Wireless Network Security Threats, Vulnerabilities and Their Defences
Alex Roney Mathew,
Aayad Al Hajj
Issue:
Volume 2, Issue 1, February 2017
Pages:
1-4
Received:
30 October 2016
Accepted:
22 November 2016
Published:
3 January 2017
DOI:
10.11648/j.ajomis.20170201.11
Downloads:
Views:
Abstract: Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.
Abstract: Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) ...
Show More
Online Transaction Security Risk Management for E-commerce Web Applications
Issue:
Volume 2, Issue 1, February 2017
Pages:
5-14
Received:
31 October 2016
Accepted:
29 November 2016
Published:
3 January 2017
DOI:
10.11648/j.ajomis.20170201.12
Downloads:
Views:
Abstract: Over the past decade, e-commerce creates exciting new opportunities for business but also brings new web application vulnerabilities and transaction security risks. A stream of news of phishing attacks, website spoofing, payment card skimming (credit /debit cards), fraud in online transactions, malware attack (malicious code attack of viruses, worms, Trojans, and bots), hacker/cracker infiltration, vandalism, identity theft and data breaches of payment card or bank details are increasingly reported. Web application security risk management, therefore, is essential for secure e-commerce online transactions, including order processing, payment transaction, banking and clearing processing. Therefore, the main purpose of this study was to propose a web application security risk management methodology to perform e-commerce web application security risk management, helping organizations understand and improve their e-commerce web application security risks. In order to achieve this purpose, the goal of this study has been two-fold: (1) How will organizations measure threat likelihood, impact consequence and severity of their e-commerce web application security risk? (2) What management methodology is required to prompt the e-commerce web application security vulnerabilities measurement and improvement? Using OWASP Top Ten Vulnerabilities as target items, the proposed management methodology is disciplined in a PDCA based ISO/IEC 27005 iterative process activities, integrating Common Criteria attack potential ratings as threat likelihood scales and the FIPS 199 impact categories as impact consequence scales to categorize severity of every e-commerce web application vulnerabilities. Following the proposed management procedure, all the critical e-commerce web application vulnerabilities can be reviewed, analyzed, prioritized and remedied effectively and efficiently, moving on again in a continuous cycle.
Abstract: Over the past decade, e-commerce creates exciting new opportunities for business but also brings new web application vulnerabilities and transaction security risks. A stream of news of phishing attacks, website spoofing, payment card skimming (credit /debit cards), fraud in online transactions, malware attack (malicious code attack of viruses, worm...
Show More
Business Processes Modelling of the Karaganda Crisis Center Activity
Olga Shikulskaya,
Timur Esmagambetov
Issue:
Volume 2, Issue 1, February 2017
Pages:
15-20
Received:
31 October 2016
Accepted:
24 November 2016
Published:
5 January 2017
DOI:
10.11648/j.ajomis.20170201.13
Downloads:
Views:
Abstract: In this work the problems reducing effectiveness of activities of the situational center for liquidation of emergency situations in Kazakhstan have been revealed. For enhancement of the situational center activities the methods of the system analysis, business processes modeling, datalogical modeling, SADT technology, methodology of the balanced scorecard (BSC) are used. For the analysis purpose of the existing now business processes the model of the situational center (AS-IS) is developed, ineffective processes are revealed. For enhancement of the crisis center activities the reorganized business processes model (TO-BE) is offered by authors, the datalogical model of computer support of activities of the situational center is designed, the strategic map of actions in the conditions of emergency is developed. Theoretical developments of authors will allow to increase effectiveness of the situational center activities.
Abstract: In this work the problems reducing effectiveness of activities of the situational center for liquidation of emergency situations in Kazakhstan have been revealed. For enhancement of the situational center activities the methods of the system analysis, business processes modeling, datalogical modeling, SADT technology, methodology of the balanced sc...
Show More
Health Websites Evaluation in Saudi Arabia: A Case Study
Issue:
Volume 2, Issue 1, February 2017
Pages:
21-31
Received:
31 October 2016
Accepted:
27 December 2016
Published:
20 January 2017
DOI:
10.11648/j.ajomis.20170201.14
Downloads:
Views:
Abstract: Internet and web services are fast becoming critically important to business, industry and individuals. Where Creating online brand and community is the chief objective of web serving. They recognize that web-based systems can enhance their scale of communication as the Internet is capable of rendering large amounts of data in a speedy manner to the public. To be successful, web-based systems need to have good usability. Usability is a measure of how easy the interface is to use. In order to achieve these measurements, we need to analyze them to detect its drawbacks, and find a way to improve them. This paper aims to analyze some of the top hospitals websites in Saudi Arabia that are Dr. Sulaiman Alhabib Hospital, King Fahad Medical City, Saad Specialist Hospital, Dallah Hospital, King Faisal Specialist Hospital and Research Center & International Medical Center. The evaluation involves testing sample pages related to the selected hospitals. This study provides an overview regarding the weakness and strengths of the six Saudi hospital websites.
Abstract: Internet and web services are fast becoming critically important to business, industry and individuals. Where Creating online brand and community is the chief objective of web serving. They recognize that web-based systems can enhance their scale of communication as the Internet is capable of rendering large amounts of data in a speedy manner to th...
Show More