A STUDY OF DIGITAL SIGNATURE INFLUENCE ON THE SECURITY OF WORD PROCESSORS

  • Type: Project
  • Department: Information Management Technology
  • Project ID: IMT0144
  • Access Fee: ₦5,000 ($14)
  • Pages: 169 Pages
  • Format: Microsoft Word
  • Views: 409
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Word processors are one of the most widely used software applications in our time and have greatly contributed to the shift of paperless office. It has brought drastic changes in the way business documents are created, edited and stored. However word processors have over the years proven to be susceptible and have been successfully exploited to launch catastrophic attacks which have been costly to various states (countries), organizations and individuals. The main objective of this research was to determine the influence of Digital Signatures on word processor security against Macro executing environment and Object Linking and Embedding (OLE). This study sought to contribute to the development of an application software used to secure word processor applications and mitigate Macro and OLE based attacks. The developed application makes use of digital signatures since they are not easily forged and hence can be used to determine whether the embedded macros or OLE objects in a word document are from a trusted source. A detailed, systematic literature review was followed and design science was applied as the research design to develop the prototype application. The researcher collected data by conducting an experiment to determine how effective the developed application is in detecting and mitigating OLE and Macro attacks. The results from this experiment was used to determine the credibility of the developed application as well as to improve its efficacy. Convenience sampling was used due to time and budgetary constraints. Bivariate analysis was then used to analyze the data collected in order to determine how well the artifact provides a solution to the research problem. The results of this study is beneficial to state corporations, organizations as well as individuals since the InfoSec or IT department will have more confidence on the security of word processors among end users.

A STUDY OF DIGITAL SIGNATURE INFLUENCE ON THE SECURITY OF WORD PROCESSORS
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Information Management Technology
    Project ID IMT0144
    Fee ₦5,000 ($14)
    No of Pages 169 Pages
    Format Microsoft Word

    Related Works

    CHAPTER ONE INTRODUCTION 1.1      Background of the study Digital natives, the net-generation, the digital-generation, and millenniums are all labels to identify today’s learners. Marc Prensky (2001) created the term digital native in his work Digital Natives, Digital Immigrants to describe the generation of learners growing up interacting... Continue Reading
    CHAPTER ONE  INTRODUCTION  1.1. BACKGROUND OF THE STUDY  In Nigeria, agriculture has remained the largest sector of the economy. It generates employment for about 70% of the population and contributes about 40% to the Gross Domestic Product (GDP) with crop accounting for 80%, livestock 13%, forestry 3% and fishery 4%. Agriculture accounts for... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1      Background of the study Digital natives, the net-generation, the digital-generation, and millenniums are all labels to identify today’s learners. Marc Prensky (2001) created the term digital native in his work Digital Natives,... Continue Reading
    ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and... Continue Reading
    ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1. Background Of The Study Intelligence simply refers the collection of information of military or political value. It is common knowledge that nationsrequire intelligence about their immediate environment and that of other nations. This is necessary because, in order to guarantee their security, they need to keep track... Continue Reading
    ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
    The use of and reliance on information systems for business has been on the rise  especially in recent years. This has had a serious impact on the security of business  information. Previous studies have identified two areas that must be considered when  creating a secure information system: technology and human compliance to policies.  Many... Continue Reading
    ABSTRACT Kid game is as old as man. The need arises when man needs to keep his children busy as to get fewer disturbance form them and to get them positively occupied. Some kids discover some game on their own. List of some games played by kids in Africa are presented below. Games for kids in the old times range form selection and throwing of... Continue Reading
    Call Us
    whatsappWhatsApp Us