Research Method Computer TechnologyFull description
j
Full description
Mechanics of Machines AssignmentFull description
You’ll get the best views from above so make the most of the many sky dive schools and drop zones all over New Zealand where you can go solo or tandem as you float through the air. Fly t…Full description
Full description
comp appFull description
This is just an assignment
Wastewater treatment assignmentFull description
instruementationFull description
AssignFull description
Analytics assignmentDescripción completa
business law
assignemnt for BPiFull description
assignmentFull description
haaFull description
Full description
Assignment Forecasting
Research Methods Met hods for Computing and Technology Technology
8.0 References and i#liography.............................................................................. !2
CT098-3.5-2-RMCT
age 2
Research Methods for Computing and Technology
1.0 Title 'C L!gin ##%icai!n "!r M!*i%e De+ices
2.0 Introduction In his era !" echn!%!g&1 i is sa"e ! sa& ha e+er& h!$seh!%d and !""ice has a des!# !r #ers!na% c!m#$er1 heher "!r !r !r enerainmen #$r#!ses. de+e%!#ing c!$nr& is n! e4ce#i!n !" ha+ing s$ch de+ices1 hich inc%$des ciies ha are gr!ing remend!$s%& e+er& &ear. h!$seh!%d c!m#$er has m$%i#%e "$nci!ns1 de#ending !n he necessiies !" he $ser. c!m#$er is $s$a%%& $ni$e ! eiher !ne !r a %imied se !" !ners1 meaning !n%& a "e se%ec #e!#%e can access his6her c!m#$er a a gi+en ime. Th$s1 a sec$ri& s&sem is $s$a%%& im#%emened in each #ers!na% c!m#$er ! ens$re sa"eg$ard !" in"!rmai!n and #ri+ac& is e# ! a ma4im$m.
3.0 Problem Statement There are man& a&s !ne can sec$re a #ers!na% c!m#$er7 he m!s c!mm!n !nes inc%$de man$a% e&*!ard in#$ "!r #ass!rd. The ad+anced meh!ds inc%$de h$m* #rin scanning1 "acia% rec!gnii!n and near-"ie%d c!mm$nicai!n ('C) $sing a #iece !" chi# !r card im#%emened ih !ne. ach a&s has is #r!s and c!ns7 as s$ch a #r!#!sed s!%$i!n is ! creae a #r!gram ha $ses near-"ie%d c!mm$nicai!n ! %!gin !n! a #ers!na% c!m#$er $sing a $sers #ers!na% ce%%#h!ne ih 'C "$nci!ns. s$d& "r!m P!nem!n Insi$e shed s!me %igh !n he s$*ec !n he c$rren sae !" #ass!rd $sage am!ng 900 #e!#%e1 s#read acr!ss c!$nries s$ch as ,nied /aes1 ,nied Kingd!m and :erman&. I $rns !$ ha near%& 50; !" he #e!#%e c!nd$cing he s$r+e& "ai%ed ! #resen heir CT098-3.5-2-RMCT
age 3
Research Methods for Computing and Technology #ass!rds ! e4ec$e an !n%ine ransaci!n1 res$%ing in a$henicai!n "ai%$re (Kerner1 205). $rherm!re1 a sr!ng <; !" he res#!ndens sressed ha he & d! n! r$s e*sies ha re%& !n%& !n #ass!rds as a "!rm !" %!gin a$henicai!n1 as said *& a$h!r Larr& P!ne m!n. s #er $!e "r!m Larr& P!nem!n himse%"1 =>e hin has a sign ha $sers are $sing e*sies ih!$ necessari%& r$sing hem.? s s!me e*sies re$ire a%#han$meric #ass!rds7 maing hem m!re c!m#%e41 i is a%s! c!mm!n ha a $ser migh "!rge his6her #ass!rd *eca$se !" c!m#%e4i&. P!nem!n a%s! said ha <9; !" he res#!ndens admied ha he& ha+e "!rg!en heir #ass!rds as i as eiher !! %!ng !r !! c!m#%e4 ! remem*er. L!sing #ass!rds can a%s! %ead ! !ne *eing "r$sraed and a%s! said ! *e m!re ann!&ing han mis#%acing e&s1 a m!*i%e #h!ne *aer& de#%eing !r geing $n emai% (C$ris120). In he case !" a "!rg!en #ass!rd1 $s$a%%& c!m#$ers !r e*sies !""er a #ass!rd rese s&sem1 *$ c!ns$mers ere a##aren%& !! %a@& !r "ind he #r!cess inc!n+enien1 as =5; said i !! !! %!ng ! rese a #ass!rd ha he& *asica%%& ga+e $#1? (Kerner1205). I" i ere ! *e +ieed "r!m a *$siness #ers#eci+e1 a c!m#an& migh %!se a %! !" c$s!mers d$e ! %ac !" #aience and c$s!mers !#ing ! *$& "r!m s!mehere e%se insead. Aased !n he a*!+emeni!ned #!ins1 i is sa"e ! sa& ha #ass!rds are +ir$a%%& he ea %in in sec$ri& as he& !n%& ha+e ha m$ch ! !""er *$ ih !! m$ch d!nside. L$na*ee1 an inn!+a!r !" m!*i%e and des!# a##%icai!ns has a%s! ann!$nced res$%s "r!m an !n%ine s$r+e&1 circ$%aing am!ng 00 end $sers an d heir insighs !n m!*i%e *aning and m!*i%e sec$ri&. cc!rding ! B%i+ier Aerni1 managing direc!r !" L$na*ee1 a*!$ 58; !" #e!#%e h! ha+e $nderg!ne he s$r+e& admied ! "!rgeing heir #ass!rds "re$en%& and m$s $se s&sem reses !n e*sies ! gain access ! heir acc!$ns. Bn%& a mere 0; !" #e!#%e said he& ne+er "!rge heir #ass!rds1 and a saggering n $m*er !" 52; !" #e!#%e said ha he& rie heir #ass!rds d!n s! ha he& d!n %!se rac !" i (Mareire1 205). I has *ec!me +er& c%ear ha #ass!rds are n! %!nger a sec$re a& !" accessing sensii+e maeria% !n%ine !r !""%ine1 as #er meni!ned ha he& are in man& a&s s$sce#i*%e ! man& "!rms !" *reaching !r %!ss !" daa. Ke&%!ggers are a #rime e4am#%e as ! h& man$a% in#$ #ass!rds are n! %!nger sec$re in his ech-sa++& generai!n. e&%!gger is a #iece !" ma%ici!$s s!"are ha can *e insa%%ed !n! an& #ers!na% c!m#$er ih!$ he $sers n!%edge hen he& +isi a e*sie1 read s#am emai% !r insa%%ing a #r!gram. I is a =s#&are? !r =ma%are? ha rec!rds e&sr!es a $ser maes !n a CT098-3.5-2-RMCT
age %
Research Methods for Computing and Technology e&*!ard (>a%%er1 20) Bnce he e&%!gger is de#%!&ed1 i sim#%& %ies in ai *& c!%%ecing in"!rmai!n and ransmiing hem *ac ! he !rigin1 in his case he hacer. Ke&%!ggers are easi%& !*ained as he& are a%s! %egiimae e &%!ggers $sed in !""ices and *ig c!m#anies ! ee# rac !" heir !rers as ! ha he& are d!ing a heir des. >ih ha1 daa can *e easi%& s!%en ih!$ c!nsen (:re*enni!+1200) Imagine his ha##ening ! a %arger sca%e1 here g!+ernmen secres can *e haced and %eaed !n! he inerne1 mareing sraegies !" ri+a% c!m#anies can *e e4#%!ied and m!s im#!ran%&1 c%assi"ied and6!r #ers!na% in"!rmai!n7 heher $sed "!r *%acmai%ing !r "!r "$n i is $n%a"$% and irres#!nsi*%e !" he hacer. ence1 a sa"er and m!re sec$re a& ! access #ers!na% in"!rmai!n is inr!d$ced1 n!n as near"ie%d c!mm$nicai!n !r 'C in sh!r. sh!r ranged radi! echn!%!g& ha can *e riggered *& ! 'C-c!m#ai*%e de+ices7 i is m!re sec$re and sa"e * eca$se !" is ransmissi!n range !" ar!$nd cenimeers1 hence inheren%& m!re sec$re "!r ransaci!ns (Brac%e.c!m1 205). I has %i%e ! n! se $# ime1 eas& ! $se1 "as1 and e""icien. I a%%!s "%! !" in"!rmai!n *eeen de+ices as %!ng as he& are ihin he se disance meni!ned a*!+e. I is !"en $sed in e&cards and !her cards ih an em*edded micr!chi#1 s$ch as credi cards. 'C is a%s! a+a i%a*%e !n m!s m!*i%e #h!nes1 name%& he !nes ha r$n !n an ndr!id !#eraing s&sem1 here i can *e $sed ! rans"er daa "r!m #h!ne ! #h!ne ih a sim#%e a# !n he screen. s s$ch1 a s&sem is #r!#!sed ! c!m*ine *!h he sec$re a&s !" $sing 'C as a %!gin s&sem and re#%acing i ih he radii!na% man$a% e&sr!es !n a c!m#$er. In his s&sem1 a 'C s$##!red m!*i%e #h!ne d!$*%es as an access card ! a #ers!na% c!m#$er1 maing i sec$re and hass%e-"ree1 ih he $sers n! needing ! mem!ri@e #ass!rds and sa+es ime. I is eas& ! $se1 as a $ser is n! re$ired ! carr& m$%i#%e e&cards "!r di""eren "$nci!ns as i can a%% *e em*edded in! he m!*i%e #h!ne. '! his ma& s!$nd ris& a "irs1 *$ i" he #h!ne is #ass!rd #r!eced !r re$ires a *i!meric scan ! access (h$m*#rin scanning is !n he ne iPh!ne <1 s!!ner !r %aer e+er& !her smar#h!ne is ass$med ! cach $# ! his echn!%!g&). +en a sim#%e #aern rec!gnii!n hich is a+ai%a*%e in m!s #h!nes is en!$gh ! deer an& hie" "r!m accessing &!$r credenia%s !n &!$r #h!ne. M!re!+er1 a :P/ ena*%ed smar#h!ne can *e rec!+ered and raced d!n easi%&1 hereas %!s #ass!rds cann! *e raced *ac i" a $ser %!ses !a% access ! an acc!$n. I a%s! sa+es s#ace in &!$r a%%e i" !ne is ! $gg%e credi cards and access cards1 hich can *e $ie a hand"$% "!r he !ring c%ass ('ear"ie%dc!mm$nicai!n.!rg1 205). 'C is a%s! +ersai%e and can d!$*%e $#
CT098-3.5-2-RMCT
age 5
Research Methods for Computing and Technology as man& !her "$nci!ns are a+ai%a*%e and !#en ! 'C1 s$ch as #a&ing *i%%s1 *!arding s$*a&s and man& m!re ('ear"ie%dc!mm$nicai!nn"c.ne1 205).
4.0 Research Aims & Obecti!es 4.1 Aims The aim !" his a##%icai!n is ! im#%emen a sa"e %!gin s&sem ih he 'C "ea$re1 creaing a sec$re %!gin mechanism ha n! !n%& #r!m!es in"!rmai!n sec$ri& *$ a%s! is sim#%e and $ser "riend%& in !rder ! he%# resha#e c!m#$er sec$ri&.
4.2 Obecti!es - T! im#%emen a hass%e "ree %!gin s&sem1 here $sers !n%& re$ire an ndr!id De+ice ! access heir #ers!na% c!m#$er. - T! #r!+ide !#ima% sec$ri& and sa"eg$ard daa "r!m $na$h!ri@ed $sers - T! *e "as and e""icien in a #r!"essi!na% !ring en+ir!nmen
CT098-3.5-2-RMCT
age +
Research Methods for Computing and Technology
".0 Research #uestions ".1 $omain Research
. 2. 3. . 5. <. .
>h! are he arge $sers "!r his a##%icai!nE Is i $ser "riend%&E Is i eas& ! im#%emenE re here an& *ene"is !" $sing his a##%icai!nE ! !"en d! $sers re$ire %!gin in"!rmai!nE Is 'C ide%& agreed $#!n as a *eer a%ernai+eE Is 'C a sa"er a%ernai+eE
".2 Technical Research . 2. 3. . 5. <. .
>ha are he s#ecia% "ea$res !" his a##%icai!nE ! is he a##%icai!n he%#ing a $sers sec$ri& sa$sE >ha are he c!m#!nens needed ! *$i%d a 'C agE ! is he a##%icai!n g!ing ! rans"er in"!rmai!n acr!ss he hardareE Is daa sen "r!m he a##%icai!n rerie+a*%eE Is here an& se$# re$ired *e"!re $sing his a##%icai!nE >ha e !" meh!d!%!g& is ! *e im#%emened hen de+e%!#ing his a##%icai!nE
CT098-3.5-2-RMCT
age
Research Methods for Computing and Technology %.0 Research $esin In he research design #hase1 i is main%& caeg!ri@ed in! ! main se#s1 hich are #rimar& daa c!%%eci!n and sec!ndar& daa c!%%eci!n. Primar& daa c!%%eci!n is he iniia% daa c!%%eci!n1 here he researcher ges ! c!%%ec daa "irs handed%& "r!m he s!$rce6s$*ec $nder $esi!n. /ec!ndar& daa c!%%eci!n is aen "r!m #rimar& daa c!%%eci!n1 main%& $sed "!r ana%&@ing #rimar& daa.
%.1 Primar' $ata Collection a) Iner+ie Meh!d Iner+ies are a c!mm!n research !!% !"en $sed in !ne !n !ne daa c!%%eci!n meh!d1 here an iner+ieer (researcher) ass a se !" $esi!ns direced !ards he iner+ieee (s$*ec). n iner+ie ma& +ar& de#ending !n he e !" $esi!ns ased1 d$rai!n !" he iner+ie1 n$m*er !" s$*ecs and am!$n !" daa generaed and c!%%eced. ,sing his echni$e1 a researcher is a*%e ! gaher in"!rmai!n !n ha is !n an iner+ieees mind hen i c!mes ! he !#ic !" $esi!n (in his case1 'C /ec$re L!gin /&sem). The researcher is a*%e ! gaher ideas and s$ggesi!ns ! hich can he%# *$i%d and im#r!+e he a##%icai!n. In his case1 iner+ies i%% *e gahered "r!m s$dens a sia Paci"ic ,ni+ersi& and a%s! %ec$rers eaching /!"are ngineering. Aasic n!%edge "!r ha is ! *e d!ne is re$ired1 h$s he need ! iner+ie seas!ned and #r!"essi!na% %ec$rers is cr$cia% ! mae his #r!ec a s$ccess.
*) F$esi!nnaires F$esi!nnaires c!nsis !" a se !" $esi!ns hich can *e gi+en ! a gr!$# !" se%ec res#!ndens in !rder ! c!%%ec s#eci"ic in"!rmai!n. The $esi!ns sh!$%d *e c!nc ise and easi%& $nders!!d CT098-3.5-2-RMCT
age 8
Research Methods for Computing and Technology *& he res#!ndens. ,sing his echni$e1 a researcher is a*%e ! gaher in"!rmai!n !n ha #e!#%e hin !" he s!"are and ha are he a&s ! im#r!+e i ('C /ec$re L!gin /&sem). n& "eed*ac and s$ggesi!ns can *e +ieed and ma&*e im#%emened i" i has s!%id reas!ning and ma& #r!+e $se"$% "!r he s$saina*i%i& !" he s&sem. F$esi!nnaires can *e gi+en !$ ! rand!m s$dens !r sa"" mem*ers in sia Paci"ic ,ni+ersi& !r e+en indi+id$a%s !$side he $ni+ersi&.
%.2 Secondar' $ata Collection a) Case s$d& ,sing he case s$d& meh!d1 researchers can gaher daa "r!m re%aed !r e4ising case s$dies. This inc%$des !$rna%s1 c!n"erence s$dies !r *!!s in genera%. This meh!d is $se"$% *eca$se i gi+es echnica% n!%edge !n he research. ence1 he research can *e #re#ared *eer and an& #r!*%ems ha migh !cc$r can *e "!resighed and dea% ih in he ear%& sages !" de+e%!#men.
%.3 Timeline
CT098-3.5-2-RMCT
age 9
Research Methods for Computing and Technology
(.1
Personal Re)ection
CT098-3.5-2-RMCT
age !0
Research Methods for Computing and Technology 1pon completion of the proposal there are a fe limitations that come to mind of the researcher. The 4rst limitation #eing that the researcher has no #acground noledge on ho 67C ors. There ill #e a lot of research to do if the researcher is to proceed ith the current topic. $econdly the topic of choice is more to mo#ile computing instead of softare engineering. *en though it reuires a computer to operate the program the mo#ile programming part is much more crucial in the de*elopment of the system. The researcher should tae into careful consideration the accuracy of the topic. 7inally the researcher has to ha*e *ery good noledge on the topics of mo#ile programming language as ell as computer programming languages. "n the mo#ile programming language factor he:she ill face some di;culties as it is not his scope of study. Thus plenty of self-study and research is reuired if the researcher is to progress ith this topic.
CT098-3.5-2-RMCT
age !!
Research Methods for Computing and Technology *.0 Re+erences and ,ibliora-h' Re"erences Carer1 G. and a$%er1 C. (20). What is NFC and why is it in your phone?. H!n%ine TechRadar. +ai%a*%e aJ h#J66.echradar.c!m6nes6#h!ne-and-c!mm$nicai!ns6ha-is-n"c-andh&-is-i-in-&!$r-#h!ne-980 Hccessed Dec. 20. :re*enni!+1 '. (200). Keyloggers: How they work and how to detect them (Part 1. H!n%ine /ec$re%is - ng%ish - :%!*a% - sec$re%is.c!m. +ai%a*%e aJ h#sJ66sec$re%is.c!m6ana%&sis63<386e&%!ggers-h!-he&-!r-and-h!-!-deec-hem #ar-6 Hccessed Dec. 20. !%e&1 D. (20). What !s NFC" and Why #oes !t $atter %or the iPhone &?. H!n%ine ah!!.c!m. +ai%a*%e aJ h#sJ66.&ah!!.c!m6ech6ha-is-n"c-and-h&-d!es-i-maer"!r-he-i#h!ne-<-9<5<<839<.hm% Hccessed Dec. 20. >a%%er1 :. (20). Keyloggers: 'he $ost #angerous ecurity )isk in *our +nterprise ,, +nterprise ystems. H!n%ine s.c!m. +ai%a*%e aJ h#J66es.c!m6aric%es62026626e&%!gger-sec$ri&-ris.as#4 Hccessed Dec. 20. sec$ri%ane.c!m1 (205). Passwords -re Weak .ink in ecurity , eecurity Planet . H!n%ine +ai%a*%e aJ h#J66.esec$ri%ane.c!m6ne!r-sec$ri&6#ass!rds-are-ea-%in-insec$ri&.hm% Hccessed 3 Gan. 205. Inernenes.c!m1 (205). How /%ten #o *ou Forget *our Password? , !nternetNews0. H!n%ine +ai%a*%e aJ h#J66.inernenes.c!m6sec$ri&6h!-!"en-d!-&!$-"!rge-&!$r #ass!rd.hm% Hccessed 3 Gan. 205. Mareire1 (205). .unaee ur2ey Finds that 13 Percent o% !nternet 4sers /%ten Forget 'heir /nline Passwords" Creating $andatory Password )eset . H!n%ine +ai%a*%e aJ h#J66.mareired.c!m6#ress-re%ease6%$na*ee-s$r+e&-"inds-ha--#ercen-inerne$sers-!"en-"!rge-heir-!n%ine-#ass!rds-850<82.hm Hccessed 3 Gan. 205. 'ear"ie%dc!mm$nicai!n.!rg1 (205). 5ene%its o% NFC %or !ndi2iduals 678 NearFieldCommunication0org . H!n%ine +ai%a*%e aJ
CT098-3.5-2-RMCT
age !2
Research Methods for Computing and Technology h#J66.near"ie%dc!mm$nicai!n.!rg6*ene"is.hm% Hccessed 3 Gan. 205. 'ear"ie%dc!mm$nicai!nn"c.ne1 (205). 5ene%its o% Near Field Communication , N+-)F!+.#C/$$4N!C-'!/NNFC0N+' . H!n%ine +ai%a*%e aJ h#J66.near"ie%dc!mm$nicai!nn"c.ne6*ene"is.hm% Hccessed 3 Gan. 205. Ra#idn"c.c!m1 (205). What is NFC ?. H!n%ine +ai%a*%e aJ h#J66ra#idn"c.c!m6haisn"c Hccessed 3 Gan. 205. Ra#idn"c.c!m1 (205). What is NFC ?. H!n%ine +ai%a*%e aJ h#J66ra#idn"c.c!m6haisn"c Hccessed 3 Gan. 205.