Learn More
Smart Home technology started for more than a decade to introduce the concept of networking devices and equipment in the house. According to the Smart Homes Association the best definition of smart home technology is: the integration of technology and services through home networking for a better quality of living. Many tools that are used in computer(More)
Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Effective management(More)
In Symmetric encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While is Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret,(More)
Small and medium enterprises (SMEs) is leaning more on their information technology (IT) infrastructure but they lack the means to secure it appropriately due to financial restrictions, limited resources, and adequate know-how. Many SME managers believe that IT security in their company is basically equivalent to having a firewall and updating the antivirus(More)
Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and(More)
Critical Infrastructures are so vital that a damage or breakage of it will greatly affect the society and economy. SCADA systems play a big role on Critical Infrastructure since most of these infrastructures are controlled systems. Presented in this paper are the vulnerabilities of a SCADA system, its effect to the society and the ways to prevent such(More)