A study on cyber-attack for IIUM network security practices /

A cyber security assault is a continuous exploitation of laptop computer systems, technology-structured businesses and networks. Cyber protection assaults use malicious code to change coding system, good judgment or knowledge, leading to tumultuous penalties that can also compromise knowledge and en...

Full description

Saved in:
Bibliographic Details
Main Author: Alam, Mohammad Jahedul (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2018
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 042290000a22003130004500
008 181221s2018 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 0 0 |a TK5105.59 
100 1 |a Alam, Mohammad Jahedul,  |e author 
245 1 2 |a A study on cyber-attack for IIUM network security practices /  |c by Mohammad Jahedul Alam 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2018 
300 |a xv, 107 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
347 |2 rdaft  |a text file  |b PDF 
502 |a Thesis (MIT)--International Islamic University Malaysia, 2018. 
504 |a Includes bibliographical references (leaves 98-101). 
520 |a A cyber security assault is a continuous exploitation of laptop computer systems, technology-structured businesses and networks. Cyber protection assaults use malicious code to change coding system, good judgment or knowledge, leading to tumultuous penalties that can also compromise knowledge and end result in cybercrimes, similar to information and fraud. Cyber safety attack is moreover referred to as an electronic network attack (CNA). Cyber security safety focused on universities, banks and broadcasting firms inside the world per annual. The malware entails in these threats can be delivered down more than one web site and interrupted the system functions by using overwriting the Master Boot Record (MBR) and everyone the logical drives on the hacked servers rendering them unusable. It had been reportable that such a big amount and such a large quantity of computers has been damaged and also the unique quantity of the monetary harm has now not however been calculated in per annul. a lot of serious is that are probable to possess higher damages just in case of happening further attacks, for the reason that unique analysis of motive isn't achieved nonetheless. Nowadays the cyber-attack detection systems are turning into very important and imperative for the infrastructural community security. The stored logs and backup of the information related with the network pastime and the connections related to the community can be used for the detection of a number of kinds of intrusions and malware. Despite the innovation of new technologies of information and communication following the smart security technique of the internet connections and networks, cyber security has becoming the more challenging squad, and research in this field is still in more numerous. Many types of internet tools and technique are invented to fix up the internet security to meet the organizational demand based on modern era's necessity. Considering from all intrusion detection system as researched before for ensuring security for identifying abnormal behaviour or suspicious activities to undermine the legitimate operation of any system. This study examines how the Network management System could aid in the detection of the network attack so that the loses from these could be minimized. The objectives of this study are to design and implementation of a comprehensive architecture of Intrusion Detection System (IDS) in UIA cyber security network. Defense Techniques have been classified in this study and a proposed framework has been implemented to ensure the cyber security in the UIA network system. 
596 |a 1 
610 |a International Islamic University Malaysia 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Information Systems  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Information Systems 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5448  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a sbh-aaz-naw 
999 |c 440370  |d 471044 
952 |0 0  |6 T TK 005105.59 A318S 2018  |7 0  |8 THESES  |9 764173  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5105.59 A318S 2018  |p 11100401619  |r 1900-01-02  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF TK 5105.59 A318S 2018  |7 0  |8 THESES  |9 857896  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf TK 5105.59 A318S 2018  |p 11100401641  |r 2020-06-25  |t 1  |v 0.00  |y THESISDIG