Перегляд за автором "Kashaija Joel"
Зараз показано 1 - 3 з 3
Результатів на сторінку
Варіанти сортування
Публікація A simulation-based performance comparison study of a man-on-the-side attack based on ARP spoofing, its detection, and prevention(ХНУРЕ, 2022) Kashaija JoelThe work describes a simulation-based performance comparison study of a Man-on-the-Side attack based on ARP spoofing, its detection, and prevention. Using Wireshark as the deep packet analyzer, we performed a Man-on-the-Side attack leveraging the ARP spoofing table, showing the real environment created to simulate a Man-on-the-Side attack. The presented sample revealed how a MotS attack could quickly get the password from an unsecured login. The two frames from the victim and the attacker's relay to the website have been displayed.Публікація An approach to cyber resilience of critical information infrastructures(ХНУРЕ, 2021) Kashaija Joel; Massis Khader; Onuoha David NwaezeudoThe paper is devoted to an approach to cyber resilience of Critical Information Infrastructures. The cyber resilience of networked services becomes especially important because in many cases such services will increasingly be offered by mission-critical applications. They will need guarantees above and beyond the ‘best effort’ that has initially been considered acceptable for applications provided by conventional networks. Moreover, mission-critical networks must continue to operate during any disaster and protect sensitive information and guard against attacks.Публікація Enhancing the Security of Critical Infrastructure Powered by SCADA(Сумський державний університет, 2023) Kashaija JoelBuilding cyber resilience for critical infrastructure (CI) running on SCADA is a complex and multifaceted process that requires careful planning, deployment, and maintenance. The threat landscape has evolved significantly recently, with cyber-attacks becoming more frequent, sophisticated, and damaging. Organizations must take a holistic approach encompassing various measures to protect SCADA systems from these threats effectively.