition to the time and content of all users data. With mobile computing users content is superimposed with time and space factors that draws a complete picture of a user’s activities and the organization now needs to handle that extra dimension in all its system design, data management, and privacy challenges.

Added: 1509 days ago by wchannaa

Views: 38269 | Comments: 0 | Not yet rated

 
11:48
11:48
11:48

Improving Network Security Analysis

Advances in information visualization are required to keep pace with the large amount of data being collected by information systems today. The study of Data Visualization is a relatively mature subject area with much research available on a broad scale. However the study of Network security analysis, and more specifically Network intrusion analysis would benefit from additional research. Also known as Security Visualization, implementing data visualization techniques to network analysis is relatively new. However Data Visualization techniques would provide a high level abstraction of the immense amount of data collected in an enterprise network. Also, since timeliness is a factor when identifying and mitigating security threats, data visualization can allow for the quick analysis of large volumes of network data. This quick analysis simply would not be possible if the raw data had to be mined an analyzed. In order to progress this area of research, a methodology was designed to support research that would identify the best way to visualize network data. This paper summarizes a task analysis methodology for identifying and experience sampling for proposing the best data visualization for Security Visualization.

Added: 2000 days ago by grahamlange

Views: 283 | Comments: 0 | Not yet rated

 
18:36
18:36
18:36

A common criteria based security requirements engineering

Mellado D., Fernández-Medinab E.,Piattini M. 2006. A common criteria based security requirements engineering process for the development of secure information systems .Computer Standards & Interfaces 29 (2007) 244–253 DOI= http://dx.doi.org/10.1016/j.csi.2006.04.002 doi:10.1016/j.csi.2006.04.002

Added: 2924 days ago by cdaniels

Views: 816 | Comments: 0 | Not yet rated