Cyber Security Research Papers/Topics

SOCIAL NETWORKING SITES

INTRODUCTION2 DEFINITION OF TERMS:2 LITERATURE REVIEW:3 SCOPE OF WORK:3 OVERVIEW:3 USAGE OF SOCIAL NETWORKING SITES3 EFFECT OF SOCIAL MEDIA ADDICTION (LOSS OF INTEREST IN OTHER ACTIVITIES)4 IMPACT OF SOCIAL MEDIA ADDICTION:4 IMPACT OF SOCIAL MEDIA ADDICTION ON STUDENT ACADEMIC PERFORMANCE5 IMPACT OF SOCIAL MEDIA ADDICTION ON EMPLOYEES5 METHODOLOGY5 METHODS OF DATA COLLECTION:6 ANALYSIS OF DATA:6 DISCUSSIONS AND RESULTS6 SUMMARY9 CONCLUSION9 REFERENCES:9

CPT 413: OPERATION RESEARCH

1.      Introduction to Dynamic Programming Dynamic programming is a general type of approach to problem solving, and the particular equations used must be developed to fit each situation. Therefore, a certain degree of ingenuity and insight into the general structure of dynamic programming problems is required to recognize when and how a problem can be solved by dynamic programming procedures. These abilities can best be developed by an exposure to a wide variety of dynamic programming ...

CSS 415: DISASTER RECOVERY

INTRODUCTION Disaster according to Wikipedia “A disaster is a serious disruption, occurring over a relatively short time, of the functioning of a community or a society involving widespread human, material, economic or environmental loss and impacts, which exceeds the ability of the affected community or society to cope using its own resources”. Over the years, the world has experienced different forms and dimensions of disaster, ranging from natural to man-made incidents. In effect, ther...

Introduction to Big Data Analysis

INTRODUCTION Big data is a word used for detailed information of massive amounts of data which are either structured, semi structured or unstructured. The data which is not able to be handled by the traditional databases and software Technologies then we divide such data as big data. The term big data is originated from the web companies who used to handle loosely structured (numerical form, figures, and transaction data etc.) or unstructured data (Email attachments, Images comments on social...

Certified Ethical Hacker Study Guide

Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1 Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering 31 Chapter 3 Gathering Network and Host Information: Scanning and Enumeration 63 Chapter 4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files 95 Chapter 5 Trojans, Backdoors, Viruses, and Worms 125 Chapter 6 Gathering Data from Networks: Sniffers 153 Chapter 7 Denial of Service and Session Hijacking 173 Chapter 8...

Certified Ethical Hacker Exam Guide

Chapter 1 Getting Started: Essential Knowledge Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker Chapter 3 Scanning and Enumeration Chapter 4 Sniffing and Evasion Chapter 5 Attacking a System Chapter 6 Web-Based Hacking: Servers and Applications Chapter 7 Wireless Network Hacking Chapter 8 Trojans and Other Attacks Chapter 9 Cryptography 101 Chapter 10 Low Tech: Social Engineering and Physical Security Chapter 11 The Pen Test: Putting It All Together Appendix A Tool, Site...

Integer Programming

Recall that we defined integer programming problems in our discussion of the Divisibility Assumption in Section 3.1. Simply stated, an integer programming problem (IP) is an LP in which some or all of the variables are required to be non-negative integers.† In this chapter (as for LPs in Chapter 3), we find that many real-life situations may be formulated as IPs. Unfortunately, we will also see that IPs are usually much harder to solve than LPs. In Section 9.1, we begin with necessary defin...

CSS 413- Security Strategies for Web Applications and Social Networks

Philosophy of the Department The departmental philosophy is in line with the national philosophy of Nigerian educational information technological aspirations, as it is in line with the establishment of universities of technology in the Country. Our philosophy is to develop high manpower needs that would meet the Nigerian ICT aspirations in such areas as business establishments, through web networking, cybercrimes and terrorism overcoming at both local and international scenes, alleviate fra...

Darknet - C vs SAST

In security testing much like other things technical there are two very contrary methods, Dynamic Application Security Testing ( DAST) and Static Application Security Testing (SAST)

NIGERIAN COMMUNICATIONS ACT, 2003

TABLE OF CONTENTS Table of contents...............................................................................................................................2 Part I .................................................................................................................................................3 General Provision .............................................................................................................................3 Part II General Mandates on Disast...

Ethical Hacking and Countermeasures

Hacking means to attack systems, networks and applications by exploiting their weaknesses, in order to gain unauthorized access to data and systems. • What are the goals of hacking? • Ethical hacking is the use of hacking knowledge, skills tools and techniques to demonstrate the true exploitable vulnerabilities of a system for the purpose of better securing it. 

INVESTIGATING COMPUTER-RELATED CRIME A HANDBOOK FOR CORPORATE INVESTIGATORS

The introduction of the IBM Personal Computer in 1982 fostered a technology revolution that has changed the way the world does business. Prior to that historic milestone, several personal computers existed, e.g., Apple, TRS 80, but they were primarily used by individuals, schools, and small businesses. When computer mainframe giant, International Business Machines (IBM) entered the personal computer market in 1982, the event quickly captured the attention of corporations and government agenci...

Introduction to Linear Programming.

What is Linear Programming? A typical optimization problem is to find the best element from a given set. In order to compare elements, we need a criterion, which we call an objective function f(x). The given set is called the feasible set which is usually defined by {x ∈ Rn | gi (x) ≤ 0, i = 1, . . . , m}.

Linear Programming

One of the major applications of linear algebra involving systems of linear equations is in finding the maximum or minimum of some quantity, such as profit or cost. In mathematics the process of finding an extreme value (maximum or minimum) of a quantity (normally called a function) is known as optimization . Linear programming (LP) is a branch of Mathematics which deals with modeling a decision problem and subsequently solving it by mathematical techniques. The problem is presented in a form...

Research Problem

Cloud computing, grid computing, digital forensic, bring your own devices, biometrics technology, internet of things, data mining, data science, big data analytics, software engineering, social networking, smart grid, bioinformatics, intrusion detection, human factor in information security and so on.


16 - 30 Of 36 Results