Search
Now showing items 11-20 of 31
Forensic analysis of office open XML spreadsheets
(Strathmore University, 2017)
Digital Forensics is the science of acquiring, preserving, analysing and presenting digital evidence from computers, digital devices and networks in a manner that is admissible in a court of law to support an investigation. ...
Mitigating security implications of bringing your own device in an enterprise environment
(Strathmore University, 2019)
The rapid growth in the bring your own device (BYOD) phenomenon, has resulted in the introduction of personal mobile devices in the Enterprise environment. The benefit derived from embracing BYOD in organisations is enhanced ...
Secure plugin for automated software updates using Public Key Infrastructure for embedded systems
(Strathmore University, 2018)
Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ...
OpenSSL vulnerabilities in mobile banking applications
(Strathmore University, 2017)
Mobile banking has taken Kenya by storm. It is an easy and convenient banking channel in your hands. It is accessible from anywhere provided you have an internet connection or connectivity to your mobile network provider. ...
A Web based information security skills assessment prototype
(Strathmore University, 2017)
Cyber-attacks are continuously evolving to a great extent faster than cyber defences. The result is an ever-increasing frequency of attacks and the probability of success over time. To ensure employees are able to avoid ...
A Platform for analyzing log files using temporal logic approach: a test case with web server logs
(Strathmore University, 2018)
Web logs are a set of recorded events between clients and web servers. Information provided by these events is valuable to computer system administrators, digital forensic investigators and system security personnel during ...
A Platform for monitoring of security and audit events: a test case with windows systems
(Strathmore University, 2017)
The rise in cyber attacks against organisations and government agencies has created a need for improving security and monitoring of Information Technology assets. Analysis and monitoring of security events are one of the ...
Access controls on IP based cameras in IoT ecosystem
(Strathmore University, 2019)
Internet of things (IoT) is a concept of connected things that allows embedded devices, sensors and actuators to interconnect and share data thus bridging the gap between physical devices and virtual objects. The concept ...
A Collaborative tool to prevent fraudulent usage of financial cards
(Strathmore University, 2018)
Technology usage has advanced a great deal in banking and telecommunication sectors. With the continuous improving infrastructures in information technology, new technological dimensions have been opened up to ease processes ...
Securing a "Bring Your Own Application" cloud environment using digital forensics
(Strathmore University, 2018)
The use of cloud applications introduces new challenges to information systems Security. The idea of applications accessible from multiple devices and hosted or provided by third party organizations brings new complications ...