Nik Khidzir - Profile on Academia.edu (original) (raw)
Papers by Nik Khidzir
Social Science Research Network, Jan 7, 2019
Any kind of business organization or individual organization one word is very common that is info... more Any kind of business organization or individual organization one word is very common that is information. Depending on the information and its communication medium ensure the effective of business. Whereas it is very much essential to understanding Artificial Intelligence (AI) Enabled Social Engineering (SE) attacks and its security risk management approach. Under such circumstance, information is exchanged from one country to another country for various purposes. In that case, artificial intelligence enabled social engineering attack must be considered in any kind of organization. Any kind of business venture is disturbed by this kind of attacks which will be failure the business operation, whilst enabling them to concentrate on their core business activities. Social engineering is one kind of criminal activities in the information security. It has proven to be very successful way for a criminal to get inside an organization. Once social engineering got password from an employee, then snooping around the sensitive data. However social engineering are the types of attacks inherent risk and any kind of organization should be aware of its potential risks. So, it could be identify and resolved quickly. The objective of this article, therefore, conducting an Exploratory Factor Analysis (EFA) in artificial intelligence enabled social engineering attacks on various organizations. Which consequently provide knowledge of the most relevant information security risk factor. For this article distributed 300 questionnaires in education sector for the study and 110 were returned. That means the response rate is 36%. In that case, the finding of the article shows that threat and vulnerability factors in artificial intelligence enabled social engineering attacks. So, for any organization these two factors are the most for information security risk.
Social Science Research Network, 2018
Digital Forensic is the fundamental property of information system security . It plays an importa... more Digital Forensic is the fundamental property of information system security . It plays an important role to find out digital crime in the cyber world . A key aspect of digital forensic is how to collect the evidence and represent it in court for legal action. A primary concern of digital forensic evidence is to make it as a scientific evidence . So whenever verify the evidence it will give the same result . Since Forensic Science is an integrate science. Therefore medical evidence is an integral part of forensic methodical research. Using the forensic methodical research such as collecting information and present it on the courtroom. So, this is of proof technology symbolizing the knowledge of collection information by establish methodical research. For example, to make a DNA profile, going after the establish standard protocol to produce a DNA account. So, by evaluating it thousand time it is going to supply the same result. This can be a establish guide of science. Whenever we apply this guideline in the courtroom it'll called scientific Evidence . Evidence is whatever demonstrates, clarifies or shows the reality of an undeniable fact or point involved. Traditionally there's been amount of resistance to the approval of new varieties of proof that emerge because of this of changing technology. Many countries on the globe have started using digital proof including Malaysia. The amendment to Evidence Act 1950 (Amendment 2012) 90A, 90B and 90C in 1993 has provided for the admissibility of 'computer-generated documents' in both civil and criminal proceedings. However, these rapid changes of technology are having a serious effect on digital forensics to explore the Improvement of Digital forensics from various aspect, legal concern of digital crime and the way to get and analysis the digital fact based substantiation. And suggesting the digital evidence which is admissible to court that treat as scientific evidence. Due to the changing of technology we suggest digital evidence collection methodology .
Legal Protection of Intellectual Property Rights (IPR) in Bangladesh
Social Science Research Network, Dec 15, 2018
Management Policies for the Prevention Technique of Social Engineering (SoE) Attacks in the Organization
Social Science Research Network, Sep 14, 2019
Information security in an organization will continue to face SoE attacking threat given the glob... more Information security in an organization will continue to face SoE attacking threat given the global paradigm in today’s digital economy. It is the responsibility of management to address the security issues by forming appropriate security policy for the prevention technique of SoE attacks in the organization. The matter of security implementation is complex and all stakeholders must be involved to understand and commit to the hierarchical relationship of the organization’s business objectives to its security policies down to procedures. Standards and guidelines must also be considered for their in security policy for the prevention technique of SoE attacks.
Conceptual Framework of Social Engineering (SoE)Attacking Risks and Prevention Technique
Social Science Research Network, 2020
Towards The Impact of Social Engineering (SoE) Attacking Risk Factors in Higher Learning Institute
Social Science Research Network, Jan 30, 2018
In the Information security domain the theory of social engineering attacking risk factors is in ... more In the Information security domain the theory of social engineering attacking risk factors is in Social Engineering (SoE)attacks that has an impact which would be disturbed the personal productivity of higher learning institute. The dependent variable which are threat, vulnerability, digital evidence awareness factors and one independent variable that is personal disturbance factors is used in this paper. Moreover, using as an indicator in determining disturbance of personal productivity in higher learning institute. Since multiple regression by Partial least square (PLS-SEM) is use to examined the collection of data by a questionnaire which is relevant with Social Engineering (SoE) attacking risks. And the resulting point out three dependent variables significantly influences on the independent variable of personal productivity in higher learning institute. As a matter of fact, this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the Social Engineering (SoE) attacking risk factors such as threat, vulnerability, digital evidence awareness factors. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.
Probabilistic Risk Assessment in A.I Enabled SoE Attacks
In the domain of Information security risk assessment really a complex decision-making process. W... more In the domain of Information security risk assessment really a complex decision-making process. Whereas there are a lot of unclear model of software domain and the lack of associated uncertainty are two main reasons that directly affect individual decisions making regarding risk assessment for A.I enabled SoE attacks. Whence artificial enabled social engineering attacks are effectively may happening in every levels of domain. On the other hand, the risk assessment conducted on the safety requirements on artificial enabled social engineering attacks. So, the simple meaning of social engineering is to refers to the psychologically and mentality use people to give secret information in the context of information security. A strategy of self-confidence for information collection, fraud, or access to the system, is different from a traditional "con" that it is often one of the more complex fraudulent schemes. That is why in this paper we proposed theoretical framework, which can not only demonstrate its potential for the risk assessment, but it can be sensitive and effective in analyzing a critical and uncertain operational environment that can address the extreme effects of information security.
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions
Springer eBooks, 2021
PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021
This paper will be discussed critically according on the need of employers on graduates employabi... more This paper will be discussed critically according on the need of employers on graduates employability skills. The emerging of new digital technologies tremendously leads a new way
Journal of Information System and Technology Management, Jun 15, 2021
Cloud-Based Mobile-Retail Application for Textile Cyberpreneurs
Proceedings of the International Conference on High Performance Compilation, Computing and Communications, 2017
Cloud computing and mobile computing paradigms have enhanced the usage of current technology amon... more Cloud computing and mobile computing paradigms have enhanced the usage of current technology among people from various sectors to perform certain required tasks. The combination of these two paradigms have also created the existence of cloud-based mobile applications that are designed to be useful in business environments, such as to be used by textile cyberpreneurs for m-retail transaction. As cloud adoption was previously low among Malaysian entrepreneurs, the usage intention factors of related cloud technology and services should be determined for better clarification and future technology enhancements. Besides, studies on m-retail or m-shopping adoption in Malaysia were merely focused on customer's perspectives rather than retailer's perspectives. In measuring the suitability of Cloud-based M-Retail (CBMR) application with the task requirements of textile cyberpreneurs, Task-Technology Fit (TTF) model is used as the basis of this research. Results from a pilot study, through a survey of selected group of textile cyberpreneurs shows instrument's reliability and positive feedbacks to support the intention to use the technology. The future direction of the study in which to apply the instruments to a larger group of respondents is also discussed along with its potential contribution.
Information Communication Technology (ICT) services have become increasingly important in today’s... more Information Communication Technology (ICT) services have become increasingly important in today’s business environment with most private and government agencies without sufficient resources and expertise outsourcing their ICT projects to vendors. However, this strategy could invite potentially damaging information security risks (ISRs). Subsequently, a dedicated framework for information security risk management for ICT outsourcing activities needs to be in place to address and manage its related risk factors. The research focuses on managing Information Security Risks (ISRs) in ICT outsourcing projects in a Malaysian environment. The mixed research method, combining the quantitative and qualitative was employed to achieve the research objectives. 110 respondents participated in a survey while focus groups from eight organizations were interviewed. From the quantitative study, the critical information security risks in ICT outsourcing project were identified and ranked. Furthermore,...
The development of engineering graphic for furniture studio
Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Cr... more Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Creative Technology and Heritage, University Malaysia Kelantan (UMK). However, the implementation of project-oriented approach is undirected and just expect to lecturer and student initiatives without appropriate guidelines, particularly in the application of engineering processes. Workflow-based engineering is important in learning furniture making. Workflow can be driven right through the systematic and methodical process. Therefore, engineering graphics module has been designed and developed to provide guidance to students in performing the work properly and indirectly the self-directed learning through project-oriented learning approach can be implemented more better and effectively.
2018 IEEE Student Conference on Research and Development (SCOReD), 2018
There are several limitations that facing intrusion-detection system in current days, such as hig... more There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. Daily, there are reports of incidents such as major ex-filtration of data for the purposes of stealing identities. Hybrid model's approaches have been widely used to increase the effectiveness of intrusiondetection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. PSO-ELM has outperformed a basic model in the testing accuracy.
Journal of Applied & Computational Mathematics, 2018
Theory of artificial enabled social engineering attacking risk factors are employed in this study... more Theory of artificial enabled social engineering attacking risk factors are employed in this study to determine the impact that disturbed the personal productivity of higher learning institute of the user towards the AI enable SoE attacking. Five independent variable which are threat, vulnerability, valuation, countermeasure and personal disturbance factors using in this paper. Moreover using as an indicator in determining disturbance of personal productivity in an higher learning institute. Since multiple regression by using Structural Equation Modelling-Partial Least Square (SEM-PLS) is used to examine the collection of data by a questionnaire which is relevant with AI enable SE attacking risk. And the resulting point out three independent variable significantly influences the personal productivity in higher learning institute. As a matter of fact this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the AI enables SoE attacking risk factors such as threat, vulnerability, valuation and countermeasure. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
Springer eBooks, 2021
Mudahnya belajar Adobe Illustrator CS6
Building Innovative Ecosphere in Malaysia Higher Education
Solid State Technology, 2020
To creating an ecosystem of innovation in higher education institutions needs to strategic planni... more To creating an ecosystem of innovation in higher education institutions needs to strategic planning and implementation. Studies of adoption and existing practices for innovation is important in formulating strategies towards the implementation of a holistic innovation in higher education institutions at Malaysia. The study it was conducted at one of the higher education institutions in Malaysia. The study was conducted to determine the acceptability of existing practices and innovation in the educational institutions. The acceptance factors and practice of innovation was identifying based on six main areas such as; (i) Knowledge of innovation model, (ii) Acceptance of the application ecosystem of innovation in higher education institutions, (iii) Implementation challenges of innovation in higher education institutions, (iv) The characteristics of innovative human capital, (v) Teaching and learning approaches to embed innovation and, (vi) The general view of the education system. The...
Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach
PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021
The basic network security issues have changed very little over the past decade. Protecting the c... more The basic network security issues have changed very little over the past decade. Protecting the confidential institutional information, preventing unauthorized access defending the network against SoE attacks remain primary concerns of network security professional toady. Widespread remote access by the high number of increasing sophisticated SoE attacks is making network security significantly more challenging in the institute. Confidential information can reside in two states on a network. It can reside on institutional physical storage media, such as a hard drive or memory, or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for SoE attacks from users in higher leaning institute internal network, as well as those users on the internet. Given the dramatic rise in external security threats, couples with the rising cost of network intrusions. Institution are more pressured than ever to defin...
Social Science Research Network, Jan 7, 2019
Any kind of business organization or individual organization one word is very common that is info... more Any kind of business organization or individual organization one word is very common that is information. Depending on the information and its communication medium ensure the effective of business. Whereas it is very much essential to understanding Artificial Intelligence (AI) Enabled Social Engineering (SE) attacks and its security risk management approach. Under such circumstance, information is exchanged from one country to another country for various purposes. In that case, artificial intelligence enabled social engineering attack must be considered in any kind of organization. Any kind of business venture is disturbed by this kind of attacks which will be failure the business operation, whilst enabling them to concentrate on their core business activities. Social engineering is one kind of criminal activities in the information security. It has proven to be very successful way for a criminal to get inside an organization. Once social engineering got password from an employee, then snooping around the sensitive data. However social engineering are the types of attacks inherent risk and any kind of organization should be aware of its potential risks. So, it could be identify and resolved quickly. The objective of this article, therefore, conducting an Exploratory Factor Analysis (EFA) in artificial intelligence enabled social engineering attacks on various organizations. Which consequently provide knowledge of the most relevant information security risk factor. For this article distributed 300 questionnaires in education sector for the study and 110 were returned. That means the response rate is 36%. In that case, the finding of the article shows that threat and vulnerability factors in artificial intelligence enabled social engineering attacks. So, for any organization these two factors are the most for information security risk.
Social Science Research Network, 2018
Digital Forensic is the fundamental property of information system security . It plays an importa... more Digital Forensic is the fundamental property of information system security . It plays an important role to find out digital crime in the cyber world . A key aspect of digital forensic is how to collect the evidence and represent it in court for legal action. A primary concern of digital forensic evidence is to make it as a scientific evidence . So whenever verify the evidence it will give the same result . Since Forensic Science is an integrate science. Therefore medical evidence is an integral part of forensic methodical research. Using the forensic methodical research such as collecting information and present it on the courtroom. So, this is of proof technology symbolizing the knowledge of collection information by establish methodical research. For example, to make a DNA profile, going after the establish standard protocol to produce a DNA account. So, by evaluating it thousand time it is going to supply the same result. This can be a establish guide of science. Whenever we apply this guideline in the courtroom it'll called scientific Evidence . Evidence is whatever demonstrates, clarifies or shows the reality of an undeniable fact or point involved. Traditionally there's been amount of resistance to the approval of new varieties of proof that emerge because of this of changing technology. Many countries on the globe have started using digital proof including Malaysia. The amendment to Evidence Act 1950 (Amendment 2012) 90A, 90B and 90C in 1993 has provided for the admissibility of 'computer-generated documents' in both civil and criminal proceedings. However, these rapid changes of technology are having a serious effect on digital forensics to explore the Improvement of Digital forensics from various aspect, legal concern of digital crime and the way to get and analysis the digital fact based substantiation. And suggesting the digital evidence which is admissible to court that treat as scientific evidence. Due to the changing of technology we suggest digital evidence collection methodology .
Legal Protection of Intellectual Property Rights (IPR) in Bangladesh
Social Science Research Network, Dec 15, 2018
Management Policies for the Prevention Technique of Social Engineering (SoE) Attacks in the Organization
Social Science Research Network, Sep 14, 2019
Information security in an organization will continue to face SoE attacking threat given the glob... more Information security in an organization will continue to face SoE attacking threat given the global paradigm in today’s digital economy. It is the responsibility of management to address the security issues by forming appropriate security policy for the prevention technique of SoE attacks in the organization. The matter of security implementation is complex and all stakeholders must be involved to understand and commit to the hierarchical relationship of the organization’s business objectives to its security policies down to procedures. Standards and guidelines must also be considered for their in security policy for the prevention technique of SoE attacks.
Conceptual Framework of Social Engineering (SoE)Attacking Risks and Prevention Technique
Social Science Research Network, 2020
Towards The Impact of Social Engineering (SoE) Attacking Risk Factors in Higher Learning Institute
Social Science Research Network, Jan 30, 2018
In the Information security domain the theory of social engineering attacking risk factors is in ... more In the Information security domain the theory of social engineering attacking risk factors is in Social Engineering (SoE)attacks that has an impact which would be disturbed the personal productivity of higher learning institute. The dependent variable which are threat, vulnerability, digital evidence awareness factors and one independent variable that is personal disturbance factors is used in this paper. Moreover, using as an indicator in determining disturbance of personal productivity in higher learning institute. Since multiple regression by Partial least square (PLS-SEM) is use to examined the collection of data by a questionnaire which is relevant with Social Engineering (SoE) attacking risks. And the resulting point out three dependent variables significantly influences on the independent variable of personal productivity in higher learning institute. As a matter of fact, this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the Social Engineering (SoE) attacking risk factors such as threat, vulnerability, digital evidence awareness factors. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.
Probabilistic Risk Assessment in A.I Enabled SoE Attacks
In the domain of Information security risk assessment really a complex decision-making process. W... more In the domain of Information security risk assessment really a complex decision-making process. Whereas there are a lot of unclear model of software domain and the lack of associated uncertainty are two main reasons that directly affect individual decisions making regarding risk assessment for A.I enabled SoE attacks. Whence artificial enabled social engineering attacks are effectively may happening in every levels of domain. On the other hand, the risk assessment conducted on the safety requirements on artificial enabled social engineering attacks. So, the simple meaning of social engineering is to refers to the psychologically and mentality use people to give secret information in the context of information security. A strategy of self-confidence for information collection, fraud, or access to the system, is different from a traditional "con" that it is often one of the more complex fraudulent schemes. That is why in this paper we proposed theoretical framework, which can not only demonstrate its potential for the risk assessment, but it can be sensitive and effective in analyzing a critical and uncertain operational environment that can address the extreme effects of information security.
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions
Springer eBooks, 2021
PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021
This paper will be discussed critically according on the need of employers on graduates employabi... more This paper will be discussed critically according on the need of employers on graduates employability skills. The emerging of new digital technologies tremendously leads a new way
Journal of Information System and Technology Management, Jun 15, 2021
Cloud-Based Mobile-Retail Application for Textile Cyberpreneurs
Proceedings of the International Conference on High Performance Compilation, Computing and Communications, 2017
Cloud computing and mobile computing paradigms have enhanced the usage of current technology amon... more Cloud computing and mobile computing paradigms have enhanced the usage of current technology among people from various sectors to perform certain required tasks. The combination of these two paradigms have also created the existence of cloud-based mobile applications that are designed to be useful in business environments, such as to be used by textile cyberpreneurs for m-retail transaction. As cloud adoption was previously low among Malaysian entrepreneurs, the usage intention factors of related cloud technology and services should be determined for better clarification and future technology enhancements. Besides, studies on m-retail or m-shopping adoption in Malaysia were merely focused on customer's perspectives rather than retailer's perspectives. In measuring the suitability of Cloud-based M-Retail (CBMR) application with the task requirements of textile cyberpreneurs, Task-Technology Fit (TTF) model is used as the basis of this research. Results from a pilot study, through a survey of selected group of textile cyberpreneurs shows instrument's reliability and positive feedbacks to support the intention to use the technology. The future direction of the study in which to apply the instruments to a larger group of respondents is also discussed along with its potential contribution.
Information Communication Technology (ICT) services have become increasingly important in today’s... more Information Communication Technology (ICT) services have become increasingly important in today’s business environment with most private and government agencies without sufficient resources and expertise outsourcing their ICT projects to vendors. However, this strategy could invite potentially damaging information security risks (ISRs). Subsequently, a dedicated framework for information security risk management for ICT outsourcing activities needs to be in place to address and manage its related risk factors. The research focuses on managing Information Security Risks (ISRs) in ICT outsourcing projects in a Malaysian environment. The mixed research method, combining the quantitative and qualitative was employed to achieve the research objectives. 110 respondents participated in a survey while focus groups from eight organizations were interviewed. From the quantitative study, the critical information security risks in ICT outsourcing project were identified and ranked. Furthermore,...
The development of engineering graphic for furniture studio
Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Cr... more Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Creative Technology and Heritage, University Malaysia Kelantan (UMK). However, the implementation of project-oriented approach is undirected and just expect to lecturer and student initiatives without appropriate guidelines, particularly in the application of engineering processes. Workflow-based engineering is important in learning furniture making. Workflow can be driven right through the systematic and methodical process. Therefore, engineering graphics module has been designed and developed to provide guidance to students in performing the work properly and indirectly the self-directed learning through project-oriented learning approach can be implemented more better and effectively.
2018 IEEE Student Conference on Research and Development (SCOReD), 2018
There are several limitations that facing intrusion-detection system in current days, such as hig... more There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. Daily, there are reports of incidents such as major ex-filtration of data for the purposes of stealing identities. Hybrid model's approaches have been widely used to increase the effectiveness of intrusiondetection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. PSO-ELM has outperformed a basic model in the testing accuracy.
Journal of Applied & Computational Mathematics, 2018
Theory of artificial enabled social engineering attacking risk factors are employed in this study... more Theory of artificial enabled social engineering attacking risk factors are employed in this study to determine the impact that disturbed the personal productivity of higher learning institute of the user towards the AI enable SoE attacking. Five independent variable which are threat, vulnerability, valuation, countermeasure and personal disturbance factors using in this paper. Moreover using as an indicator in determining disturbance of personal productivity in an higher learning institute. Since multiple regression by using Structural Equation Modelling-Partial Least Square (SEM-PLS) is used to examine the collection of data by a questionnaire which is relevant with AI enable SE attacking risk. And the resulting point out three independent variable significantly influences the personal productivity in higher learning institute. As a matter of fact this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the AI enables SoE attacking risk factors such as threat, vulnerability, valuation and countermeasure. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
Springer eBooks, 2021
Mudahnya belajar Adobe Illustrator CS6
Building Innovative Ecosphere in Malaysia Higher Education
Solid State Technology, 2020
To creating an ecosystem of innovation in higher education institutions needs to strategic planni... more To creating an ecosystem of innovation in higher education institutions needs to strategic planning and implementation. Studies of adoption and existing practices for innovation is important in formulating strategies towards the implementation of a holistic innovation in higher education institutions at Malaysia. The study it was conducted at one of the higher education institutions in Malaysia. The study was conducted to determine the acceptability of existing practices and innovation in the educational institutions. The acceptance factors and practice of innovation was identifying based on six main areas such as; (i) Knowledge of innovation model, (ii) Acceptance of the application ecosystem of innovation in higher education institutions, (iii) Implementation challenges of innovation in higher education institutions, (iv) The characteristics of innovative human capital, (v) Teaching and learning approaches to embed innovation and, (vi) The general view of the education system. The...
Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach
PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021
The basic network security issues have changed very little over the past decade. Protecting the c... more The basic network security issues have changed very little over the past decade. Protecting the confidential institutional information, preventing unauthorized access defending the network against SoE attacks remain primary concerns of network security professional toady. Widespread remote access by the high number of increasing sophisticated SoE attacks is making network security significantly more challenging in the institute. Confidential information can reside in two states on a network. It can reside on institutional physical storage media, such as a hard drive or memory, or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for SoE attacks from users in higher leaning institute internal network, as well as those users on the internet. Given the dramatic rise in external security threats, couples with the rising cost of network intrusions. Institution are more pressured than ever to defin...