Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The buying and selling of goods and services over the Internet known as "electronic marketing system" enhance the traditional way of conducting business by presenting a whole new line of business. This paper presents a significant impact... more
The buying and selling of goods and services over the Internet known as "electronic marketing system" enhance the traditional way of conducting business by presenting a whole new line of business. This paper presents a significant impact of electronic marketing system in the today's global business environment. The paper state the major relevance of electronic market to the marketplaces such as reduction in the cost, time and stress of searching, that buyers must undergoes before obtaining information about the price of commodities available in the market.
Research Interests:
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is... more
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to access a device on particular LAN because of the nature of the resources on that device, hence in such scenario ACL is a good choice when looking for the appropriate tool to control the device access. In this paper we have designed a model of a corporate network with 3 Local Area Networks (LANs), and packets traverse the devices on the LANs). After applying the correct ACL configurations on the LAN 2 Router access is restricted on LAN 2 server, which now only receives packets from an authorized device, this greatly enhances the security of the LAN.
In the early years of human civilization education was once acquired one-on-one basis, which requires direct interaction between the teacher and the student, and requires a lot of effort from the student to acquire a small amount of... more
In the early years of human civilization education was once acquired one-on-one basis, which requires direct interaction between the teacher and the student, and requires a lot of effort from the student to acquire a small amount of information and henceforth be informed with a little impact. Additionally, during that time there were no enough aiding materials to help in acquiring knowledge like the ones available today. The afore-mentioned reasons make it very hard for individuals to acquire enough knowledge that will facilitate their contribution to the advancement of their societies and the humanity in general. Gradually through the years it started getting easier to assimilate knowledge and as a result formal schools were established, which paves the ground for today's modern educational system. Today, emergence of new technologies is trying to reshape the way education was long been acquired through the centuries and understanding the ways technology has helped with education and the actual impact it made on education will help us see how crucial technology has become in the modern world education. These new and emerging technologies challenge the long-established practice of teaching and learning, and the way education is managed. To fully understand the impact of technology on education we need to look at it from the perspectives of both teachers and students. Aim of the study: The aim of the study is to state the evolving technologies used in education today and their impacts. Methodology: The technique used in this study is analysis of secondary data from related research works and findings from the analyzed data. Findings: The finding of this work is that technology inevitably has a huge impact on the way knowledge is being transferred today, and if the right methodologies are employed a lot can be achieved.
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is... more
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to access a device on particular LAN because of the nature of the resources on that device, hence in such scenario ACL is a good choice when looking for the appropriate tool to control the device access. In this paper we have designed a model of a corporate network with 3 Local Area Networks (LANs), and packets traverse the devices on the LANs). After applying the correct ACL configurations on the LAN 2 Router access is restricted on LAN 2 server, which now only receives packets from an authorized device, this greatly enhances the security of the LAN.
—One of the essential elements of every organization is information. In the field of Computer Science information is relevant in every aspect, be it in developing a software, organization of data warehouse, sorting, searching etc. Given... more
—One of the essential elements of every organization is information. In the field of Computer Science information is relevant in every aspect, be it in developing a software, organization of data warehouse, sorting, searching etc. Given the important of information, securing is particularly relevant and should be given a high priority. Most of this company, school, banks to mention but few contain sensible information which when tempered can cause a serious damage to the organization. This paper aims to describe a type of information attack or theft called Salami fraud or simply a Salami attack. In a nutshell, Salami attack occurs when a small piece of information is acquired from various sources in such a way that the victims whose information ware acquired from didn't notice. So many researches were carried out till date to solve the issue of Salami attack nevertheless all of them seem to be very unrealistic. Salami attack is correspondingly called Penny Splinter, Not Observed Stealing (NOS) or Very Precarious When Originate Stealing (VPWOS). The remedy for this kind of attack is achieved by striking the thought of ethical hacking on to Salami stealing to perceive and also precise the stealing of Profound Evidence at prior phases.
Research Interests:
—At present, Internet is predominantly the most important medium of communication used across the Globe, be it individuals, corporate organizations and governments. Almost all businesses and organizations have gone virtual; and this... more
—At present, Internet is predominantly the most important medium of communication used across the Globe, be it individuals, corporate organizations and governments. Almost all businesses and organizations have gone virtual; and this constitute for vast growth of the Internet. Through the Internet, organizations (such as banks) can manage their day to day activities (transactions specifically), but with expansion of Internet, the amount of attacks on the Internet has also increased exponentially. Basically, the commercial nature of the Internet is causing increased vulnerability in network infrastructures which further enhances cybercrimes and the amount of DOS (denial of service) attacks on the Internet has immensely increased over the past few years. Devices on networks such as network servers, switches and routers are by large the victims of these DoS attack. In this paper we will put on view the techniques of DoS and their countermeasures.
Research Interests: