Volume 5 Number 2 December 2018

    
Systems Theory and Information Security: Foundations for a New Educational Approach

Joseph R. Laracy, Thomas Marlowe

https://doi.org/10.6025/isej/2018/5/2/35-48

Abstract Information security education has traditionally been approached with a variety of tools. Models such as Bell- LaPadula and Clark-Wilson, cryptography, and formal methods seek to design systems without certain classes of vulnerabilities. Red teaming seeks to find vulnerabilities that were missed and security software often removes the vulnerabilities. To a lesser extent, probabilistic risk assessment and game theory have also been applied... Read More


Intrusion Detection Prevention Systems and Performance Analysis via Internet Protocol Television (IPTV) using Snort Rule

Narit Hnoohom, Mahasak Ketcham

https://doi.org/10.6025/isej/2018/5/2/49-62

Abstract This paper proposed the use of the Intrusion Prevention Systems (IPS) technique to prohibit network intrusion as well as test its performance in internal attacks. The performance analysis of the network intrusion prevention system via Internet Protocol Television (IPTV) focused on the prevention of Denial of Service (DoS) attacks, which aim to destroy the host computer that is available to users. Snort... Read More


Comparitive Analysis of Applications of Identity-Based Crptosystem in IoT

Ramesh, C. H, Vasumathi, D, Venugopal Rao, K

https://doi.org/10.6025/isej/2018/5/2/63-70

Abstract Although it has been with us in some form and under different names for many years, the Internet of Things (IoT) is suddenly the thing. The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The... Read More