International Journal of Engineering Research and Applications (ISSN: 2248-9622), 2024
This research focuses on securing networked Electrocardiogram (ECG) systems by using a quantitati... more This research focuses on securing networked Electrocardiogram (ECG) systems by using a quantitative approach to evaluate the effectiveness of various cybersecurity measures. With the increasing reliance on networked medical devices, these systems have become vulnerable to cyber-attacks that can compromise data integrity, system functionality, and patient safety. The study quantitatively examines the impact of encryption levels, authentication methods, and network segmentation on system security by measuring variables such as attack success rates, data breach occurrences, and unauthorized access attempts. Statistical analysis, including regression and ANOVA, is applied to determine the significance of these measures. The findings aim to provide data-driven insights into enhancing the security of networked ECG systems, ultimately contributing to safer healthcare environments.
International Journal of Scientific & Engineering Research -IJSER (ISSN 2229-5518), 2024
Zero Trust Architecture (ZTA) offers a robust approach to enhancing cybersecurity in enterprise n... more Zero Trust Architecture (ZTA) offers a robust approach to enhancing cybersecurity in enterprise networks, replacing the traditional perimeter-based security models. This paper examines the application, challenges, and effectiveness of ZTA in contemporary corporate environments, with a focus on hybrid and cloud infrastructures. By emphasizing key principles such as least-privileged access, continuous authentication, and network segmentation, ZTA directly addresses the security risks that organizations face today. This research includes a review of relevant literature and an analysis of case studies to explore the difficulties companies encounter when adopting ZTA, including financial costs, integration complexities, and resistance to change. The study also identifies strategies that organizations have successfully employed to overcome these obstacles, leading to improved security and operational efficiency. The findings highlight ZTA's ability to reduce security incidents through automation and enhanced monitoring. While there are technical challenges to implementing Zero Trust, the research concludes that the framework is essential for maintaining a strong security posture. Future areas for exploration include the role of technologies like artificial intelligence and machine learning in further improving ZTA.
International Journal of Science and Research (IJSR) ISSN: 2319-7064 SJIF (2022): 7.942, 2024
This project presents the design and development of a portable, real-time, PC-based ECG monitorin... more This project presents the design and development of a portable, real-time, PC-based ECG monitoring device that addresses several critical issues faced by traditional monitors, such as baseline wandering, muscle noise, changing electrode resistance, and lead problems. These challenges typically decrease the reliability of ECG systems. To overcome them, we employed high-gain instrumentation amplifiers like AD624AD and AD620, which improve the real-time processing of ECG morphology and ensure powerefficient performance. The system captures the ECG signal, transmits it via the computer's parallel port, and displays it across three separate lead graphs using custom software. Reliable detection of R-peaks is achieved through multiple statistical techniques, ensuring accurate heart rate measurement. The system identifies R-peaks within a defined time and amplitude range and uses the average RR interval to determine heart rate. Additionally, energy consumption and battery life were evaluated using a profiling environment, providing valuable insights into the system's efficiency. This environment includes a PC, digital oscilloscope, and other testing tools to measure and improve performance.
Digital forensics has gained much attention, with the advancements in the technology, to maintain... more Digital forensics has gained much attention, with the advancements in the technology, to maintain and assess the legal and regulatory requirements. At the same time, Government and Private regulators unable to formulate a procedure for adoption of most suitable digital forensic tools as per operational requirements. Moreover, hundreds of expensive digital forensic tools have arrived in the markets which generates the challenges for regulators upon their selection. The objectives of this research are, to identify the most suitable digital forensic investigation tool using perceived usefulness (PU), identification of correlation between considered features (independent variables) and suitable tool adoption (dependent variable) and study the procedure and technique for adopting the most appropriate digital forensic tool. Both elements (PU, PEOU) of Technology Acceptance Model (TAM) have used to gather the validate information from the digital forensic experts while performing quantitative survey. The research design of this thesis is correlational in nature with positivist research approach and quantitative research technique is adopted. Digital Forensic investigators and experts are considered in population selection along with purpose (EXP > 6 years) based sampling. Google forms and IBM-SPSS software are used to perform quantitative survey and statistical calculations respectively. Descriptive statistical calculations are used to achieve the first objective, i.e. most suitable digital forensic tool, Pearson correlation analysis are performed to achieve the second objective, i.e. correlation between variables and third objective achieved via formulating the complete procedure in the research.
International Journal of Engineering Research and Applications (ISSN: 2248-9622), 2024
This research focuses on securing networked Electrocardiogram (ECG) systems by using a quantitati... more This research focuses on securing networked Electrocardiogram (ECG) systems by using a quantitative approach to evaluate the effectiveness of various cybersecurity measures. With the increasing reliance on networked medical devices, these systems have become vulnerable to cyber-attacks that can compromise data integrity, system functionality, and patient safety. The study quantitatively examines the impact of encryption levels, authentication methods, and network segmentation on system security by measuring variables such as attack success rates, data breach occurrences, and unauthorized access attempts. Statistical analysis, including regression and ANOVA, is applied to determine the significance of these measures. The findings aim to provide data-driven insights into enhancing the security of networked ECG systems, ultimately contributing to safer healthcare environments.
International Journal of Scientific & Engineering Research -IJSER (ISSN 2229-5518), 2024
Zero Trust Architecture (ZTA) offers a robust approach to enhancing cybersecurity in enterprise n... more Zero Trust Architecture (ZTA) offers a robust approach to enhancing cybersecurity in enterprise networks, replacing the traditional perimeter-based security models. This paper examines the application, challenges, and effectiveness of ZTA in contemporary corporate environments, with a focus on hybrid and cloud infrastructures. By emphasizing key principles such as least-privileged access, continuous authentication, and network segmentation, ZTA directly addresses the security risks that organizations face today. This research includes a review of relevant literature and an analysis of case studies to explore the difficulties companies encounter when adopting ZTA, including financial costs, integration complexities, and resistance to change. The study also identifies strategies that organizations have successfully employed to overcome these obstacles, leading to improved security and operational efficiency. The findings highlight ZTA's ability to reduce security incidents through automation and enhanced monitoring. While there are technical challenges to implementing Zero Trust, the research concludes that the framework is essential for maintaining a strong security posture. Future areas for exploration include the role of technologies like artificial intelligence and machine learning in further improving ZTA.
International Journal of Science and Research (IJSR) ISSN: 2319-7064 SJIF (2022): 7.942, 2024
This project presents the design and development of a portable, real-time, PC-based ECG monitorin... more This project presents the design and development of a portable, real-time, PC-based ECG monitoring device that addresses several critical issues faced by traditional monitors, such as baseline wandering, muscle noise, changing electrode resistance, and lead problems. These challenges typically decrease the reliability of ECG systems. To overcome them, we employed high-gain instrumentation amplifiers like AD624AD and AD620, which improve the real-time processing of ECG morphology and ensure powerefficient performance. The system captures the ECG signal, transmits it via the computer's parallel port, and displays it across three separate lead graphs using custom software. Reliable detection of R-peaks is achieved through multiple statistical techniques, ensuring accurate heart rate measurement. The system identifies R-peaks within a defined time and amplitude range and uses the average RR interval to determine heart rate. Additionally, energy consumption and battery life were evaluated using a profiling environment, providing valuable insights into the system's efficiency. This environment includes a PC, digital oscilloscope, and other testing tools to measure and improve performance.
Digital forensics has gained much attention, with the advancements in the technology, to maintain... more Digital forensics has gained much attention, with the advancements in the technology, to maintain and assess the legal and regulatory requirements. At the same time, Government and Private regulators unable to formulate a procedure for adoption of most suitable digital forensic tools as per operational requirements. Moreover, hundreds of expensive digital forensic tools have arrived in the markets which generates the challenges for regulators upon their selection. The objectives of this research are, to identify the most suitable digital forensic investigation tool using perceived usefulness (PU), identification of correlation between considered features (independent variables) and suitable tool adoption (dependent variable) and study the procedure and technique for adopting the most appropriate digital forensic tool. Both elements (PU, PEOU) of Technology Acceptance Model (TAM) have used to gather the validate information from the digital forensic experts while performing quantitative survey. The research design of this thesis is correlational in nature with positivist research approach and quantitative research technique is adopted. Digital Forensic investigators and experts are considered in population selection along with purpose (EXP > 6 years) based sampling. Google forms and IBM-SPSS software are used to perform quantitative survey and statistical calculations respectively. Descriptive statistical calculations are used to achieve the first objective, i.e. most suitable digital forensic tool, Pearson correlation analysis are performed to achieve the second objective, i.e. correlation between variables and third objective achieved via formulating the complete procedure in the research.
Uploads
Papers