Skip to main content

Showing 1–4 of 4 results for author: Ithnin, N B

.
  1. arXiv:1309.0189  [pdf

    cs.CY

    Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing

    Authors: Oyelami Julius Olusegun, Norafida Binti Ithnin

    Abstract: Information sharing in organization has been considered as an important approach in increasing organizational efficiency, performance and decision making. With the present and advances in information and communication technology, sharing information and exchanging of data across organizations has become more feasible in organization. However, information sharing has been a complex task over the ye… ▽ More

    Submitted 1 September, 2013; originally announced September 2013.

    Journal ref: International Journal of Computer Science and Information Security, Vol.11, No.8, August 2013, Paper ID 31071338

  2. arXiv:1309.0188  [pdf

    cs.CY

    People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization

    Authors: Oyelami Julius Olusegun, Norafida Binti Ithnin

    Abstract: Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute. At the University Technology Malaysia (UTM), we have recognized the fact that, it is about time information security should no longer be a lacking factor in productivity, both information security and productiv… ▽ More

    Submitted 1 September, 2013; originally announced September 2013.

    Journal ref: International Journal of Computer Science and Information Security, Vol.11, No 8, August 2013, Paper ID 31071337

  3. arXiv:1210.5913  [pdf

    cs.CR

    Bio-Thentic Card: Authentication concept for RFID Card

    Authors: Ikuesan R. Adeyemi, Norafida Bt Ithnin

    Abstract: Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: (IJCSIS) International Journal of Computer Science and Information Security 2012

  4. arXiv:1210.1647  [pdf

    cs.CR

    Users Authentication and Privacy control of RFID Card

    Authors: Ikuesan R. Adeyemi, Norafida Bt. Ithnin

    Abstract: Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed a… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: International Journal of Scientific & Engineering Research (IJSER) ISSN 2229-5518 2012