Master of Science in IT Security & Audit
Browse by
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Recent Submissions
-
A BLOCKCHAIN BASED SMART CONTRACT MODEL FOR TENDERING
(kabarak university, 2022-11)nformation technology is the backbone for all 21st -century organizations that are looking forward to offering better customer service and gaining a competitive advantage. Today, the blockchain technology is being ... -
A WEB-BASED MODEL TO DETERMINE SECURITY RISK EXPOSURE INDEX AMONG SAVINGS AND CREDIT COOPERATIVE SOCIETIES
(2018-04)Savings and Credit Cooperative Societies (SACCOs), like other financial institutions, own critical assets that must be protected against attackers even as the threat landscape continue to persist. This study provides a ... -
ADOPTABILITY MODEL FOR DIGITAL FORENSIC EVIDENCE IN KENYA
(KABARAK UNIVERSITY, 2018-10)The traditional techniques used by forensic investigators through the incident response operations include mostly pulling out the power cable of the suspected machines. This method normally causes a major interference of ... -
A WEB-BASED MODEL TO DETERMINE SECURITY RISK EXPOSURE INDEX AMONG SAVINGS AND CREDIT COOPERATIVE SOCIETIES
(KABARAK UNIVERSITY, 2018-04)Savings and Credit Cooperative Societies (SACCOs), like other financial institutions, own critical assets that must be protected against attackers even as the threat landscape continue to persist. This study provides a ... -
DEVELOPING A THREAT MATRIX FOR SMART MOBILE DEVICES IN A UNIVERSITY NETWORK TOWARDS A SECURE LOCAL AREA NETWORK ECOSYSTEM
(KABARAK UNIVERSITY, 2018-11)The need by staff and students to use smart mobile devices in university network is indisputable. This is because they help them to work and study more effectively as well as achieve better work-life balance. However smart ... -
ADOPTABILITY MODEL FOR DIGITAL FORENSIC EVIDENCE IN KENYA
(KABARAK UNIVERSITY, 2018-10)The traditional techniques used by forensic investigators through the incident response operations include mostly pulling out the power cable of the suspected machines. This method normally causes a major interference of ...