Technology Systems
http://hdl.handle.net/10342/45
2024-03-19T07:34:37ZArtificial Intelligence based Access Management System
http://hdl.handle.net/10342/12838
Artificial Intelligence based Access Management System
Adenola, Victoria Mojisola
The foundation of cybersecurity is identity and access management (IAM). Its methods, procedures, and guidelines control identity access to digital resources and define the scope of identity permission over the resources. Every week, a new data breach or cyber threat is reported. A significant number of data breaches are caused by ineffective security features, software vulnerabilities, human error, malicious insiders, and the misappropriation of access and privileges. Artificial intelligence (AI) techniques can upgrade the access management system. As a result, research into artificial intelligence in IAM is required to enable organizations to take a more detailed and flexible approach to authentication and access control to mitigate cyber threats and other IAM challenges. This study explores the relationship between access management systems and artificial intelligence with regard to AI applications in identity and access management, specifically the monitoring, administration, and control of access privileges. The objective of this study was to provide evidence from the relevant literature to help understand how AI works in mitigating identified IAM challenges. The findings in this study demonstrate how artificial intelligence strengthens identity and access management in mitigating growing cyber threats, automating processes, and keeping up with technological advancements.
2023-04-27T00:00:00ZSafety Climate Assessment: a Survey in an Electric Power Distribution Company
http://hdl.handle.net/10342/12160
Safety Climate Assessment: a Survey in an Electric Power Distribution Company
Kiani, Moien
2022-01-01T00:00:00ZA Global Supply Network Design Model: A Resilient Management Approach
http://hdl.handle.net/10342/10751
A Global Supply Network Design Model: A Resilient Management Approach
Das, Kanchan; Annand, Adarsh; Ram, Mangey
2021-01-01T00:00:00ZEVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
http://hdl.handle.net/10342/10702
EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
Olson, Craig
While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions.
This researcher studied phishing attacks delivered over the course of one year against the University of North Carolina at Charlotte. Research questions include: What were the component characteristics of phishing attacks against the university? Which phishing attacks were successful? What possible countermeasures can be implemented to prevent such attacks? A Phishing Susceptibility Framework is proposed; the framework has two main sections – the Attacker Gambit that exhibits motivation and methodology, and the Victim Profile that reveals victim susceptibility and root weaknesses. Each section has three main elements that illustrate core components affecting the efficacy of a phishing attack. The purpose of this framework is to identify vulnerable end user segments as risk flash points for management to be aware of when safeguarding against phishing attacks. Results of the study determined attacker motivation skewed heavily toward financial gain and Business Email Compromise gift card attacks were most effective. Multivariate analysis determined Authority, Kindness and Urgency stressors all had positive correlation with compromised users and we concluded that a combination of these stressors indicated an improved efficacy of BEC gift card gambits against susceptible end users within the organization. This research contributes to the overall body of knowledge specific to phishing attacks against a higher education institution and provides valuable information for other higher education institutions which are likely to see similar attacks.
2022-04-22T00:00:00Z