Hardware Oriented Vulnerabilities Database

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Wasif Sami Waheed, Wasif Sami Waheed
dc.contributor.author Mohammad Mughira Asad, 01-132162-028
dc.contributor.author Riz Khan, 01-132162-018
dc.date.accessioned 2023-09-13T09:09:53Z
dc.date.available 2023-09-13T09:09:53Z
dc.date.issued 2020
dc.identifier.uri http://hdl.handle.net/123456789/16221
dc.description Supervised by Kamran Saeed en_US
dc.description.abstract Hardware Security is the protection of physical devices from harm. With the passage of time number of devices increases which are interconnected with each other to perform tedious tasks but on the other side number of physical device destruction attacks also increases. In order to protect all physical devices it is necessary to find out existing vulnerabilities of manufacturer and specifically the device. Hardware Security provides boundaries and other cyber tools that protect programs, files, and information that goes into the computer. Hardware safety protects the device and peripheral hardware from robbery and intrusion of electronics and damage. To get authentic information like vulnerabilities and past exploited history of devices, it is necessary to get data from different resources and organize it in one database. Web scrolling, internet harvesting, or web statistics extraction is a statistics scanning used to extract facts from websites. Data available on different resources is in different formats so data mining techniques are required to extract the useful information in a huge set of raw statistics. This project is devoted to investigation of vulnerabilities and calculations to find out the level of weakness in device. The main distinct of the designed integrated vulnerabilities database is to search out invulnerable devices. A database management system (DBMS) is a software bundle designed to define, retrieve and manage records in a database. DBMS commonly controls the information, records format, field names, report structure, and file structure. A database is needed to manage information or hardware exposure successfully and to map complex statistics to get efficient information. In the event of purchasing new hardware for an organization, it is very important to get whole details regarding those hardware components. A widespread database is required that incorporates all the risks regarding all devices so that business enterprises can decide which Hardware gadgets are efficient, safe and appropriate for their wishes. en_US
dc.language.iso en en_US
dc.publisher Computer Engineering, Bahria University Engineering School Islamabad en_US
dc.relation.ispartofseries BCE;P-2402
dc.subject Computer Engineering en_US
dc.subject Declaring Web Requests en_US
dc.subject Data mining of hardware Oriented Vulnerability en_US
dc.title Hardware Oriented Vulnerabilities Database en_US
dc.type Project Reports en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account