Browsing by Subject "Computer security"
Now showing items 1-10 of 10
-
A Framework for Evaluation of Risk Management Models for HIPAA Compliance for Electronic Personal Health Information used by Small and Medium Businesses using Cloud Technologies
(East Carolina University, 2018-07-18)Our societal quest for collaboration and openness has always been in direct conflict with our desire to maintain our personal privacy. Those conflicting goals are more prominent than ever for healthcare, due to its rapid ... -
Artificial Intelligence-based Access Management System
(East Carolina University, 2023-04-27)The foundation of cybersecurity is identity and access management (IAM). Its methods, procedures, and guidelines control identity access to digital resources and define the scope of identity permission over the resources. ... -
DYNAMIC DEFENSES AND THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
(East Carolina University, 2019-05-02)Adversarial machine learning has been an important area of study for the securing of machine learning systems. However, for every defense that is made to protect these artificial learners, a more sophisticated attack emerges ... -
ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK
(East Carolina University, 2012)Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of human collaboration may also be used to store and distribute ... -
Genetic Algorithm Stream Cipher Key Generation Using NIST Functions
(East Carolina University, 2022-12-05)Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. However, stream ciphers are vulnerable to many attacks if they do not use strong keys for encryption and decryption. Thus, one ... -
Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System
(East Carolina University, 2011)Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ... -
Small Business Information Security
(East Carolina University, 2012)Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ... -
SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES
(East Carolina University, 2022-05-12)In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes ... -
Threat Modelling and Analysis of Web Application Attacks
(East Carolina University, 2018-12-12)There has been a rapid growth in the use of the Internet over the years with billions of businesses using it as a means of communication. The World Wide Web has served as the major tool for disseminating information which ... -
Treasure Island Security framework : A Generic Security Framework for public clouds
(East Carolina University, 2014)In this thesis we introduce a generic security framework for public clouds called Treasure Island Security framework that is designed to address the issues related to cloud computing security and specifically key-management ...