Australian Journal of Wireless Technologies, Mobility and Security <p><strong>Since 2011 Serving Researchers</strong></p> <p>Ausjournal serves to disseminate to the public results of current and on-going works in various areas of computer sciences and engineering more precisely cyber security. It had taken initiative in August 2012 to setup editorial board and published its first inaugural edition in February 2012, and regularly publishing yearly issues. It has completed 11 years of service for upcoming researchers. Ausjournal is owned by SISTMR Australia.</p> ABN 87476928054 Swinger Hill ACT Australia en-US Australian Journal of Wireless Technologies, Mobility and Security 2200-1875 <p>&nbsp;<strong>© 2011-2019&nbsp;Australian Journal of Wireless Technologies, Mobility and Security e-ISSN 2200-1883</strong></p> PREDICTING SURFACE WATER LEVEL ESTIMATION BY USING DATA MINING TECHNIQUES <p><em>&nbsp;&nbsp;</em>To auspicious get exact pixel water surface extent data through remote detecting is to a great degree noteworthy to the environmental reclamation in inland waterway bowls and for the exact administration of water assets. In regard to the insufficient extraction of water surface extent data show in pixels in the greater part of the ebb and flow water data models, a straightforward model Enhanced Water Index (EWI) in view of Modified Standardized Difference Water Index (MNDWI) has been presented. EWI, which is arranged toward the sub-pixel level examination of water surface extent mapping of inland stream bowl, has been advanced in light of the examination of run of the mill ghostly marks for example, forsake, soil, and vegetation alongside MNDWI in agreement with the Landsat TM band highlights. The examination is done by utilizing strategies for pixel-based EWI esteem with various water extents which are dissected through the presentation of the straight crossover reenactment between the water body and the comparing foundation. In conclusion, the impact of EWI demonstrate has been tried in the medium and lower ranges. The amendment coefficient for sub-pixel level water surface extent anticipated by the EWI show and the test information. Results demonstrated that the model could viably remove the data about pixel water surface extent in inland stream bowls. This investigation demonstrates that EWI show has awesome potential in its application for water extent mapping applications.</p> KusumaKavya M ##submission.copyrightStatement## 2021-11-11 2021-11-11 1 1 1 5 Potential threats and mitigation tools for Network Attacks <p><strong>In today’s data hungry and interconnected world, the use of technology has become an integral part of our daily lives. As our reliance on technology grows, so does the need to keep the data that is captured, collated, processed and disseminated through our use of such data secure. Network security relates to the field of securing such data as it is moved between systems from the prying eyes of malicious actors or others, who through various network attack methods and exploits, seek to potentially misuse this data for their own benefit and/or further their own causes. This paper seeks to analyse some recent network attacks that have been launched against companies in the past five years, how these attacks work and the societal impact that these attacks when successful, be it financially through extortion or theft, through the loss of data or reputationally where customers trust and confidence in a brand or product is negatively impacted. &nbsp;Additionally, we will perform a deeper analysis of such an attack against a company as a case study and determine what happened, and what further could be done to mitigate or prevent the attack from occurring in the first place.&nbsp; However, before we can perform such an analysis, we need to discuss what a network attack is and some of the types of attacks that can occur.</strong></p> Scott Sawyer ##submission.copyrightStatement## 2021-12-09 2021-12-09 1 1 6 11 Cyber Security Audit of Top Four Technologies- A Short Note <p><strong>Cybersecurity and networking play a major role in todays interconnected world. The ultimate aim of this report is to discuss and provide insight into 4 areas of the cybersecurity and networking realm, from threats such as SQL Injection Attacks, through to technologies such as Load Balancing, Blockchain for the Internet of Things and Cloud Computing. As such, this report will be broken up into 4 sections to address each item individually.</strong></p> Scott Sawyer ##submission.copyrightStatement## 2021-12-11 2021-12-11 1 1 12 17 Role of GRC In the Information Governance for IT Organizations <p>Abstract: The focus on Governance, Risk and Compliance (GRC) is steadily increasing as IT companies are facing increased risk and a growing number of legal, regulatory compliances. Big IT giants like Google, Facebook already initiated to ‘emphasise’ the integration of GRC activities in order to efficiently manage data governance. This paper analyses need of GRC and its integration particularly for data governance in IT organization. Even though integrated GRC is potential candidate for storage and safe handling of user data, many companies are unsure about the importance of an integration of GRC. As per recent findings, many organisations in Australia have deployed integrated GRC software that helps underlining the benefits of GRC. Still integration of GRC is having few challenges at the moment as stakeholders are unsatisfied with the present state of integration. In this paper, author recommends few solutions to overcome challenges of integration of GRC particularly for data handling with reference to COBIT 5 framework.</p> Akash Nepuane ##submission.copyrightStatement## 2022-04-06 2022-04-06 1 1 18 19 COBIT5 FRAMEWORK AND ECOMMERCE <p>Ecommerce business has been rising as one of the most effective means of carrying out online business, where the primary customers act as the business drivers hoping to get the required product delivered at their home through a few simple steps. However, there is a primary requirement of managing the governance of the Ecommerce business structure, which will allow with smoother transition of all the business-related operations in specific terms. As a reason to this, the following document has been prepared in particular to ensure a better understanding of a chosen framework integrated into the Ecommerce business that exists in the modern world. </p> Sabin subedi ##submission.copyrightStatement## 2022-05-31 2022-05-31 1 1 20 30 Cyber security and GRC <p>When it comes to cybersecurity, different frameworks, best practices, and standards are used by organization. And these governance documents are most often chosen in accordance with corporate governance requirements or legislative requirements. Controls, cyber breaches history and finances are typically prescribed in governance documents, including technical controls, administrative controls, and physical controls. There are also a number of documents that describe specific capabilities that businesses must develop to secure their cyberspace. So, from threats to SQL Injection Attacks to Cloud computing, Load balancing and Internet of things that needs cyber protection and the framework that GRC provides for it are all needs to be included with GRC framework while informing about the GRC business benefit to organisation. Thus, the results in this paper should be understanding and evaluating IT GRC implementation to reduce mismanagement and risk and ensure adherance in organizations and it can be only achieved by mitigating outside risks like cyber and network attacks by using means of Application Security, Internet of Things Security, Network Security, Infrastructure security and limiting access to sensitive information, showing the, interrelation of GRC with Cyber security.&nbsp;</p> Ishwor Thapa Chhetri ##submission.copyrightStatement## 2022-05-31 2022-05-31 1 1 31 43