Now showing items 1-6 of 6

  • A Client based email phishing detection algorithm: case of phishing attacks in the banking industry 

    Oroko, Edwin Orina (Strathmore University, 2017)
    Today, the banking sector has been a target for many phishing attackers. The use of email as an electronic means of communication during working hours and mostly for official purposes has made it a lucrative attack vector. ...
  • Forensic analysis of office open XML spreadsheets 

    Godiah, David Odhiambo (Strathmore University, 2017)
    Digital Forensics is the science of acquiring, preserving, analysing and presenting digital evidence from computers, digital devices and networks in a manner that is admissible in a court of law to support an investigation. ...
  • Maintaining a bitcoin address repository through focused web crawling 

    Macharia, Caroline Wanjira (Strathmore University, 2017)
    There has been an increase in the use of cryptocurrencies such as Bitcoin (BTC). Bitcoin allow for cross-border payments, for large and small items at little or no transaction fee. It is a groundbreaking technology that ...
  • OpenSSL vulnerabilities in mobile banking applications 

    Muriuki, Paul William (Strathmore University, 2017)
    Mobile banking has taken Kenya by storm. It is an easy and convenient banking channel in your hands. It is accessible from anywhere provided you have an internet connection or connectivity to your mobile network provider. ...
  • A Platform for monitoring of security and audit events: a test case with windows systems 

    Kimathi, Collins Chandi (Strathmore University, 2017)
    The rise in cyber attacks against organisations and government agencies has created a need for improving security and monitoring of Information Technology assets. Analysis and monitoring of security events are one of the ...
  • A Web based information security skills assessment prototype 

    Nkonge, Regina Kagwiria (Strathmore University, 2017)
    Cyber-attacks are continuously evolving to a great extent faster than cyber defences. The result is an ever-increasing frequency of attacks and the probability of success over time. To ensure employees are able to avoid ...