Annual Conference -Basic Sciences and Engineering -February 2016

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 176
  • Item
    Using Bitcoin to provide privacy for online payments
    (University of Khartoum, 2016) Ahmed, Alsafa Hassan Suliman ; Elhassan, Amna Abdulrahman Abdallah
    Online payment is a process of exchanging money over the internet to purchase or sell goods and services; this process includes a payer, a payee, and a central authority (third party). The third party is located in the middle, in order to verify the payment process and check the account. Due to the role of the third party, some people who use online payment are concerned about them, because their information can be abused or made vulnerable. In other words, they are concerned about their privacy. On the other hand, the on-line payment has good features to be used such as scalability and availability. With the improvement of the technologies, new techniques of the online payment have appeared; one of these techniques is a digital currency. It provides the possibility of a direct money exchange between the payer and the payee. One of the most famous and dominant digital currencies is a Bitcoin, Bitcoin is a digital currency “crypto-currency“ that is based on peer to peer network in which all the nodes of the network share files and resources to provide more scalable, reliable (without a single point of failure ), and faster communication . Bitcoin technology has two main concepts; universal place to keep all the transaction that occurs in the system that is shared in the entire Bitcoin network (public ledger – block chain), and connected peers called miners who verify and add the new block into the block chain. Bitcoin hides user identity by using Public key cryptography technique to create a pseudonym address to participate in each transaction, which leads to increase user’s privacy. The aim of this project is to investigate online payment and its privacy, then implement the bitcoin system to prove that it provides enough privacy for the online payments. Therefore, the researchers have deeply studied the material necessary to understand online payment, bitcoin system and its component and Test bed technique was chosen and used as a project methodology. A bitcoin application has been implemented and the basic functionalities have been addressed; from those functions the researchers have conducted the test which have shown that the raw bitcoin transaction is not understandable and the identity of the user is hidden.so bitcoin have showed that it is suitable to address and handle privacy issue.
  • Item
    The negative impact of Malware and Attack Rootkits on the Forensic Memory Analysis
    (University of Khartoum, 2016) Hamid, Hadia ; Amin, Izzeldin ; Khalil, Mohamed
    When society becomes very dependent on technological assistants, it might be viewed as unsleeping witnesses. An important part on these assistants is its volatile data storage, because it may contain very useful data for the support or refute of a theory of how an offense occurred. If these data extracted using a memory forensics technique that put a considerable effort on extracting every single bit as much as possible in a forensically sound manner, this data might be admissible to the court and serve the crime. Memory forensics is a relatively recent field but it is growing and evolving rapidly, but it is attracting a considerable attention of the researchers from both industrial and academic sectors. However in most of the past and recent researches the negative impacts of the malware and attack rootkits is mostly overlooked, in spite the fact that it might hinder or impede the access to the artifacts through hide some objects intentionally, which could serve as a digital evidence that may condemns or exonerates the accused in a crime. This paper investigates the negative impacts of the malware and attack rootkits existence in memory while conducting a digital investigation. It also presents a wide range of malware and attack rootkits detection techniques, focusing on the hidden objects detection techniques. The main finding of this paper is drawing the attention of the researchers to the negative impacts of these malware and attack rootkits and the critical consequences of these impacts on the digital investigation process.
  • Item
    ICT and NIS: Sustainable Development in Sudan through Technology and Innovation
    (University of Khartoum, 2016) Khalid, Abdalkareem Omer Abdu ; Kadoda, Gada Faroug
    Scientific Research, research councils and research associations including universities and higher education institutions play a critical role in the process of knowledge creation and defining ways to guide knowledge deployment. Notwithstanding, the role of research is highly constrained without envisioning it as part of a national innovation system (NIS). NISs have the ability to enhance the act of innovation inside the nation’s borders, with implications on economic growth, research and development. The work investigated the role of ICT in a number of NIS Country cases to define the ways by which ICT can be an enabler for increased productivity and cost reduction. This paper examines the components of NIS based on the guidelines of the OECD (Organization of Economic Cooperation and development), as well as on extensive document review, interviews with local stakeholders and a workshop. The findings indicate that leveraging ICTs greatly empowers key economic sectors i.e. infrastructure, mining, trade and manufacturing, agriculture, energy, tourism, financial services thereby increases their competitiveness and facilitates sustainable development. Some of the country approaches, where NIS had a positive impact on development, include by improving education, creating publicprivate partnerships, upgrading infrastructure, institutionalizing IT policy, branding, positioning and promotion. The paper discusses ICT features that are required for NIS infrastructure, in particular appropriate technology and skilled personnel. More importantly, the paper will present, in the context of Sudan, the impeding factors to the development of a National Innovation System and make recommendations on ways towards change
  • Item
    Survey Paper ON “Mobile Banking Security Issues”
    (University of Khartoum, 2016) Mohamed, Mohamed Elhafiz ; Hashim, Alaa Hidayt-Allah ; Abouof, Abdalrahman Ibrahim
    When dealing with security aspects for mobile banking in the context of mobile devices and applications, a few common themes emerge. If these themes are not addressed properly, through security controls and measures, the underlying threats could compromise the confidentiality, integrity and availability of mobile security assets. These threats can be categorized in the following manner: users, devices, applications and data, and governance. Based on this categorization, the Mobile Banking Security Model was created which can be used to define security controls and measures, perform risk assessments for mobile banking in the context of mobile devices and mobile applications or in preparation of audit fieldwork.
  • Item
    Software Process Improvement for Very Small Enterprises: An ISO/IEC 29110 Based Assessment Method
    (University of Khartoum, 2016) Osman, Mayada ; Zaroug, Anfal ; Ibrahim, Lamis ; Abushama, Hisham
    With the rapidly growing software market, the quality of software products became the key to gaining competitive advantage. Accordingly, Software Process Improvement (SPI) initiatives gained significance in the software industry as the quality of the software process will ultimately lead to the quality of the product. Over the last decades, many SPI models have been published and their success was recognized. However, most of these SPI models were perceived to be oriented towards large organizations. Not much attention has been given to Very Small Enterprises (VSEs) which constitute the majority of the software market share. These VSEs face environmental challenges such as the small number of employees, lack of expertise, tight budgets and time constrains. Consequently, VSEs faced difficulties in implementing the existing resource consuming SPI models. The ISO/IEC 29110 model was developed to resolve these difficulties and attain to VSEs needs. In spite of this fact, many researchers have accused the model in general and its assessment approach -that is conforming to ISO/IEC 15504 two dimensional model- in particular of being cumbersome and argued that it may need to be further adjusted when implemented in VSEs. This research proposes a tailored assessment method based on ISO/IEC 29110 that addresses VSEs’ environmental challenges. The method enables software process assessment and uses a technique for prioritizing outcomes of the assessment results based on VSEs’ business objectives and resources. An evaluation for the suitability of the tailored method in VSEs context is carried out in a VSE chosen as a case study.