Volume 3 Number 4 December 2012

    
Balancing Distribution of Intrusion Detection Data Using Sample Selection

Ikram Chaïri, Souad Alaoui, Abdelouahid Lyhyaoui

https://doi.org/

Abstract The majority of learning systems usually assume that training sets are balanced, however, in real world data this hypothesis is not always true. The problem of between-class imbalance is a challenge that has attracted growing attention from both academia and industry, because of its critical influence on the performance of learning systems. Many solutions were proposed to resolve this problem:... Read More


Safe Algorithm for Firewall Policy Deployment

F. Bezzazi, A.Kartit, M. El Marraki, D. Aboutajdine

https://doi.org/

Abstract The problem of modern network security becomes more and more difficult, and request security methods more efficient and adapted to current circumstances. Since the firewall is one of the most used components in any network architectures, policy deployment is a very important step to move from one policy to another without presenting any flaws. For this case, researchers have proposed... Read More


Towards Minizing Human Factors in End-User Information Security

Taurayi Rupere, Mary Muhonde

https://doi.org/

Abstract Today, many hardware and software solutions are available to enhance information security, but there is limited research regarding the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of information systems. This research study therefore addresses the missing... Read More


Security Analysis of Biometric Cryptosystems: Case Study of Fuzzy Vault Approach

Maryam Lafkih, Mounia Mikram, Sanaa Ghouzli, Mohamed El Haziti, Driss Aboutajdine

https://doi.org/

Abstract Use of biometric systems is becoming an important alternative to replace traditional authentication such as password. Yet most of biometric authentication systems store original biometric features, unfortunately, without any encryption, threatening though the security and privacy of user’s identity. When biometric data is compromised, unlike a password, it cannot be changed. Therefore, the security of biometric models is essential in... Read More


An Investigation of the Information Security Strategies Implementation in Further Education and Training Colleges in Limpopo: A Case Study

Mohlabeng M.R, Mokwena S.N, Osunmakinde I.O

https://doi.org/

Abstract The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function within Higher Education Institutions. The aim of the research was to investigate the implementation of information security strategies in Further Education and Training (FET) colleges in Limpopo South Africa. The study has shown that there was lack of information security... Read More