Browsing by Author "Kule, Titus"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- ItemDesign of effectively efficient techniques for circumvent wireless network security threats and attacks(Kampala International University ,School of Engineering and Applied Sciences,Department of Computer Engineering, 2016-08) Kule, Titus; Bakwanamaha, AllanThe rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack or harm due to its feature of open medium dynamic changing topology, monitoring and management point not being centralized, clear line not well defended and cooperative algorithms. Since the techniques developed on fixed wired networks to detect intruders have been rendered inapplicable in this new environment, the need for ways and methods to develop new architecture and mechanisms to protect mobile computing applications and wireless networks is important. This project research looks into vulnerabilities and effective, efficient technique for circumventing wireless networks. Many problems small companies are facing due to intruders and attackers are also discussed. Basically, the vulnerabilities and circumventing this project research examines will be very useful in the underdeveloped and developing nations.
- ItemStrategies for optimizing password management against versatile attacks(Kampala International University ,School of Engineering and Applied Sciences,Department of Computer Engineering, 2016-08) Kule, Titus; Bakwanamaha, AllanManaging passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this claim? Or even “We’re secure! We have a password policy!” Using a password or having a password policy in today’s world of computing is not enough. Understanding and practicing the policy is important to keep accounts secure. In this project research, the author has conducted a survey to check password habits for user accounts on 200 academy staffs, non-academy and students within Kampala International University (Kampala campus). This survey allowed the author to understand password habits of users according to sensitive of their account, also reveals some critical issues associated with password choice. As a result, data on password strength, the types and lengths of passwords chosen, and how they vary by site or sensitivity of account has been considered. Furthermore, recommendations are given based on different aspects of users` requirements. Hopefully, the result of this research project will be valuable to users who want to use password policy for securing user accounts.