MSc.ISS Theses and Dissertations
Browse by
Collections in this community
Recent Submissions
-
A Framework to secure data transmission in wearable heart-rate monitors using Elliptic Curve Cryptography (ECC)
(Strathmore University, 2022)The wearable technology refers to biological sensors which are conveniently attached to the patient’s body to collect data about their heart rates, body temperature, oxygen levels, and physical activities. They mostly ... -
A Prototype for predicting network intrusions using Bayesian based networks
(Strathmore University, 2022)As technology advances, networks get more sophisticated. As a result, the attack surface for hackers has continued to expand leading to rapid increase in insecurity; therefore, there is need for a line of defence that is ... -
A System for reporting online child abuse and offenders
(Strathmore University, 2022)Online Child Abuse is a major public health concern that requires the combined efforts of all citizens to combat. The government, through legislation and the judiciary have the responsibility of setting up structures to ... -
Detecting zero-day attacks using Recurrent Neural Network
(Strathmore University, 2021)The development of Information and Communications Technology (ICT) and an increase in the use of mobile technology has enabled organisations to implement and adopt the use of information and management systems to conduct ... -
A Model to detect and prevent rogue DHCP attacks on wireless LAN communication
(Strathmore University, 2021)WLAN technology is a crucial component of computer networks. The use of Wi-Fi communication has grown due to the increasing population of end devices, which includes smartphones, tablets, laptops etc. This has significantly ... -
A Prototype to identify fraudulent sim card registration using Public Key infrastructure verification approach
(Strathmore University, 2021)Identifying a legitimate subscriber is important for the Mobile Network Operators during the SIM card registration and verification process. Over the years, the use of Mobile devices has grown steadily, increasing the ... -
Application for enhancing confidentiality and availability for sensitive user data using AES algorithm in smartphone devices
(Strathmore University, 2021)Today’s world has seen a rapid increase in the number of users of mobile devices. Since the first mobile launch in the last quarter of the 19th century, mobile devices have evolved from their weight cost and functionalities ... -
An Online neural network based password prediction, generation, and storage scheme
(Strathmore University, 2021)The gradual change from traditional workplaces to online platforms has been attributed to shifting user requirements, economic factors, and lifestyle differences. Perhaps the most significant factor attributed to this ... -
Application of approximate matching on industrial control system (ICS) network communication using ssdeep algorithm
(Strathmore University, 2020)Industrial Control Systems (ICSs) are significant for functioning of numerous critical infrastructures for instance power plants, water treatment facilities and gas pipelines. In spite of the fact that security of such ... -
Blockchain enabled drug traceability solution: a case of drug counterfeiting in a pharmaceutical supply chain
(Strathmore University, 2020)The pharmaceutical industry deals with manufacturing, packaging and supply of drugs to the end consumers. Being one of the major industries in Kenya, it plays a big role in the Kenyan economy as well. Most countries are ... -
Access controls on IP based cameras in IoT ecosystem
(Strathmore University, 2019)Internet of things (IoT) is a concept of connected things that allows embedded devices, sensors and actuators to interconnect and share data thus bridging the gap between physical devices and virtual objects. The concept ... -
Employee awareness on social engineering threats in the financial sector
(Strathmore University, 2019)Despite the great gains that have been achieved through use of the Internet, a lot of threats have also emanated in equal measure from its increased usage. Some of the threats are largely associated with cyber-attacks. ... -
Developing an automated malware detection, analysis and reporting tool for MS-Windows
(Strathmore University, 2019)Memory and computer forensics is a field that has witnessed a lot of advancements in the recent past. Memory forensics enables investigators acquire and investigate the content of a computer’s RAM while computer forensics ... -
A Web based tool for securing digital evidence
(Strathmore University, 2019)Digital forensics is defined as a scientific knowledge and methods applied to the identification, acquisition, preservation, examination, and analysis of information stored or transmitted in binary form in a manner acceptable ... -
LAN security vulnerability analysis framework: case of National Irrigation Board
(Strathmore University, 2019)In today’s environment, many organisation like National Irrigation Board, have adopted open policies on the utilization of LAN where users may plug in unknown devices. Without the right network frameworks, it is difficult ... -
Mitigating security implications of bringing your own device in an enterprise environment
(Strathmore University, 2019)The rapid growth in the bring your own device (BYOD) phenomenon, has resulted in the introduction of personal mobile devices in the Enterprise environment. The benefit derived from embracing BYOD in organisations is enhanced ... -
Digital content security: video streaming digital rights management system
(Strathmore University, 2018)The usability and applicability of digital videos, especially through the Internet, offers great opportunities for Kenyan content creators to further their careers as the platform enables them to share ideas which contributes ... -
Investigating keystroke dynamics as a two-factor biometric security
(Strathmore University, 2018)Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. This proposal aims at investigating user authentication approaches and how keystroke dynamics can be used to enhance user ... -
A Platform for analyzing log files using temporal logic approach: a test case with web server logs
(Strathmore University, 2018)Web logs are a set of recorded events between clients and web servers. Information provided by these events is valuable to computer system administrators, digital forensic investigators and system security personnel during ... -
Secure plugin for automated software updates using Public Key Infrastructure for embedded systems
(Strathmore University, 2018)Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ...