Challenges of Online Exam, Performances and problems for Online University Exam
|
|
|
- Madison Lee
- 10 years ago
- Views:
Transcription
1 439 Challenges of Online Exam, Performances and problems for Online University Exam Mohammad A Sarrayrih 1, Mohammed Ilyas 2 1 Information System and Technology Department, Sur University College, 2 Information Systems and Technology Department, Sur University College, Abstract In this paper, we propose a system that provides security to improve on-line examination by utilizing technologies such as biometric authentication, internet-firewall, cryptography, network protocol and object oriented paradigms. Furthermore, we propose a framework for conducting online exams through insecure internet backbone. However, the proposed system will provide a secure communication based cryptography and group communications. In our research paper, we discuss the performance of student s online course exam with respect to security and main challenges faced by online course exams within the university. We conclude that by improving the security system using biometrics face recognition that can be incorporated into the proposed system to fulfill the challenge of online exam. Keywords: Biometrics, Course, Online Exam, Security, University Course, Camera, Fingerprint Scanner Introduction: Online exam has expanded rapidly [1], [2]. Even so, the off-line exam is usually chosen as evaluation method for both on-line and off-line exams. Online course examinations are useful to evaluate the student s knowledge using modern computer technology without any effects on the traditional university course exam that uses Pens, Papers and invigilators. Online exam can improve the standards of student s examination whereas the traditional examination system using the pen and paper requires more effort on the part of students and invigilators. Online examinations are considered an important source for university exam, and the development of network technology polices has given the possibility to conduct the exams online. Thus, the university students can benefit from these services. University course exams, using the multiple choice questions and allowing the students to choose only one answer from alternative answers or the true/false questions, are traditionally using the paper and pens and they have always been a heavy load for both students and lecturers. Computer new technology has been generally useful to the fields of education. In attitude and tools, the new computer technology gives the lecturer the advantage of an effective assessment. The traditional way of identifying the students is checking the student card, driving license, resident card or Passport. The online process and security of the online exam system helps with eliminating cheating. This paper proposes the usage of biometrics which supports the security control, authentication and integrity of online exam process. E-monitoring of students uses finger prints and cameras for preventing cheating and substitution of the original student. This paper targets the online exam for Basic computer in university courses with students at particular locations, at a fixed time and same questions for all examinees at the restricted physical location of the examinees. Literature Review: Most modern online education uses Web-based commercial courses management software [3] such as Web CT [4], blackboard [5], or software developed in-house. This software is not used widely for online exams, due to security vulnerabilities, and the system must rely on students honesty or their having an honor code [6]. Online course exam nowadays becomes more efficient than before; online course exam need for enhancing the security. Jung, I.Y proposes an
2 440 enhanced secure online exam management environment mediated by group cryptography using remote monitoring and control of ports and input [7]. Holding the Online course exam for any substance requires more preparations, whether the teacher or through the support of university students. University on the duties assigned to it to provide the necessary environment entrusted to them. Everyone is there to serve the student and we have to encourage students and train them psychologically for a computerized exam, note that many universities in the world of the complexity of computerized tests on its campus. More of recent research shows the advantage and disadvantage of using online course exam on the university campus such as Al-Mashaqbeh, I.F. and Al Hamad, A. in the Dept. of Computer. Educ., Al al- Bayt Univ., Mafraq, Jordan reached to good results showed that there was a positive perception towards the adopting of online exam. They measured students' perceptions toward the use of online exam as an assessment tool on university campus within a Decision Support System Course at Al al Bayt University [8]. A study has been conducted on online exam and traditional exam which indicates that an online exam has better results than traditional exams. [9] Considerable discussion has taken place on group protocols and group-mediated communications to ensure secure communications among group members [10], [11]. This discussion has included the consideration of secure group composition, secure intergroup communication using a public key, and secure intragroup communication using the symmetric key through the Diffie-Hellman key exchange [12]. This paper adopts two groups for secure communication between distributed entities in the online exam system. The intergroup communication is protected through public key infrastructure (PKI), while intragroup communication uses several symmetric Diffie-Hellman Keys. The group in this paper is a concept for entities with similar roles. [12]. The special cameras of 360 o and finger print recognition device will be incorporated for identifying the identity. The camera and the finger print device will be placed at one location in each lab. The biometric scan devices (finger print scanner and camera ) will check the students from the data base which is collected and stored in the registration department. The camera is used for dual purpose of identifying and controlling of examination hall activities. Thus, we are utilizing the same resource for identifying the students. 2) Unauthorized interference of other users in the network using other clients To solve this challenge of students entering from different IPs into the domain and attempting the exam for their fellow students, we propose a system, where we create a domain with the set of students user id s allocated by the university domain and each instructor will add all the students user id s of his course; then he will give them the specific permissions like read and write for the specific time of that particular course exam. The students who enter from the different IP s cannot use the allocated domain and thus the system is secure. In this research, we try to bring out the challenges and some best solutions that may solve the problems. This paper considers the Challenge of personal identity and unauthorized invention of other users in the network using other clients Solutions for the above challenge 1) Challenge of personal identity:
3 441 unauthorized user attempts to access the system from different location he is not allowed. The proposed system The special exam group is created by grouping the hostnames / IP of clients for a specific location (Computer Lab) and time. To avoid the malpractice in the exams we use different types of biometrics as a means to log into the exam. We use the camera and finger print scanner to identify the students as shown in the figure1 above. The user after identified login into the system uses the user-id and password provided by the university, which are authenticated by the server. This gives him/ her permission to open the exam from the server otherwise the students cannot login into the system. The unauthorized users attempting to log into the system from remote computers are blocked by the proposed system Once the session begins the timer is on, the student completes his exam within the allocated time and once the time is up the system send an alert and logs the user off. Figure 2: The figure 2 shows the flow chart of the secured online exam system proposed. It shows the series of steps of online exam starting with the secured login using biometrics and system login through server till the end of exam results. Figure1: The systems are connected using the star topology. The camera and finger print scanner inside the lab are connected to the security server; once the security server authenticates the biometrics of user, then the users are allowed to write the exam at the specific terminal provided to them. When an
4 442 Algorithm: Step 1: Student Identification: The system will check the identity of the student by using biometrics which will take the picture and the fingerprint before entering the exam. This will also check whether the student is eligible for that particular exam. Step 2: University Domain Login: The student will log into the domain of the university with the user name and password provided by the university domain login (Ex: username: SUC, Password: suc). Step 3: Special login into exam domain: The system asks the user to write the user name and password. If the user name and password are correct, then the user will be able to log into the exam. Step 4: Access the Exam: The user will complete the exam file that is located in the domain desktop window (Online Exam) Step 5: Online Exam Supervisor Password: The supervisor password is given to the students who are successfully logged into the exam domain. This gives them access to the exam and the exam session begins for that specific exam. Step 6: Random questions and Results: The random questions are given to the students, who submit the answers to the server; when the session is completed, the system generates the result of the exam. Step 7: End. Conclusion: Figure2: Flowchart of secure online exam proposed We believe the online format is considerably superior to paper-and-pencil exams for our courses. We have come to the conclusion that the above mentioned challenges can be solved by introducing the following security systems. Using biometrics we overcome the traditional way of checking the ID cards of the students after they start the exam. Biometrics will identify the student as he enters the exam hall. The IP address check allows as follows: 1-Using online signature or displaying student photo 2-Using fingerprint
5 We can provide more security to identify the students by using online cameras which are more useful than the traditional method of checking the ID cards. Since we check the identity before the start of the exam, there are some more security problems regarding the questions and answers which are for a further research. This type of online exam system reduces the examination work. The future scope of this research can be the security of online remote exam systems. References: [1] IC3 Online. Available: tml [2] The WebCT, SIMON FRASER UNIVERSITY Online available: [3] J. C. Adams and A. A. Armstrong, A Web-based testing: A study in insecurity, World Wide Web, vol. 1, no. 4, pp , [4] C. Rogers, Faculty perceptions about e-cheating during online testing, J. Comput. Sci. Colleges, vol.22, no. 2, pp , [5] The Blackboard Northern Illinois Univ. [Online]. Available: [6] J. C Adams and A. A. Armstrong, A Web-based testing: A study in interesting, World Wide Web, vol. 1, no. 4, pp , [7] Jung, I.Y Enhanced Security for Online Exams Using Group Cryptography IEEE vol52, issue: 3 Page(s): Aug [8] Al-Mashaqbeh, I.F. Al Hamad, A. Student's Perception of an Online Exam within the Decision Support System Course at Al al Bayt University Conference publication Pages: May [9] Eros Desouza, Matthew Fleming, A Comparison of In-Class and Online Quizzes on Student Exam Performance, Journal of Computing in Higher Education, Vol. 14(2), pp , spring group communication in wide-area networks, in Proc. IEEE Symp. Comput. Commun., 2001, pp [11] K. Berket, D. A. Agarwal, P. M. Melliar-Smith, and L. E. M. Ernest, Overview of the intergroup protocols, Lecture Notes in Comput. Sci., vol. 2073, pp , 2001 [12] E. Bresson, O. Chevassut, and D. Pointcheval, Provably-secure authenticated group Diffie-Hellman key exchange, ACMTrans. Inf. Syst. Security J., vol. 10, no. 3, 2007, Article 10. A Brief Author s Biography Mohammad A Sarrayrih - graduated from Mutah University in 1999-Jordan, major in Computer Science. Upon completing his Master's degree from Al-Neelain University 2004 Amman Branch, he started working as a teacher of Computer Science, his experience of date being of more than 12 years. Mr. Al-Sarrayrih has also a twoyear experience as Programmer in the Banking Systems and Online Systems (Phone banking and ATM's). Currently, Mr. Al-Sarrayrih is acting as Deputy Chair of Information Systems and Technology at Sur University College as well as a full time instructor. Mohammed Ilyas: Mr. Mohammed Ilyas has a bachelor degree in Computer Science and Engineering; India, Higher Diploma in Software Engineering India, Master degree in Master in Computer Application, Computer Science, Worked as Software Engineer in Seer Software, Hyderabad, India. Worked as Instructor in Computer Science and Engineering, College, Hyderabad, worked as a Lecturer in the Department of Computer Science of Sultan Qaboos University (SQU), Oman. Currently, he is a lecturer of computer Sciences at Sur University College (SUC), Oman. He published paper in conferences, Paper presented in International Conference on Leading Beyond the horizon: Engaging Future, Annamali University Paper Title: Knowledge Management in educational processes A qualitative approach [10] D. Agarwal, O. Chevassut, M. R. Thompson, and G. Tsudik, An integrated solution for secure
Implementation and Security Development Online Exam, Performances and problems for Online University Exam
Implementation and Security Development Online Exam, Performances and problems for Online University Exam Mohammad Attallah Sarrayrih Information Systems and Technology Department, Sur University College
Experience with Language Online Exam
Experience with Language Online Exam Dr. Ishita M. Badiyani Asst. Professor L.N.K. College of Education Patan India Abstract The introduction of Online Examination in the teaching-learning field is considered
A Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
E-Mail: [email protected] Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
How to Access the Economics Undergraduate Lab
How to Access the Economics Undergraduate Lab Please note that only students in a few selected courses will be able to activate their Economics Undergraduate Lab account. If this account is not listed
CS1030 11195 (TR: Davis Campus) Syllabus - 1030 - Introduction to Computer Science
CS1030 11195 (TR: Davis Campus) Syllabus - 1030 - Introduction to Computer Science Instructor: Texts: Course Objectives: Alison Sunderland Email: [email protected] (slow), Canvas email is preferred.
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Data Encryption and Network Security
Data Encryption and Network Security College: Department: Engineering Electrical Engineering Department First: Course Definition 1 Course Code: EE627 2 Units 3 3 Semester 4 Prerequisite 5 Corequisite 6
ATTITUDE TOWARDS ONLINE ASSESSMENT IN PROBABILITY AND STATISTICS COURSE AT UNIVERSITI TEKNOLOGI PETRONAS
ATTITUDE TOWARDS ONLINE ASSESSMENT IN PROBABILITY AND STATISTICS COURSE AT UNIVERSITI TEKNOLOGI PETRONAS Afza Shafie 1, Josefina Barnachea Janier 2 Department of Fundamental and Applied Sciences Universiti
Dual Enrollment Student Handbook
Dual Enrollment Student Handbook WHERE OUTSTANDING LIVES GET STARTED Table of Contents 1 Welcome from the President 2 The Learning Environment 3 Purpose of Dual Enrollment 3 Benefits of Dual Enrollment
CIS 156. Firewalls and Intrusion Detection
CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Enhanced Cloud Security through KFAC
Enhanced Cloud Security through KFAC Mahesh S Darak, Dr. N. K. Deshmukh Assistant Professor, School of Computational Sciences, S. R. T. M. University, Nanded, Maharashtra, India ABSTRACT: The current era
ITNW1392 Special Topics in Computer Systems Networking and Telecommunications COURSE SYLLABUS
ITNW1392 Special Topics in Computer Systems Networking and Telecommunications COURSE SYLLABUS COURSE NUMBER AND TITLE: ITNW1392 Special Topics in Computer Systems Networking and Telecommunications COURSE
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network
Towards Securing E-Banking by an Integrated Service Model Utilizing Mobile Confirmation
Research Inventy: International Journal of Engineering And Science Vol.4, Issue 9 (Sept 2014), PP 26-30 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Towards Securing E-Banking by an
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)
CIS 253. Network Security
CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum
IDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Prerequisite: CIS 271 with a minimum grade of C or consent of department.
CIS 272 Windows Server I Proposed Start: Fall 2013 Instructor's Name: Office Location: Office Hours: Office Phone: E-mail: Course Description: This course prepares students for Microsoft certification.
Computer Forensics (3 credit hours)
Syllabus for Fall 2010 Computer Forensics (3 credit hours) COURSE INFORMATION Instructor: Smith Office: A 112-B Phone: 291-4920 Email: [email protected] Class Time: TH from 7:00 8:15 p.m. Room: A 112
Traditional courses are taught primarily face to face.
REACH Distance Learning Program Center Handbook Introduction Distance learning is an educational delivery method where students work on their own and communicate with faculty and other students through
SDV-100-C15 - Fundamentals of College Study. *All questions related to course material should be sent via Blackboard message.*
2016SP SDV-100-C15 Online Syllabus Page #1 SDV-100-C15 - Fundamentals of College Study Instructor: Amanda G. Messatzzia, M.Ed. Phone: 410-334-2993 (voicemail only) Email: [email protected] Office:
Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi Department of Computer Sciences and Informatics Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 2, 23-27, 2015 Secure Mobile Cloud Computing Based-On Fingerprint Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
THE VERIFICATION OF IDENTITY IN ONLINE ASSESSMENT: A COMPARISON OF METHODS
THE VERIFICATION OF IDENTITY IN ONLINE ASSESSMENT: A COMPARISON OF METHODS Dr Trevor Barker Stella Lee The Verification of Identity in Online Tests: A Comparison of Methods Dr Trevor Barker, Department
MAT1033C INTERMEDIATE ALGEBRA COURSE SYLLABUS ONLINE COURSE (Fall 2013)
MAT1033C INTERMEDIATE ALGEBRA COURSE SYLLABUS ONLINE COURSE (Fall 2013) Instructor Information: Name: Joel M. Berman Engagement/Office Hours (Times I am available to help you!) Office: East Campus 4-240
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Crime Scene Investigation Central College
Crime Scene Investigation Central College Instructor: Sandra Hall Craver CRIJ 2314-0001 Crime Scene Investigation CRN 26282 Fall 2014 Central Campus EDC-RM A218 M 5:30-8:30 pm 3 hour lecture course 08/25/2014-12/08/2014
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio [email protected], [email protected] Abstract Cloud
COLLEGE CREDIT NOW @ ONONDAGA COMMUNITY COLLEGE STUDENT & PARENT GUIDE
COLLEGE CREDIT NOW @ ONONDAGA COMMUNITY COLLEGE STUDENT & PARENT GUIDE ABOUT COLLEGE CREDIT NOW College Credit Now allows high school students to gain a head start on college prior to high school graduation.
PSY 201 General Psychology Social & Behavioral Sciences Department
PSY 201 General Psychology Social & Behavioral Sciences Department Catalog Course Description: This course includes the following topics and concepts in the science of behavior: scientific method, biological
Introduction to Personality Psychology 2320, Spring 2013 TTh 5:30-6:45 Arts and Science 110 (Allen Auditorium)
Introduction to Personality Psychology 2320, Spring 2013 TTh 5:30-6:45 Arts and Science 110 (Allen Auditorium) Instructor: Wendy Slutske, Ph.D. Office: 212A McAlester Hall Office Hours: by appointment
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 6, 76-81, 2014 Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring
MATH 245 COLLEGE ALGEBRA Section 0251 10:55 1:30
MATH 245 COLLEGE ALGEBRA Section 0251 10:55 1:30 Instructor: Ms. L. K. Deutsch Office Hours: MW 1:30 3:50 PM Office & Office Phone: C2.123-2 323-780-6735 Textbook: College Algebra Lial, Hornsby and Schneider
Open Source Security Tools for Information Technology Professionals
Open Source Security Tools for Information Technology Professionals CUNY SPS Course Syllabus Aron Trauring May 23, 2005 (rev October 21, 2005) Course Description Information security is a top priority
CS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
TECHNOLOGY SUPPORTED LEARNING PLATFORM: Moodle Integrated Academic Course
Turkish Online Journal of Distance Education-TOJDE April 2010 ISSN 1302-6488 Volume: 11 Number: 2 Article 9 TECHNOLOGY SUPPORTED LEARNING PLATFORM: Moodle Integrated Academic Course ABSTRACT Saziye YAMAN,
Security+ Certification Course
Your Course Information Security+ Certification Course Swaledale 4 Coaley Lane Houghton-le-Spring Tyne & Wear DH4 4SQ The CompTIA Security+ Certification Course covers the Latest CompTIA Certification
Secure Testing Options for the University
Secure Testing Options for the University Jason Smith Innovation in Learning Center April 12, 2011 Introduction The University of South Alabama currently offers 350 fully online courses annually. In fall
Smart Appointment System for CCE Faculty
Smart Appointment System for CCE Faculty 1 Sumaiya Saif Al-Yarubi, 2 Saleh Salim Al-Araimi 1,2 Glasgow Caledonian University Caledonian College of Engineering, Muscat, Sultanate of Oman Abstract: Students
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology
Lab 9: Pen Testing (NESSUS)
Lab 9: Pen Testing (NESSUS) Aim: To provide a foundation in using NESSUS for vulnerability scanning. Time to complete: Up to 90 minutes. Activities: Complete Lab 9: Introduction to NESSUS. Complete Test
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks *Abhishek Vora B. Lakshmi C.V. Srinivas National Remote Sensing Center (NRSC), Indian Space Research Organization (ISRO),
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT
BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT CATALOG DESCRIPTION ITNW 2313 Networking Hardware. CIP 1109010007 Maintain
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
PTE ACADEMIC www.pearsonpte.com SECURE
PTE ACADEMIC www.pearsonpte.com We believe fair tests should be as secure as possible Cheating is unfair and undermines the efforts of the honest majority. We believe PTE Academic is the most secure test
INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM
Journal of Computer Science 10 (2): 361-365, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.361.365 Published Online 10 (2) 2014 (http://www.thescipub.com/jcs.toc) INTEGRATING RADIO FREQUENCY IDENTIFICATION
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
SHAPE YOUR NATION S FUTURE
SHAPE YOUR NATION S FUTURE ONLINE COURSES IN COMPUTER INFORMATION SYSTEMS FOR INDIGENOUS PEOPLE IN COLLABORATION WITH: EARN A MCGILL EDUCATION IN COMPUTER INFORMATION SYSTEMS FROM THE COMFORT OF YOUR COMMUNITY.
Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah
Journal of mathematics and computer science 10 (2014), 189-198 Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Miran Hikmat Mohammed Baban Computer Dept.
SUMMER SEMESTER 2016. REGISTRATION myuttyler my.uttyler.edu
SUMMER SEMESTER 2016 REGISTRATION myuttyler my.uttyler.edu Registration for all summer 2016 sessions opens February 1, 2016; 8:30 a.m. SHORT SUMMER Bill Due Date: May 13, 2016; 5:00 p.m. (Online or in
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
High School Student Orientation 2013-2014
High School Student Orientation 2013-2014 Updated 06/24/2013 Dual Enrollment, or the Postsecondary Options Act, gives high school students the opportunity to enroll in college courses while attending high
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus
COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester
Common Syllabus Revised 01.17.2015
Department of Applied Information Technology Volgenau School of Engineering IT 366 Information Security Fundamentals Common Syllabus Revised 01.17.2015 This syllabus contains information common to all
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Fingerprint Recognition Student Attendance Management System
Fingerprint Recognition Student Attendance Management System By Liew Ken Nam A REPORT SUBMITTED TO Universiti Tunku Abdul Rahman in partial fulfillment of the requirements for the degree of BACHELOR OF
CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834)
CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; 278-4238/6834) C Sc 250 Computer Security and Privacy, Spring 2012 (TR 4-5:15p; RVR 2010) INSTRUCTOR: Martin Nicholes
ONLINE PERFORMANCE APPRAISAL SYSTEM
ONLINE PERFORMANCE APPRAISAL SYSTEM Ms.S.Priscilla Florence Persis B.Tech IT IV year SNS College of Engineering Coimbatore ABSTRACT : Online Performance Appraisal systems enable you to track and monitor
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Online Baccalaureate Program CIS 101 Syllabus Computer Fundamentals and Applications Spring 2011
Online Baccalaureate Program CIS 101 Syllabus Computer Fundamentals and Applications Spring 2011 Instructor: Suzanne Tamang E-mail: [email protected] Course Description Credits: 3 This course is
