Arnold Mashud - Academia.edu (original) (raw)

Papers by Arnold Mashud

Research paper thumbnail of Some Cyber Security Hygienic Protocols For Teleworkers In Covid-19 Pandemic Period And Beyond

International Journal of Scientific & Engineering Research (IJSER), 2020

The emergence of Corona Virus Disease (COVID-19) has threaten individuals, organisations and Gove... more The emergence of Corona Virus Disease (COVID-19) has threaten individuals, organisations and Government Agencies across the world and grounded almost everything to a halt. COVID-19 continues to spread rapidly asymmetrically around the world after it was first observed in Wuhan, China. Economies are crashing and businesses are at the verge of collapse. Individuals or employees are working from home in the form of teleworking others too have stopped working. Despite this challenge caused by this pandemic, Cyber Criminals (Social Engineers) are targeting unsuspecting individuals and organisations to gain access to their sensitive information through the activities of Social Engineering. In this paper, we present hygienic protocols that can help address the dangers of cybercrimes in the era of COVID-19. The education protocol, training protocol and policy protocols are outlined. The paper also revealed some defects that needs to be addressed when using VPN and desktop sharing. Our paper also reviewed the NIST standards on Teleworking and the Information Technology Lab (ITL, 2020) guidelines.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancing Social Media Experience through Voice over Internet Protocol (VOIP) Using Asterisk and PHP

International Journal of Information Technology (IJIT), 2020

The demands of people for Information Technology related services are very high and this needs to... more The demands of people for Information Technology related services are very high and this needs to be catered for. In view of this, Our solution which is in the form of a service is developed to contribute to the ever dynamism of the social networking sector of Information Technology. The solution was developed by adopting the Agile methodology. This methodology is customer centered and considers the continual inputs of the customer as a vital key in streamlining the process to produce a better product/service.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Accessing Electronic Mails Without Internet Using Kannel and PHP

International Journal of Scientific & Engineering Research, 2020

One of the most widespread computer applications used for person-to-person or organization-to-org... more One of the most widespread computer applications used for person-to-person or organization-to-organization communication is the electronic mail (email or e-mail). The main objective for this study is to develop an emailing solution that is accessible without internet. Kannel works as an SMS gateway for GSM (Global System for Mobile communication) networks. Almost all GSM phones can send and receive SMS messages, so this is a way to serve many more clients than just those using a new WAP phone. The Agile Method is a particular approach to project management that is utilized in software development. This method assists teams in responding to the unpredictability of constructing software.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA

International Journal on Cryptography and Information Security (IJCIS), 2020

Cloud ERP is a new concept that has caught the attention of researchers and industry players. One... more Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Configuration Management: A comparative Analysis of  CVS and SVN

International Journal of ICT and Management , 2013

The growth of information systems is at a very fast pace in both developed and developing... more The growth of information systems is at a very fast pace in both developed and developing countries. A major driving force in the field of Information Technology is software. This software largely controls the hardware components of systems geared towards increasing productivity within an establishment. There is the need for companies and software developers to keep track of the configuration changes on their source codes. This has given rise to the need for proper configuration management in the field software engineering by developers and establishments with so much interest in their source codes. The area of software engineering responsible for controlling software evolution from a source code is configuration management (CM). Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional and physical attributes with its requirements, design and operational information throughout its life. The intent of this paper is to analyze configuration management through a comparative analysis of the Concurrent Version System (CVS) and Subversions (SVN). There has been a report of substantial advantages of SVN over CVS in terms of configuration management (CM). This paper also seeks to clarify such reports by making a comparative analysis between the two software versioning and revision control systems.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Some Cyber Security Hygienic Protocols For Teleworkers In Covid-19 Pandemic Period And Beyond

International Journal of Scientific & Engineering Research (IJSER), 2020

The emergence of Corona Virus Disease (COVID-19) has threaten individuals, organisations and Gove... more The emergence of Corona Virus Disease (COVID-19) has threaten individuals, organisations and Government Agencies across the world and grounded almost everything to a halt. COVID-19 continues to spread rapidly asymmetrically around the world after it was first observed in Wuhan, China. Economies are crashing and businesses are at the verge of collapse. Individuals or employees are working from home in the form of teleworking others too have stopped working. Despite this challenge caused by this pandemic, Cyber Criminals (Social Engineers) are targeting unsuspecting individuals and organisations to gain access to their sensitive information through the activities of Social Engineering. In this paper, we present hygienic protocols that can help address the dangers of cybercrimes in the era of COVID-19. The education protocol, training protocol and policy protocols are outlined. The paper also revealed some defects that needs to be addressed when using VPN and desktop sharing. Our paper also reviewed the NIST standards on Teleworking and the Information Technology Lab (ITL, 2020) guidelines.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancing Social Media Experience through Voice over Internet Protocol (VOIP) Using Asterisk and PHP

International Journal of Information Technology (IJIT), 2020

The demands of people for Information Technology related services are very high and this needs to... more The demands of people for Information Technology related services are very high and this needs to be catered for. In view of this, Our solution which is in the form of a service is developed to contribute to the ever dynamism of the social networking sector of Information Technology. The solution was developed by adopting the Agile methodology. This methodology is customer centered and considers the continual inputs of the customer as a vital key in streamlining the process to produce a better product/service.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Accessing Electronic Mails Without Internet Using Kannel and PHP

International Journal of Scientific & Engineering Research, 2020

One of the most widespread computer applications used for person-to-person or organization-to-org... more One of the most widespread computer applications used for person-to-person or organization-to-organization communication is the electronic mail (email or e-mail). The main objective for this study is to develop an emailing solution that is accessible without internet. Kannel works as an SMS gateway for GSM (Global System for Mobile communication) networks. Almost all GSM phones can send and receive SMS messages, so this is a way to serve many more clients than just those using a new WAP phone. The Agile Method is a particular approach to project management that is utilized in software development. This method assists teams in responding to the unpredictability of constructing software.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA

International Journal on Cryptography and Information Security (IJCIS), 2020

Cloud ERP is a new concept that has caught the attention of researchers and industry players. One... more Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Configuration Management: A comparative Analysis of  CVS and SVN

International Journal of ICT and Management , 2013

The growth of information systems is at a very fast pace in both developed and developing... more The growth of information systems is at a very fast pace in both developed and developing countries. A major driving force in the field of Information Technology is software. This software largely controls the hardware components of systems geared towards increasing productivity within an establishment. There is the need for companies and software developers to keep track of the configuration changes on their source codes. This has given rise to the need for proper configuration management in the field software engineering by developers and establishments with so much interest in their source codes. The area of software engineering responsible for controlling software evolution from a source code is configuration management (CM). Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional and physical attributes with its requirements, design and operational information throughout its life. The intent of this paper is to analyze configuration management through a comparative analysis of the Concurrent Version System (CVS) and Subversions (SVN). There has been a report of substantial advantages of SVN over CVS in terms of configuration management (CM). This paper also seeks to clarify such reports by making a comparative analysis between the two software versioning and revision control systems.

Bookmarks Related papers MentionsView impact